From fd3a211169b2d9720c77f774b7057398de3fd944 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Wed, 15 Jun 2022 10:23:29 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- incubator/awesome-ttrss/0.0.1/CHANGELOG.md | 6 + incubator/awesome-ttrss/0.0.1/Chart.lock | 9 + incubator/awesome-ttrss/0.0.1/Chart.yaml | 30 + incubator/awesome-ttrss/0.0.1/README.md | 38 + incubator/awesome-ttrss/0.0.1/app-readme.md | 3 + .../0.0.1/charts/common-10.0.10.tgz | Bin 0 -> 46486 bytes .../0.0.1/charts/postgresql-8.0.7.tgz | Bin 0 -> 76855 bytes incubator/awesome-ttrss/0.0.1/ix_values.yaml | 51 + incubator/awesome-ttrss/0.0.1/questions.yaml | 2797 +++++++++++++++++ incubator/awesome-ttrss/0.0.1/security.md | 460 +++ .../awesome-ttrss/0.0.1/templates/common.yaml | 2 + incubator/awesome-ttrss/0.0.1/values.yaml | 0 incubator/awesome-ttrss/item.yaml | 4 + 13 files changed, 3400 insertions(+) create mode 100644 incubator/awesome-ttrss/0.0.1/CHANGELOG.md create mode 100644 incubator/awesome-ttrss/0.0.1/Chart.lock create mode 100644 incubator/awesome-ttrss/0.0.1/Chart.yaml create mode 100644 incubator/awesome-ttrss/0.0.1/README.md create mode 100644 incubator/awesome-ttrss/0.0.1/app-readme.md create mode 100644 incubator/awesome-ttrss/0.0.1/charts/common-10.0.10.tgz create mode 100644 incubator/awesome-ttrss/0.0.1/charts/postgresql-8.0.7.tgz create mode 100644 incubator/awesome-ttrss/0.0.1/ix_values.yaml create mode 100644 incubator/awesome-ttrss/0.0.1/questions.yaml create mode 100644 incubator/awesome-ttrss/0.0.1/security.md create mode 100644 incubator/awesome-ttrss/0.0.1/templates/common.yaml create mode 100644 incubator/awesome-ttrss/0.0.1/values.yaml create mode 100644 incubator/awesome-ttrss/item.yaml diff --git a/incubator/awesome-ttrss/0.0.1/CHANGELOG.md b/incubator/awesome-ttrss/0.0.1/CHANGELOG.md new file mode 100644 index 00000000000..4d92fb172f2 --- /dev/null +++ b/incubator/awesome-ttrss/0.0.1/CHANGELOG.md @@ -0,0 +1,6 @@ +# Changelog
+ + + +### awesome-ttrss-0.0.1 (2022-06-15) + diff --git a/incubator/awesome-ttrss/0.0.1/Chart.lock b/incubator/awesome-ttrss/0.0.1/Chart.lock new file mode 100644 index 00000000000..860fcfb835b --- /dev/null +++ b/incubator/awesome-ttrss/0.0.1/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +- name: postgresql + repository: https://charts.truecharts.org/ + version: 8.0.7 +digest: sha256:2b4c13c14e572773165d89a3f24c637b85e6f0350c73bb5ee029464a014327d6 +generated: "2022-06-15T10:17:44.532775992Z" diff --git a/incubator/awesome-ttrss/0.0.1/Chart.yaml b/incubator/awesome-ttrss/0.0.1/Chart.yaml new file mode 100644 index 00000000000..28be84b8546 --- /dev/null +++ b/incubator/awesome-ttrss/0.0.1/Chart.yaml @@ -0,0 +1,30 @@ +apiVersion: v2 +appVersion: "latest-202" +description: Awesome TTRSS aims to provide a powerful Dockerized all-in-one solution for Tiny Tiny RSS +name: awesome-ttrss +version: 0.0.1 +kubeVersion: ">=1.16.0-0" +keywords: +- tt-rss +- awesome-ttrss +home: https://github.com/truecharts/apps/tree/master/charts/stable/awesome-ttrss +icon: https://truecharts.org/_static/img/appicons/tt-rss.png +sources: +- https://github.com/HenryQW/Awesome-TTRSS +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +- condition: postgresql.enabled + name: postgresql + repository: https://charts.truecharts.org/ + version: 8.0.7 +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/incubator/awesome-ttrss/0.0.1/README.md b/incubator/awesome-ttrss/0.0.1/README.md new file mode 100644 index 00000000000..fa7e1f1cda2 --- /dev/null +++ b/incubator/awesome-ttrss/0.0.1/README.md @@ -0,0 +1,38 @@ +# Introduction + +Awesome TTRSS aims to provide a powerful Dockerized all-in-one solution for Tiny Tiny RSS + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://charts.truecharts.org/ | postgresql | 8.0.7 | +| https://library-charts.truecharts.org | common | 10.0.10 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/incubator/awesome-ttrss/0.0.1/app-readme.md b/incubator/awesome-ttrss/0.0.1/app-readme.md new file mode 100644 index 00000000000..737285ffba9 --- /dev/null +++ b/incubator/awesome-ttrss/0.0.1/app-readme.md @@ -0,0 +1,3 @@ +Awesome TTRSS aims to provide a powerful Dockerized all-in-one solution for Tiny Tiny RSS + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/incubator/awesome-ttrss/0.0.1/charts/common-10.0.10.tgz b/incubator/awesome-ttrss/0.0.1/charts/common-10.0.10.tgz new file mode 100644 index 0000000000000000000000000000000000000000..b39f3b3a8f32cdc206c3bbba091c49a15329f972 GIT binary patch literal 46486 zcmV)>K!d*@iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UC_aDdQ{cy>x9z#s)0XXMCv(^BB;7uphmY-~@9yjz z2O=Q}V~S)0pd3v)-~D&+BtU`^Q;g!A}M zcmMQyz25%bp7^)d>y`iQ?e7l$)ZZHn2ff|hUa$YBUVpGR?EMM!?g5v|lT!xCpL(}$ ztK7NoluqP&C$RYfRhXMXL=|GgtW-nXdl$ z*XR9Cf4|df_kL{6Ax;>?2_ga*nnN6q08S?9e-(f`DVeqaNFeX8MF0SD5*O%~D#+pr z1Gdc2NTb(UXk7ZePOsDNwH{{t)%;(;I7jrJ1i;Gq-|z43?j4lp|3UxYasEHV^8~cp z;9Z8252tSd%}|IZI0RvuOz<=(kk9qj6YyUVn!r3}yzn_fV2tAQx|L=qS!Bt{98S@w z1%QBcE?_JHn<1bIfH1}=VF2@jEdU70Qi@qhmLo8og`|U1TRx~-ZCR@+T)-fokPJ?> zVQ+VTIOwBswANeDM6HXs3oBNh6(yPha}pR z>erZ{DX&;h_X2i9k{g%}pxK08^gF%Ipf~9Ep7r-My$8Miv%SOUU~h2P+Z*=#!~XuW z-a)wA?}y{TV2@LIZx=?peKeRva1tFJ^arpP!QChvKZA#ZCOB+F>Wrjw264P8rFFe} zLL0~p>8#7IhviUt&>41mn!E=CGzkx)gZ+MV2zU4381C;6hPwy7sNd@!^w4hDkI-Z? z8KZ+f97KEl5I!3m3_~;+JnIdfd55^v_D0lA5Tmm+Wt&o0*Q=+lf!vU~y8L=r^}=G% zA5R9m`;as7;j?f!9uJ3m2jkv8I_w?pjt3C!!?3>_A;j5rFh-Le?DzU`+#62%z1_nG zZP!!xD87bEs^}V~5u%7J5ZRQnMa_EJ@-l4&z9D(7DvcmIEWFp*D_FR{J3c( zgJ-+r$=+~qa2TOyhbSB$?xOLqH`$F2_a_t78y+5v_a<->?MLBY_$=DpKY)8)7OpnG z5f{Ta!wK4y(y~@Pm5(IUh6I+-*1>Vey4&dwI|IYK&rr0xci4kHg!XnP2XL}~*q@+i z80}5ML4P>x@5Aw=AMW)LjL`nG-NW%5c(}W^>CMD$O4*bk`upaB*VJ4g zdJE`Hg|Dg61fHwr_By)-`wrp3!Tu0MFd8519>U@N!SG=CtQQ^b?e6st4)^=f;9!4n z7*2-!6EqnQhG@5Uc+i^+QE%^Hf8aGJD$Q?1>NzABM&nKCtg6)$S;K8eVO4xBB$u|m z&Oyf*4+oQj@v}p8*pK$2@$j&BINlw?{$RMjxBu+muzwhZ@L)1H-0L0g_j{A!AsS5J z-tPW*98P+ZF&eIKdo#kO$uzwIVP&-ygjH~x5>^&p3&|nuu+!^2Ge&U#V0aj!XfT9u zaCk7-h2uRGKAVi6!Qlbw?~mbd{49cl-Di7IICzG*8GHzz4F|)+-QnJ(zrN|Fbe+cO z7{&!v5Cbp)=>idgBP1LO(j-9>{0XEJ@oSRDF<(5ZCHFg3+JVB$p@dUmF2~MyW zCtv`0Yr-fJ4weP9eJD2$B6LR z6(NcVia?e|R0^UPhmejye+2{O*_6Nt0m=wuXu1?dU!?@RFv!py-Ul4Xo=Dz0Lm@$s zA+V*S<~D#y1kTbp#>w=37D1-?lEXSzy*Wo-VDFL_C`JrbK@{L6uor?991OtIBqe<6 zV9LK~{Q1-(HVFR0>V84vQcH9A3FHY}KpgX_Cu&*0HvvO)GL-yX9V6~9Jg8-WZ~>2Ng19jl_F_5VjvR@E`gwPY&HPi9-YgUTk=C$TTM}d zq}8N#x&k0AsyWPT1vY^(H8Rgo^%Sxh$SEKH8P}ozg~B`^rWoU(KdPEJK#UUmff&jy|T{$Xc-zq9WJ3GS7r`W3zZj$Au`7aqTqUlIH8M~B&Q6o3P_$%aE;jvTwMIO=B7@Iv886I z8-k-O!bt&8{B%Kz`3rtY3H~RC6ob<=0!KMZX$WIPN=t>mM3@R#e{Ic7mD4mTD)9L; zhd7aXpfWKOKUx~)3MY}6T98bI*5^g+HaRpwVE###`V}XUrD%lNtY)VyfFjq%YXH-N zH^&K{=W_t(X`V0+S(z6q0ZhSM8e%X3{SvetFz0R3 zTozy;P2y#xlz;)r6^a0)8ZX(9`k~cVVMxhUyfy2g1_~6N0G*|I9PuTYv{fVD{3}3O zl9P`ij3TYHOMpd{%IeO*xtJkm`jydQDPJO5bWBnvtO0KQDyy0g5y{aGfD#m@TI-@n zX*zo?Z5E*dsFd14;4%>e$8k;>B4=qVEp6-fPdJHiGOcATGKOJehT?^9%SIeV9rFnI zo3qSIG4PZxfR)IWXg46sO1|N$@2IMeEij^NSp2qiq65a&perC$wEPCx=uVYks`r~C zXH%&PZ#AlCxfl|EhY9~!s`LU)gtFIcO7rnQP{_&>Ddv89Yi36=^P@<^p?c0& z`=`O-B#iS&F%KN43nO33f?BQsC0xq_I#!NHv7L0Ck}J7vGFHFv6aqdgI;*zaikhC8 zS;y>7y%l^dt!VsDRV_;+vyRhCaziR^z{{8%Kvki(WEKU?sy(vE&LwP006}w3Lq!C( z%ncbVcCWpVESr2bVe+VZ!Y@uKR5@M8r*T?0tl@-YrEk~QT!<-uuOOQB#b#okjT z2O~^S$l@h{jKOfGtWT~^)M5@N43P;8#n_(42vRdYLS& z>H7wX^}_;_G!f>yS-Wt`r-*VUnUHG(w^B->j^m826~bH1pKrOPLIyde|s?k zKYsoUI%h~QMTg5N@a4;otta5v6ltm6%a!&UnEi^DXJ}&HYvnJ$x92cxo0Xe*uF!JC z|D#{OsDKu$x>qEfTR2R97+%~Jri~n(2)?|6LqJ*DLNRJXq z76O00iZ#Ttu&*OiTXm*V)b3-+I2R0)D)nImz=Wi8;mOimWbIRk8gHeGSotv8MIlFo zb5Zm{N^oUOO8(@~$A~lX3ggzXNnyxx7=s8h$OY0EfjEVcFw%^jD_}zkC?hzTzJLrW z7{@Tt>uSKVSR0&L?Q@{EhLb*+jNp`Dwgh1esdS(fu0F=m7V~E;_n>GvLs8Bb*t*^^ zuO{_1SK~{{(7c_b5o(773uld9u}jyY+}c|@ejo!?jAP6EG+^QN)ioqhJA%m+ku<06 z0+BlC=o4S;VJ2j!Fu*AiQl<3-WUfq?YGF(eyrRNu0;V~Z)&u0Erun>ZDRP0YK~g?b z^bfrt{B4F3?KVp(dn>iMWhXDwT&yLcgldJFf{)6WdBug=Z^?B437P!gq#Dj^Hz za0v*aX}mxnp>djC zQI5n?pTi<34MT}b(TdRbqJvU5@~Lf;dHE)&!r_zyn?qVnQx$@+Qa+>H~iWfhVG|%*#iTji0Sr#MC3NRKQG-Ii9$1^Sk z^@MzvoTVvygXtWyaJCuN!kt)bkz%C05}ESrUG$OEi8?QGbXD?CB_pJF2fkrb<7m7)Zc|LIxRQ!HI8G>Z6r^2 zxO#;NzzJri#14Rf&kjC+@f-oj08S`_aV&fuotFA#c6;a@w}$vy1w~kd2jp@$QgOOi z*mYWJpV*6mjwFG}QnXYQ602B_12=@Y7$-}B8Jg1$c*&b|N^6JR3@#ABT$*1e+jGg#gS%e*;y6BQQjDL zsAf5OrEMCckf8{C)RYt>u_MuxZOqa*q8g%#`_j_L3%ibUfWUmDOe+Bi#xGC|m**%< zlZcK$zo))th+v^)OYgaaOmk*F4AuJy#Bom0#f%`z5$0ctIE@J68}YiCW`1TjpYMg+ z4fIEL--O*=vfVMi`+ znFs3qlPA*EK1VR205dS-b~2d5Phwj?oq*w=cYDwK!yaE1^16bJIF=yKz!*(Z!fiP* zE2w`))lZ!LUaKW7R_Mg{xl0c*wvd7A84hQ1yBEj8=TN+H7b8DXV1Wg5L@AsivmUr6 zm@$-ebaT>9TxBK_B%F02vOcz9hP!;#AEz*C6GYRTgot*z3AyNZpO^(vyT8rXR|<<$ z&Voi@oFowr`66SMUN`SZv7w)(SU@X^lD(uuO;rLRL;yI2X(Yu;Ia+ds2gISC9 z279oohDW6}4Ar@#7@al2IX4KgaAGQ@Up${o@Fxjg>oz%bm^y@TPjq-d8ZD%DlBFgv zA;6W$0z34ED_-^0Y%HJSc^0Fs*C~v~FosEp$o3B4KYvm`ceFeDu$>d^kOrrK^cyEH2lGY-K4h=p9LG!TAhtl10^o24CcG%tJ6(nD7S62#jg!;G-VXoozTE`Y zdmNromwx94!)<8;F}^oe1$?M1RnUl;w1HYEg|&(y)AFT8Gpx}Lf);C3g9Yb?+Cfsh zRyEY92ZuQXh(w%QD(a+!jY?&?yyg91X_&?x>)Uyr2^iKHqK|xi^l?Z2d(Qv3I6hSd z;QJS+AMNULDaAjjMO6l`69Df|em)UwPP2BVvC zVh)H&-?gwMj)M7?eNkcGtqu)hiT5mhH0JSM~+nrCd$;ly$@C4q$Vy0rKc_9kc{)yFwuQbb_PaTLYZkRW>mU*S(Edc(gU@u@-?F`LqftS!rEsm2II z6MSWVxjLjW%p!v!(qaD`VRITxL6*^8Vl%Zcu?q^=FgcZAmLa~D=kWP&)pXI8iJmQL z%8#nO;xM2YNhjFA;9AVYEgc83?V!VPOmha%r!1u=@=>*plBk_irH3bF+A0~==CdCs z?J=Y{bmOLV+y4?&pWAGug9Erp@(gqCcYGt zRHFV%O2t`Efs`9xpf$7zFSjf%c}P}h__hj1?Zjry>P0GpY*rw}0TlKx|5U7a3d~L+ zn{_}llz`c_=sNGD_gLtPh}+BDq_pyXg1|MKJ0^McFZyqp>t-x$kk~fA`DN&&VUgzKpdhyMua*0 zelGi)g9AP$E*rQR=M~C0g;$u~?^R@=I*|txTdeRtAQ?!<)ttnh!x85}xsrW<{u79h zJi2i!JKn;!YRk(OYEAiOJ-sjFO09b_G_m;&RvK2>n=UmZh#yt7e*Id*WHR9F6`Jtf zHR}z7pl`)tYRdz5r6Zs}7R2TU6Ot9&vWeVs!f9ct`#D%jpj1h#i3D z8C$-GXBcl}LxDp)F&m5lgE<9v?vip|}O*95kYgnaD&g`;zsPA=IDUCQcz z{kWrws$&|wMiJPu(AeGqN$OM;MyLot5*xvMvdmKBpYWkC8?j-?#Z%knZ55An4P~MQf^u;( z37}7y3YH9Gi03=SD60S@^PSH$XH8=5DCt7S9ENCondYP|Kw3DwS1!XaP5z-TSr9IZ zj}Cy39V?3k1T-JFWjI$tH6NOlKvc|7?SmJQ`ss6y zd@5y-z&T=w=v5eJMJH9(4j+j$L&?jZ&h@z`ZsqZRE46=8Vd4$6*EuH?G()uBdv@pepGbcENwoe!QtTs`AjtTrPgNosMUNdJ zSVO4u8qs1W6aQ0+jky2^RBzM}6jMXxA_PxBUrvzkf;AS9#OajYkT({Pbb0kh?s#DC zkg^)hvs7Geq-e8pqM_@F@Y#XhIoExadMvPdt9{B^F^?P9wJ zJSiO5Bl8Mq-<))*>C%I8DU$%9ko*KT=+iOi&OP6)GT0u8xO zpweQgVG{M_hqtO*MZT~{{;lUf;dCim0d% zQ6_9t5NU4vk}ZNd!sFoJz$@+4aLIk*>S&4gMck9fGni9E%nlha(L?iPdrHzg>&};L zQ^d=l$%HoG&SXLxvSu=&x93Zl{j0dZpfBzdUQd17g5w=Ccl{M-!D%{2{O{nA&sT`D zH5)qCrA__~M0kNCk$(}>D}4)!$bdu{OhVLYNgT!2kWM2?RSruLhau8Y z+71T(R=l*gI09#nBM{%^zJyp|KY0S)5g<0jK#VD~u6f{V^gOGyV!bw-Ol*eE<=-2$ zKlmBTU(OC*I72XNt9NY?xT>iBmP-)1zr+b1rU_*PVvzuUBZEh#bHvHCjTSPrqzfs< z(?p~_O40~*pCsa%h%+%u3n!VYdgDZTO;FRVwP6yqVZv}* zzu9i-zdT5?G)v=jx;)P~QyMz!c+Cz!fwwjg)dl^R?Vjj3GrPm`hpsC}9N4w_U`-u8h&-)XFk0IZsY? zaIY*>qzk=+B#tnO+6sX-O9c-i7PbWrZ7%V|pKT~H?{2rOewcB^nU#{c-|6>yQVJMM zr6g;EK!<6D={(TyuCK2<&U-f#q)t_!H)Sd4%B!zvO@h8o%VakgwZIeb8v;4a#Wg#Ap z6NU)*v7qsf;xRf3w3E3*LgCjzKo*aR@?#+81w$O#RZfq^`i_|FV=Gs(IXEq|f9iZnGICk_ld}X+9H9_e7m!(gUa>}V9K31?$a^KP zJ)Fo(5>14lz*sFZ7mi!bT=Dk}BkTkbgHjkVN*0CJuzIB&sKf#n7m`E*^J>htT0ILE zADc-mmvyrAD;%4%IMp3~@1EX`wndzMy+xMr|L<@V)Yl{xt68V*JKtT{e1D;`!@%hk zv^>f|30{wSu&?fyVp-^G85$@f>%Tp;&A0oG7|`GjUvxD_>5DPaf78GBeD@^G&G=4}*(ieC#Tr(%d4-mM!7D^LABEhA)5(Rb)@5sD9A4^hb>%=-Gm^jY_eN$= zmsUOcl!>cqu=Y4-@%I+v@$w#Zy#wPO`{^5kA} z*a*M`O-A5ubJ#cy*guM#Heh$Z-#d_eU?pg&@Ihh{ifq6L#gc!1mfnH#Cb3&>I;=ruGAxL>7sC22o+BIJY5k z4tsz0ns@tkdWFRY&K+(9(uGM0A(&@sj(tiKK-F?#t6s#ZKGkP3J}4`PSLpt^!wYzq z?5g9|EjYc+CPso7ou%>^rJfih%{dQ<*NM5TO5EvmjoC~X9j9q@XOlzYuxfG`Jnv&6 zVSwM|>@YxYG&@Y~dv-HCdD2pOz-h6`DAS;eGj!Z6lWlSoCc;^rFrAVqLK#Z9(S{M_ zpwz7_DP>#({T>$umX%vtY7VWNx||y-0#BbFH1=0C4hf2ApqV~&@3ay*$6x{wq)R34 z1!E;CL+UK``?J^Q>OyKuC-5 zs@SY!s_+AMElsBBjk+c)Htd=#{7_x{)8pfRq`K>x%cQzui>!NDy*RkTviN3g^m@JC z{@$MWx7X{H|Lq;@_W#u18w>}%-Q8ZV|EJ!d*BkEt3H0u|v%V*%43adK|rtABYPV3Lz zFJD@pKbsh|fQ22&fgQ00+o`f$0NSb!o&eDKAnl-OoQ`4K!Jm%#ic4Q3s0tF8Oc8jB zlL&p<0Z*|&boAU*#-CnRnsIKT1{_km-EP4Qt3}rc1XqW&6DGJ5CgFrH8W;Vbb%m2? z1k^s%k+{8^8zwJI{@d0ZF(@Okbf7c-)c*V#JT2cvEM5wndF%SN5|u_s++M7D^5x5q zqMIm*bdO7aa*8z^|GN3ljb0eve9qg?n)$zXaB$$x|Nd~ecknp>AL3ax86^)m6R?;< zzKLfQkacT6bd-gl3p`aRYxSn{=()(Ftt*);EN~)rer;T1JnrNS$GT8QfeJupy9{3V z!xZdNlO4ItYt{lUTC}qj;gEqqE-`{K;O%Wgz^6Ew65hU?=7yL$ZSWOZ(#qREq=(#s zBDN7n&q44sNh5TLv!Ljw>fqkquGM$xcobEHug@wE*-X6e7VlKUB~W@CWgouqg`WM! z9#Fn?a^&!obYw)@7wtsTOu=7YWO4C*lKUF6(6;yo)WURr`enNun#w}+Q8Q0fmRvcVXK8xHA*xHWgGE08!LdG56WHwrMU9~77fKje zW+^u`c*m~MSom#FwQE*MLoK`db8opaA*%vO^;$>>3$i^Kp0BE-8&NFjp^rUhwv-5{ z7VC&Sdv=euZ7wMxbOSgm*b7ep`d!V1@=UP4mjtJ{-!9PG4S|ELLerMN9kYQ^MrVB^ z_9n;rhBAL6zGh^3EhvLuE-p?>5}**HN{R-a$?HlN2Qhoxs?w9i)a_2GF&eBKJUx0a ziNIEwOT}<*gDvmaT1-)rx*i};E25xgG6`vC(LjkrA7Js#1DKoNj{UvpD{I@x6_0H# zfws)Hjlcl-bh`K+fDZTrBzz7f4D9iSHN0ZGj;jYV9->on$H%CRKfv#K%G99CO+itI z54HPEc&f!W-fQQZ^i+Jdgz^uIQMdcUV)Vn}hecqaARCq7C7^8^)as={d6iIO|A&aM z?j`@P^w`{LA+W~&AM_7)OZNZ4;9&4*|3AdD%KqoW-;uEbauFbPwUrNAn6j0*B~KPi z@;K&y@j2GEMa4VeGEh>0xA99FM~H|*Ml8-C{S__i3kP=o#6ZJSoxig>I`hS5_ zsIHNY-3B+3_@|)0xXC#UwynhZbHXRZFfh2LL4 zYxMu_V1K`)|Mz$MyN~++As*rXKSPXQv_K+cttT?jo+Q~g6yxGWFtzq#VF2S!SB5&W4t1JiIQEN$@35f=m&cANu^DX>xv z6*OK)yCSajhQzb<-8V@Pi8>La^-LGwL?$4b75Azb`-p-uq$tu6z48_a zB|TP2QqfkYU^wsYv*b~$l-YgMev0m&!I8Muv2tplh=x^Br$tu$;*>oQ7%GQHQN!=< zDx=&n732z^tCIhQ^VoH8SzsOKm9ZGC&Q|dYM5Aq+P8EQTs#8QcQRp*sxsExSqfZ)$ z)Wi+})N!GPy)S{)?!Thr3Y^DfXSqXqD>`9~tg2TefG)zv-9c0(HtoX)li_gXSSskN z2hzSRD3C2&p(1=hv2dXMSAof=6o8=3UoSKMTApbRK(MfIQy6ToqFPj)3_7mDqSVT1 zrUM|{>1M`IeEd+DJ?r4q5Ud2LaXUb zMW{CyEa$S_jL$z=*>u=0apxk`(Ld|?TL$=89|W51YHZ8pP7#jd(n&?UwB1c)L)0y` zZ_i7qK$70J#i5F0WnT^@M-ySZDdad>O4M$lw%w`4UK&r+FNorZEoXu2x;0%oG!W*VXfa&RIeA z^JkLg8UKxv#mJ62SEtKX>lt0hR`W24Ol_gfieK`iw6%YW8PY+u7`^ z#wkr8jzMrL_A*T>I1ad595c7lWB5)6)`lplzeEbDl{6^@@L%nKrwi#ntMvWK)8WPX zFc@{NUqf=v+Z#ST)ge4LH56p9k8|E%=JF^yR}Y$(6z2~F1~px3gP`3O#sL5GR;UK5 zrCI<*0uJzp$(vvW42yB~nPgU;TPvxD+V^Gz&qdIe{Yk}Z=|$i`j(lk-@dTt~1-?_v ziUnNLax!B^)6#0i>~N)7(FwM+li`vyW!(;?v#v~#Ay!6>C&GykKzqqau&bzu?oz{-d{x0bFDM^#>LEueUqwJ=%W{@fiD0=a>ww#E^2_ zsj>cK*2T@NzluAs{QzRzb9}E+e3x%`zZ%W>n11JF1g`BDFT-KUZKSJxHam;CSVRptM|&R-47@A}nWeU4xKZH?R4E!M>8>(+2x zz8m{|0SI9R$2i6eBPAVS6cxF8-@d%KJbLlw6p8tH1r!M}_ z&T{#{!GF5xRiS^DY*-ce=gEP2w^4sSO?S^Re+79~M*KB2#_Q(4&ig9tKY8Enz1e?z z!$Eoe@9jO>e-H8)`_Im$Ji*h=eZCq%$1u#Q32aJRd4p-A`yxmDjIr!879pRPGA+cj-l0y~JtbM_ew1H?#f#MiTl|^e7|E`7 z**xo-@5QY|b+(8>F;1_rwu-_Sqr{{^)>$Vy-b_RQ(2&3kDH&k-xV@X$R(n&E&ZG_g zk&Z9TSUKh>5O=EK(1p+I$Y4PyS$bPsq7lzhTBMk_UGMVwM>_Vk!=KB`46@nfrCM>Q z93_D_hs(c>7o(BD;sbry$S9CqB)}y#B0bQKV_N z^;*At%(H;x^tE`s@nO%hi{egBeVVQ;?(3*$N#)=BfzOQ=uaRbCU`>$7?|NZ^J z@X`PCAWxnB_u=&IS1|n+S>jlIyiA0t(vu|{P;lomL#~2Gzk?vnP$EFBu2Jj!m&g=Q zfZsYX?OkJnra2^Qaa_})4ad`FC55Zk+*o9ZHZ(lQ6qnjt2~z)k+})2)=~*TJ)dc8X zO76V3_5YwZEZcvB!K3~6AWxnA*T;e6&;zXmpvhWNT2IHAGLTNZ>*^LvB2g21P8V?* zDxJ?0+-P&bh-LqhKh@`$?rFuZnt#9rzv=MC>wS9r#7?@q^sbXRJ?ffo;%OxR?>Ya+ z!Tv!x|3`oKG5_C#JeBjGcd-5I5s}62ulnfQ{8gXU?EN~Wnr!_#6>gX8V}rnN{pS3? z&oAG+d-4AD%MEsoIrYBJ4P(wicePinsBr(=#5J1?y!|U2$LH6Wg)_IcS0`sLe>-~p z+HNg)_cpMKoV|O0@$$0ol;|G}I{p1luhZ-H2SE$C_vFd@N+mICnBtR+$5S_s(#w<6 z#h#0qZ1(eKVR5MoMF&2*)C{>95y)lPE1`2^;_rKizh9z$|0dM0=hBo|cYImsX|bDAL=t&#-^y|sr1Ux^ zk)#Yt7OzM;m$3@cf;&SKE!j5q$!alg;a?4jumT_KP@Te?(V;U)P}DI6H6_(;{o?Bi zX0^N>&M+AtNhSV*+dH~ulVAs4HpUB-AWBb3Iu;E%FPg?XwAZw9KhYG8?7#cX|IynY zRQCV(29NiDKge@G`9I35#`aAUax@S(Pi=9tL1g#Sy2$Pir*AKh-e3GuxsFdLmnMR@ znb0+NC4J4+@T&Q5+|jr60Ir??2bKNb;qGJphX;A;{C~gcvA+`!pb{Bt<%YEZ;`iJ}j<0X~9z1+jw;P}7x}))LIR9_u0b1+-=~wQ5*xP-~|Meh`(f`HF zx&sf8cj^>AAoJPh1u`Gk_<>60ns|arRW|Vj4fhXA-XQtr*8ZSkQF8wB^yuv9;@z3! zG5Am0rEqe3arD#cm*F4az6zWjg3uiw9T`Qq)%i{IXz{d#_Ra{6Jf!cJBA zCEEY%`>Yz$Zofpk##C9)%-@9{2eHtyU#_RUe;bd^W>3Zb6L&jwFMml1{wLSn@o5?z z9Ac*cQUJj?&XJH*Li^4PQ-Cau05og? zQgO=%1#AWxfCPb%AjnYE$|+8!YQe}k4a9g%AX%<7BIW%evkcl7hCG#L!Z*5izNpOK zZhU3EsyoY|u3EsczFQYP>bqYuSPB!=_u2a|M6u8CJ2!r6K-Lv9sl_nO!3w znz~I&UT%5vnxeG}!Ezkwx{OslfP2&-m0{#Dj`O2Xj6Jp!t?m_{dafV|pl)o)a`Q$uaI`=KPLb7!hg$2f`0S>= z@b=^lnx|xWmz|jlh&Sm^16-Qf33dAa_E~?5XPy4GZ4lm2hr8z&Z>`Cz$05G~eeTkxs@2`^H`DD+vpAI+Ghk&B zgE=BoR9u-YwYQ~@A{?@9uQT7?@6%rY?QO?Skn62123y6dYrDEZSW*+U$iXB@nUKoO zFtp11(X3@B-=p7vYTciK`{k{EO zS^xJR^FKYzv$6g^QFq1Oi}p8Hir$g#SMWB}{PuOYx7PdRyLG<-t#4DMs`Kry4K%)m z;M0uYIV8(-b;a-KIha~I;QHoYuad^&PR?*#+*T(+l{Va;!kneAadLH!O(=b>T3E$8 z;C^K25HGN4kCuI&7;vGYLvf_sF_+@5`CbO~+}iuXpV~igZm0vYU9n<~ zQox^3^ae*!jIJS(;ydu8Cey6EDp$}#wiN$e0xYJ!0#s?!k?6cd8SZVp_8|J)+56i8 zVmkkqn9-H8W!hD+3$F4pA_-!Mh9n9Kr(t=2y&*aVmD@I4tdZRHQfV0Hbt70FmbrIC z<{J*iyxBO+R}I1Z7SykAzn1VDG*_j0NuYX$Ur5Wj^TJ51b@cLcY!#NF1s|1FlW0YQ z)YsT{rN3q0gFk}UD+r5fN)$?`g)(<*To$&de|U#Qb%WUFrl>d%0!AR3;49Phg0DI_ z?UFQS;yPwVmRX7uMgzwIU3{>w1HMLM5kRFQahf(`jks#Y=7CDY(8Ks!ZscIm`$l#w zmC?wn^PS|5yCPQ8ip7xvsRkpk?V2Yi$W27(A2B31&SxI!-|0}Iv0w$)CR0aY56e7X`e`8NO zXGjE}bj_ z1rj*_>;qfD41h5VuTT<=oR{m7kk=Ssd%IFUh33V4^OE2&`|L^{wbpK!fV0Zs9|L=o5 z!vFh|XZJ`4zyt5?STulMjOzRCpPJM;58+`6H+*Qt9qKHnh$61dl*f^PXt`5aAV9~ExT2;~bRu@>`*FLabretY! zj$#zDl#HrN2ZOL%43t8vy$YnpZU+?5y<<_4 zIcCK#cd$fB`L};DVwdByr*d5sOMxSes1U>xXmNpbWM|{bhhj~Dv!CKLysG`s32{W+ zuL9z8aWO`*SW?9cQ+3lcDA<7)vQoivmnO9V5I~Q$OpeXA{97>lA83Z zk+F^Wia03%t%2eZVEuswyGr_X=-Gs*;Ankpil_~5b8K(GI<~NH#57igD!WuZx{Ols z3?T#U z*|1-0HZ)XRI`+bLvien*Q?e}#uZs5KFCX>SqyBo-UyY^DqyBo-U*EI-dPw#4`KzRW zs`LM5i||fjfB)1V|4aX%eEw&++j~6!`ykK8@xQ0~R6mpV{v5{;&+jK1I9r6pZ6F@c zt$po9yGQ`B+G$(kvMs{`weDJX&N|cgX|@PAc46O*gI7V}ifzks7C9w@c2Ek0)c97t z!1~L|Cd+gvdShbdQsV3hms<4~E1(rVWiQ*6&l&kW$+|h4PAM^M6T~1+fX``L?{u}g zsOl@S1~U}TJ9O67XFl6%t78PN5XxE}RsL}PH-Z^@mxL$~Ng1t;dnYFc5SJYxDQDau+lR0!W8)hGg`1QlomD^`OS6S>2o8bZ65JsKhv4q+ zF2Nx<1lhQ|y9IZ53Blb01b265BYQ6A{%`X*-96LYRkglVMbQ6X*r8UjT|_>AFLB}v z{c@OL?s6K(dn+-!PNu)8q7FHCpz58*MlO1oBhI4zb8acO;{6I`M`sGKOg?3=1? z1RT8fgKn$dgUD5))brk;py3xXvc2VhKq<>(Ctg^dufYJxKj+2csDs69w}S2J^Y*#@ z@J)XS%Y-7E`Q=g#hqM#Rg%nby@i0r9<{dL>OEEnB|6n9f`K#L}yVt*`ATRV2=o{b) zsN4gVeY=2Tk=&U3-l+^HB?Nz{9_OWLL2S<~lHQxyKQZnvx_Q;G;YLp5(;|JPv(8@CjN6w71FuT3g257ea>NI$?_R$gQy_K$CZZOKfYT=W>XjU(%#P4iR#wxg= zq)r4*AN=@}Dt4_XshS#UeTF{8h2+=X#`BHa@>+{*a4CqKMzDY*`?F#*ff+$HuMNwW z*=$vZS2yHedB&(om{>uuWT`x)9yf5en#y4c9c;1lr!Dfp=FlX4jIZSjC>ti+S0zvL{hHGzDn`Ze-&lNTRkrEkGPKt$VOn7 z`T!q7_;=O=Jt`|P(#c)W3vo@&OCw7?^npZy zhNn+ngRa~4an%=B6E?-msylzbv?JlF-@VcBz{!7UPxBstdlHxG9c}7Gyhtj zofl;Wtv`LHt;0whHFV4hDt3;h_q5M|?xP|*`bU7YH&l|9ldsm*)cCyWVZ&QZP<-i! zlQ6C?+z}E?j~PC)pBZ=9Y{VL?R4t(P{D!1YoY&%$FfI{McuQ(NuA|h2navf6y!c_8 z!M7z?=A15~)tV|%q;85(>X(bzQCcWxJkopDzfzyNl zS@KI+s|#$+GH`l{F$U=k+BSP#>K7ma18X@i-Vtyv;EUDp55KYufqjI}YYT>^@CU68 zrP>~}_}!B!#ulx)=y>I`mmaR*w58yNRYy-jW3kJbrTJ1^FxjpXceco%jx^0_hhnJ3 zQJ~LI0&@ADko%b~rC$ePDsGxwnWIH9mR3D&2-Cm=tvbx#3`HfH++>TmA@hF!0ftym zT4FN?%Sj#Xi|-pfRe5(nDeWh-yH{gk-3SCSoHn}I2Da)3ib{PN%T{$ltxR{oC+VyS^| zMBNcsNHyEv7!i)!-`A{gEuOSbO91)B5nPoBDCVB&(fPaGfIJ@anE;HRap3noCgCG* z?7Z!jt)S%CD-0978JwzhwFKR9Rp!Ws&xsa1haQ=gmiXbn8gtI|Svo5d3up#=y|n#V z0#ja1QDjsG?p8#oo zr2x~_g?LS=?eMqh%6NQAgd9y@dIYM`SWCJtcB%sTme#d&x~G!ccnh|v^d`6DV0=fg4%eik0}EnIGC5Nu+ej1Uv4H)M>8@+M_VgQ-9&FV zlX<)i*#i9|kA#YMmn%kAHlEJ-=_jcNuU{#Zg_)eQIo08snGl++xpU7F_9lB)-k7}7 z)HJ3rqh`K$1TNxoOR3$($eT;>wNVx#H@ETfw%Na7+{y%agvCMf5WNQM{J``MU{1d<5xxgOT z3HsqA7`k|^e>MA=rnQ4R+2-r$F_s>Z=mU(+UtFY!wV<{3J7g2E50BAn4h0E1e^sWP zF0?Gw;KK~sb8*9cH~qHa&=s%^wH#Y1HXiYXng+t2g0Ln#=sYfaxy!Uuj2UQF%5cuf7 z#r{u!<|sBr!pB-Ft+*@blz*2$`24C7MB7Bk9iH<=AGEW&lCoX{o89K!fJ@4CeSGj~ zKGfgl8*OSMJ*9Q1bQj#`y|sdN3ENo?6RLOb1940TSj8{6EU6j8zY4#wj*Z?Dhy*wA z7)+_uJ6^Pf7^(|`+$k$hp~X0qK1SMXMb;i#nbjqWgwl91LA{XYRl*4VbHDyD@a5m! z#}oT8C^!`SU8LmIwdVi_L^pgem236bff$i=%c~IiQ8M=rZfxrVSj!sBz#c6FZ3zLxL`|suP@)V`FSjj$hm!roM^v5c{U5bk zw#-U=`O9W(X-?SP6IX)sP*n%*=AH6r9PbSK`H1-+x7+bqUd57mX8bk{&jao0?yv+7 zQwxXZw(@HMMbrwzlThA!=6A*OpTobQZvRL6yhQ(FOt@bjGF<|4Y7fZ6;VkrGE>d4L zD)vUPe6wh}WStJ=J@$Qoo3s7dsBsTRBj9m=xznTg8vR+M(%EyrG38^o6<6?=XYieG zb3`kdqG2|%!TZDtfsgOU$MIN&vWa^ISeqNAozyw@^;foqy`0={w)dC!uV;^Em1t{~ zSQHuJjfuT~aQ$F`lrGO0yehecS9E;US+g(NpAUH%oa^T?3Ggl|JKLu`dL;gc697ex zB0pz7#n}ggjXGQ}=!I!ECd>!zlCEL^D?DCVJum9IR$?=vbLOELr8hEdQnIbfGS+~o zgBuT~hw03smOWO}ClL}qr@9XCm6&UXU+KD~O0HYol8|M1s1rc1!RjEr(e>=9%pJq| z)How{aL&#VCv$kA;$6nn+CCUp%2>}xljQj5y>QGujlmhC+~7HxvA_paXw;s{U?h7q zmuNf5iij3vxxSO@kW8M86EMAoJJqnIesMX28sgc2gXT^hE+gyjXoyf5P63e|-AU=- zsop_A|6t0BLjPCO3r=H21-xc#q5YL+k*ABjwS_)gc$i}ymB?fx1IA`cfZ$@m9Ki?v zz3#=$=8{>rx!7!)rn5eiX%X&HvW^#^#WW|O;)N56C1B)4F+?<`1(kRVY!-Q$_N(2l zLafk_@X!{}4hjFt@JafuDM&6}yyC+_~nhj=(FRcjPTFN+y~D&e06 z_pab=sO%~ly{vW&z?3o575;gZ0>>a2n_J2MX+W~F&85K9r44L(w)%-lcsgLh*sQyv zkb;5lQ7zr%r!GUWrinu0XMv6YU_G}PvdI+VKm^k?1gsLFGamLnzis~l9zT;F1NH_J zm?Lx29WGz`tsDLTtJa)uP?px}-uM$wmKF`#pR2|$Bh^_deWVx8Ru|rm7u-X*%RMJ` zD>^h&nSXw>%c8ijjoVTej{RKBXH|dWtOmkEv!oj{6PGV>e;F*9`A%=)XwfCeYVu}x z(YBY;lu`*e_=j0oNPb}UaX$##ee#HGbJtTaV&Y-AU15}`dqHblW^FJZWvVRSnshS_ zc@vM|3tW=<>Qz+pEWuVOKX(Y0#iH7lxADDQJiV-Kp)M=%J$A_BtylZL+w|CQq;X|In=Wc6J=ETKMN}FwQZy|;+bq#-e1@D1x2GA28e^^ zR*4t#ByvuoO4wt@#QZFBp>(Ilw|$VJjZflQ+JL#QDx4eSHCt zW$Mo3CQ~6xM_W{j=}NO0F8-+p_Z3Hh)9^3xAbv%5`QkLc{%0EN;HhfyxQ9!AI|N-` z_xnu`q}*a1!qWMDFGAeL49gST*x`B2Y=0ThOmyRsqhVc;tukm-IP8oJBGTmR zEBDqO$z##jmoX?<6_=5!)(Rs$X)_Xkw|T7Vim!K3aMTc`jfz`bO!n^BF;Lv=qeU)M zPsih!hI8_aN;sLNqSmZ9MgPZ6{Tst|_!(|50M)B%VpV_v=10mR_i@HsL}RtjYNnzC z_Q|wE&sm51a6S$dD^p8!NJ%>&SW;@BkA_~yjCfJtfiM1322Kp?2dECcqFn($2#r({y{(Qd-n zCB?UFh5PUa@l3tY5{gf=k##y)^;Qf{wl6ph8PR-fM0eD)6?frBDf2KCIBKDZnC((m z;`niN4turFG6`a78i=l~ds#wIa?>Gq`$KzOK5+Gg{jvt{I;xBNuqCE@D3{dl@Uc_d z$Yw{w1d1~eJd`5Jsj3sIeoix~C=57+Jx>cIC*n~L#ZUbq9$pY%V1+mWH`f&-S3zi8o(}D| z0@G^uZWc9b)du3>dpQRJE-2(WGXF3#$ZIWbjkQJpMDF_cwPEiltnrTTIJD7=khd)I zG2a)#)8*azgAh(a!qDy+RMRa%ilLMR8g5RcH?gOp3Y68vhZwR zYQ$C)4a~>?SS34>&r_MD=g(q2Vmi}<@Nq?DpU>s#n7uSy-_YeLT#yX?0U<1GD^3W< zPFz~{X@(uer*6{Ajzl^KF;bB10nzsJ;_UW*r&e{Q|4@TM{m-3dTZb*E->9=A{L5?5 zSb5fh?m`uK@cyz98jSxC7d11nqnHwYRJxWS|GpfbeyA2iTLc|HrRw}%tODFI+$+JG zh=}iEhcM3~Kq z6d`xcr!8OSDoP*3*8jBj)-QHgj^+I}v%rW#aWv>^Y3)|bDGj`Nt}#50vN;`(NTI=& z*kI722Uc}<#++L5S{sxHZ*^^^927w4Ft%?CuqlxYGs;()F5!lp1P95*x6Yw7e^)HqKk^zo?$BLWdct0{2t$n8S9x{4D z-(P~B(Za_g|NCu_6Vs-g`T6&sGXb<(%|}yenVc`J*^9Z0sA$1SdTzhHe&Vw5H=creh{+VKNfdhVJ<3q38C6rO*1-j!}dw zJfFl)&a(GZ1ha>1^^$Un?`1I2^x^ne6@wTEI5(iP_*Z^StP}6*fTSY~G*B*Q2`8+7 zwniv5b(HzU)N3DXl4H!wct3rr#>PjFR{6#ICk&IQWu=T_)-L`IIONknkJH}$ST4CG zPHW^j6=(kHzF$;lkeH@W?m{j1j6_^+`sJQ=8E|+mo@+(kGlfil{pH& zA~caLO`|pNdDX|KXi$wd42HExZn~fEkRuEjkU-5jh|V znvDHm$2Hx+t=d7Zv280Nr?d)0^8fH7YBwUHEr88_sU>vUn0YSjXzWbPBvZQ7U<7cTLdw$2OBG#eN~_{n z5dI&RK9J+^T>Y_ZSJ#iLj5qR!;Wgf;0(Jy_ayf)%56Y!x;cKB;TY=$})l}b@^gliB z14;&qX_lkE%Q4JUa1>Y5ut%u{fT7Nt`l2WVf@&#k|gy9tvC* z)vG$^gevr@xQI~wcyeq(C|>p&sA+UC+2M8z zgiaEEVea=gE(X6FkJR#3x*V{&iM10(GmYe~#~q#;)TD=45qo?l9b=~yV+~(j!Q-7S zwEI`^jxFgVaE6S+jjo2HlR%S&=XW}Zf^v#|wVGvKDK|V!)&VlDAxBA8Q)R}UWOL?ai zqMyq~OeB6N_w0@Oi&s&Y|1byfT<7Yp@!N_K%*<4k$CS3u2jS2p`X?jUYaz%ki@z#@ zjv_EG9HT017R=5zb6LnC(zA-DNaLvHE{iGgp|Z1c{wu(p005Y@k=#qrr>~%X5s7!z zKIz+g)x~qKcPc^#8V-&|g%44eJ)D`Ynv8A!;PV1r?|}|gI+8@X%DEu+p}#{u5v1Va zmhMkZiN5lUM1@lu(~1z&*y8{^axhzZmQ|{Ir-r_uAWW3sDY8o+Mbb?3L3rQ0ml}0s zSIZ)@QAKAH&y~f>-H6$2y;U|=({F2*xUrIBjobj^Sqx!vCnTR%0eG%_;pzL**(V&; z3YgtHIhL5Ur3R^$UUL)WfpL22>Ap|Ook0@y=(Uc@Y!#GHt6Las8=FzeNKDElZ#2J& zE%pMm9n`BjxcX-UcAJ(kwc(|hZF2Uy;6H%Hv3Yej4qVvIz%skcd*{^%OmsnsGn3f* zoArg9Mha5B2UMC(Y$_VP!@nFJ!v>GS20?FiR+XBPot@pj^{0lpW+$7EI9Oha3ZKsv zmojx($%D+Kv1WFSjx7{-sES>`G6Af`*8(v!F1TTkEp3z_R=E$m4OPJ%n3gc}KQmge z9Y`i7``#!C!>FZqaNoXZ#$qd)VPLGGrFiPun<#6aC}gP$a2loRd93j;TK?VmA=aZ58AK5o_wVtSQYw zNO}m3S#Uj@B0`<_`a~JJ*3wfrvWe;|NN@1>QchpT)4p!%Su>C3R47C07V`cn$i7PT zK6(N`zrf@xC=vEz3OF?Xeh&uJq4NMGKiz#m?X_bCu*7?R@_u|c^mvy5j<#@J1Lc}V z#0JD~uC9tU;)GF!FPD-Xau+vw0Pybrk9aS}2I|XqO z@}D{^E9NxT^dW85HS;;H=d>PqEcx1h=++^#@p1QH)r2(byL&uyXamQ#z7A(l`iH>k zxyCCf=uPTBjbqF!XmC)`;{c{=4Y&E4q1GSMzXEYK@Y0FmlabaFR+MO^LBzgu2=_I= z^KW`7y{*YGLZn`zk&?7@Y`9<4R=tRZ?`EfjzBl_QR?`DJVrb`StbjFm?l%aTTldQM zWwvL@k`fFOL);<+_ihUPV;luUKu`Fe}3A7kK8y+5POFHlE$#p2^XxdvLk z6U+vselj=&)Q~trN+A01i}O!}O9p5ixK{f^+)$_eFGH~+VqYB-Iv}+Vs5R%M4)+Kb zeK0NEkfsgv_f+K+vTO5t-A|H}>eZ2#Ma4N;?F@u#d$S7^4?EfW=ikG%Gil9=Z7DEs z4gw(x8DSGA`D)w(O?`!@fpO`-k0?6&e)<9BJZ78QKw_;VrlYyP1G-y9%#AS= zjnJFp1VT+(`SBRLBwIIpwhHuu+K?k~6doVTK-CTv1{@CS)HDs!p%JHLm{D+-bL zeCZXZdD7cBu1^u&+=ee9-Q0_GYmz*M234ks!0Rh4a!Z%P6Eu{VP7LlKv})Kbk#x}g zErv|wKu+Lu!MEu{@Vyq>&$uR{>wjX{CCW*6IQj!C(}ks_DRO*!`$s!&1laxkr$uRS zp6%_L!dIWR7cz5US_cYami7BNx=!ub@$-DR;IS8FQ~ucsWuX4S?cIzlTB2LuE0+M} z6WFKscPbbOy4YP}{1&#$QsRsYx^Wvj!ppBna&G#$FumwwUbN|_kE5o(&j|i=jHJy$ z$f;kc{}m(qD-D&pi_-*zL~YI10UMjphn+ktc!2KRhBF_7BV@CY^Ho(RPxbQa=9O+a zj&HtK@rk=jiAuui4lfDyyfc*KVASg>GKucTjcPIF;%1?7mZ4mGmuB2{>zW5py%0CN ztV&Aj!x$IDuZbS5fp}bO@~;Ppa=CtvR`&*#YiZ1C0ob}Gyq}7ody_?(kTS9Xi)PsC zmzs)6EB-EW$I5Dk`G)g7V?U* zx-n|MU@{Ve#m$>v5O@3bp-mQ1`e#)J)=yiQK6Gu`>wUt$-fpq*Smv+V^n2_8EBdRT zbT3SGzVuWsyM24qKP9ouuexZ7^{$>&wEd^|*j`O4kA*dIA%!sux7S_qc?Es5G~})o zAUp$+#&~P30#TnHdlhIUA+7xPmXKd>?`nSj7o*K<*BIeMc39~FTi8+Z6U|0_(N_@c zmAd{Z+ZL#YCK&y0b#IAMR?;u$6_P`7d+RfAr z_jFxbn0#lh&Xl54DAh`#a&Ju-sBoY?)u%pmS!jj@QKPBal$o;Hr(CCt^P|ph>vZY! zUrM}j&Wr+-ecs71xzI3%zi_9lI+6~<{i6)8IK*WlVWd?&ky{90QoLkUhzswWi6jb5 z5PoEc@xVHG(kx(o6F`QGojZt z9`se9-gIMR)XcOJmJlXhDE;9ULc1}l*vQj|@F&$D19{Jl!>{jK0^bM#+ADz`p^Fy# zt`@~P*EF!tpvv6jY@`5<(_AIGBA@)@LdF!ckcxueDX$^XsiSkq!K8fxh70i-{^=PaqfgHq-yuOB2*CDx0cGdJ7M= z2LrW3SXEM)PuYcEKloMERx)r#;hfb1YBA&q&SJ>dG4mxD%LT4S{mBhY9b#_SR(4fE z&iXQFPlH9AaUa=+{Z%!@Te&5s47J@x#2dF% z)dns_ax2hiv{ABLN3V$PsRysX6xLf0XK#Lr)AcrXxq$tRXKV#?5T2(HmW$S2Y67Q| z+lHv+@pIdo->W_*WMmw8{KotQ3Y{Y&&Q~e}vLK-8>!Axu02Dqv1nd`iU_smDa7YI* zUXS{TeP2)~&}!iKa|i;q}8iHnL*b_X`daFn@sxUz-bJ$}UW!XUL6$UC*32Bri3 z?REumw;rxRwW`2yjy&0$5XQ~fHsCzx9S%*GHtuIl-fPEI0G*1=5xB3800{L6m_U zf=;AUm*4Y9gBIFhKYcc_caQ`$OlWG6Fmd{Epe4wOOpC#Q%T?N0UJyVC#rdOl3xPy4 z(%l`K#b#oR!~vVCD}+Vx$sckdDuxN6W4HiY?*Pd~UAgD)m8genpxz5;<c-`KM!b`)P1=qq9IzcQ3w#FBxwd+ zk7OwCr{1q_3J@We;aw@n`(8y0Aq%6Mgu?mK>R=Nd zB7aGg{3`EM0vafn)3?WsD!6V?G&GMcF5)pnE0Qt!t}{!e>Zs0_QnP{A95$wq8>@bi zN;d$~-h6H>%bBYK98Cy!J>4FWwtS!SzCOsmIX-9uZzj3uFMw1%DU^OZbBYWjeFQ~r z7mSuSmtRk&d6I3LjWpn;fVAE?YzuvILaGFCxCjXb;#ALsIXV#s_OZPk3iSiG`@?o< z-J^G|zn912ENhJnx_&w#8{+xGelDaC+CQ%Ch52?YZU|3t@ya6r^FgV_yp1|&0A~x; zoP+wBVI=_P%MF1VGBh>R1}3rQFgt8|sb&e)8Ujude*P0eDb+@PdMr8wBQ_1Lie91N z-P9o-ZrLip8kIX8ZK{56lx{M1Y0q7H^g7kW0eSZaT|Fv6YQaNsuKTU`*W%&BzFb`h ztNG#e^s@%1M?B2?qzmO{+zXK`c}=_{abdThwqkQwdURu)^EPrGq0U$E!tH5ZZ@cIH z*7yIYwdWH>z)#${Sdrm|LU!n{ATa>Cx z+!ITBnam%08;pCYOYjfR7){tkLov$5eT02%O?OYHq)<25&<4^-I*3dpjxyo|!7-6O zBlhd8)nT=It*8FeN48#A9Hv$0rhfKPk&Z0IOTHiE_GK&x=qU3?ciPh;VoHr*y=DqL zqB`UMa#JGD;}#MhfA&P)*yS-FLW|9)R)16&U596HY8N@?U8Z7_FurQ74LJ4Oh3=J> zuTW@KM!z4IRj=(u;8>>^4^9>^=A9`@_yKManv`+0d3rtW z@L?IKvCRcKFP>BY@Axp6%tktjR&q)rIL{CYHtj!;R#118_=#-%9J`2%uWK+}o-WYr zElgL~i1B*m=Ntob<Ug3LPw@*OOF?FyuJRvtMU13@_kA29-+t2%J>!4HoaTwQssWz4@N7GYbugzc z`zbLmM!IDlvu{0C^}z6aBru&NnEM`^&X)oEGRBXkFXizwzCVoyc^jk-I}@)6Ih)ep zLN|XS4MEG=XKn)QXr*3&V-l4p5sn&uxAZ92u?KRUCE%Uw1q2;FCmruXK;cqn0F}wO zUJ6jH*jd${Jl0JTnDW%VpIiHz2&ew{`+B2pkfY2|1w!j4(TUTy1<-&0DZ9Khn4{Vd zaMPt!LR<3DTLU6`J6Di}*WyuWuIF1?rug)kM>dSEgwBF5X%RL8eYpAC48L+mia-}T zPF|);`Q^VQ-vWF^sdgOIyYW;Hn-nDpw0OztnJbN@GV8FF>H9DKVa*?lzZ0~fUlDJ` zT-I~T2Z^z=Y&M<9L7ZB1amHmI%mol?zMdW-)oil4U2NH9;f%NKO{55=X(n>b5Ei4! zI=S@)h^(hB9eJWo1Nym=V35#u-pj6#Z!0!%j}L&^Ff7?Nf4PQu>Vw2#@FR%$Z^tT} z=xVO_7$tg=Dnx%F{P-o?Y-01}mU=|>AujlpOXv+1OLj`8!PagN&PgGu)I6y9y{pE4 zKCue0A9^pyr0dv1uupl@k0uM>%UL!zn<9M7HLRymCRkb$d_41s5~yQ(KZy|UYFYq1 z`&ZDxTknP4nc%^HYiR}aQqQ^vO;Lt(FP*q=dEddWsrOlWlfb&gklvUdDIJhmtpM`e zld&LlX?Znl3A%4lW};wJOZfoDaomS?Q3?8A1hhX{i?5Tu?722UjE}E z!fAyS90FleqM-`SQC$?vtThnzylBuO2zodHK2iexx9_MZ=~4MQFes3vXSAqs*>&nw za98ri0_CxGq9S5>%d(X3vATt&&vD@>5&)m#s}&T$;AYerMcH=L6mfag^bcq_aaG#h zqyfe!fJdKA@2dZ}yB6T|Q0IsLNoT5na0*jvxG(b=!SLtjA8gsM9Rn2hYwuj7YK&?h+>D>xV~uw5 zUz(+$jpP1khb&6!Fx!gPwS5}@&@Fq%bZA3y8H^gNsgXQ@;&NDXyI(dR z8LxqhUGQ{}0O!l*8ra~m%X)9ybD`^N78t6u)O8Gd+?G7=ASD2QYTL-ujUHN22|TUV zi|X*F@AVNb7W?G2;ED_ueZ2qhS8w6WP{bNk zXXA=-W*F|tsoekq%vomeq%y~kb%|0>9|(^UH)L}fVeJz53ho88f!%=IpAg3t{}ion zZGNnJSLm;hT)RI%!#!G2INLZ|Ouj8DK9~^nQ3`>4PI6;kd($wC$$;8Lz{9d}_;wS~ zi|JM9@HOpBst@E{=QEERpWl?m_?znd)*Z3TkgFYb;)FL_7N zbO0w7Kv-1)KqeHwsMB7!LWfmi}YO%XtOHsHNm|2Xo_%+G>B7P-YYM$g^V_~a%o zWkv)xS-C|FkFC6 z$liZHN@*9s=-&HW-e1!i{Jfuk!97%q+OjX{NVK4Zu)!|fI)!scCnQ&0v;a{$CQ$_G zWdrID@0T;OeIQ7n_>J{Y=lrdSx3{+GQf&pyRO(Z3D>zKrU$^OgM@1UvOA~09?wrXkUWpGyM1I2+dZoBWzF*b~>j2mZ$zIkD>w~3z}v+1>Trsw0z;n$;t z0%3hTrhV@-Lb4PMxa1t0y}mCkA+U6yBMmi}->KnVG5e}p@6Z`scXiQI^%C%A>gLm_ z;BcI#^HXg>bs?MM{mgq#&P(%jPu=iItvK4fe*(?dF-_tiK&7U7s}rwBI3s z`Ku>z+b{6?z4Y>PEOexGha6JuVE44{XdDu&YWjuvaU52g@y_Q+|2Ey2C5oL#6bXJm zZVl{SD#~*vNvZfkw1L+aMyE|T+d4Lx!koYtMB}=Lw`o3SA!6fc2pK=* z-x|=kZ1(yXB;W%W75EQ)Ufm)5Xxu5c{>=O-WEAg-#jY`7Fqh8W!YP9)EL2cAd5Ene zoL)AKjqY-Lg)syczd)s#WYuGfGCU&_Pi-riyS2)hI35!%!*IY;3m;u(;%^VmTf-oI z?W3kqB~s|;h(;`1X2PZNJkF*Ycipd}M93kI+ERO~<68FNX8j~P(eq!}WV&TcRUXX$ zh5pH+a*)zZOhgOeIr-vQVO?6F7PF#)N10juq2ODYngYK{DdBm+MHX|cIzhE(gcecy znbH1-t{9bf?2wIkalycNL^+;fg|O?Xi~3Bo<1#4>S%9@zEqwXAY+F4{(0jCo5Gjj0 z;9TmvUKOz-wBRVgnU6`0wQP_19zx&SSpDs-o}pgZ#~med5^ehI6uOenB-o8I6fGK= zx*86<64i9)M!AArL~Vwolrs7jc`j5Ew~d*8C-5fc&Qqu2ZME{ZIC|eCOCp)Y*jSHG z;e7GK**p_>T_^YCM=vJPaTaj;ImRysH0nA0S-r#_CF$TG1GEJYRLcEz`|xlD@b%>= zml(?X4m6!HA^!$C5j+5Wd%uvhWfk*Z>M}Ixn9(huETFk`Hcu+iJ%HAH?$uuwW8hI% zgT7n}TWvP@wAvs>bMB{i&e-<$4F1T^wx`#jr- z>HJ{{{eX4?c@b$Ckc6hT{(6HG!qdrbh+aZHh9>_770*M80lHa2ZU?s=uL&kT;z5P_ z>7$S)cv|N)=m}W6o=67N4pksR6aCYm_O`2SzH?f>@nLy@eyvk#r@PlbjIRgm z4&%&)%sYPFuXl$8MnqcS2bRBF(dhl@VMHRyCAQyBZCm1{?9cCNtW@7${o7YiG*8UC zI#h!2Y%&eIM2}nFV*BRDDuM*6F2WlEODNrZ!vGcUl-01Z7b`^Ei*x_~H?r{{0pC4P57&hOG#%N<#VpiK9GQl{ z6s~a`a(p4xALxlQ=0WdoubCzBg$s)MbTmUwSA-F`hTefWtusOLPcaE!=C*K!(HR}3 zakf40X+8|vo^!1E{mJD%JUq2av*A}KZat(!w@pp?NgGTB`$y_{+}Xp%yjjqXZ(A}x zfEe~pPE9E<5huEV8N+RJ=n7#6iKUQ&JU@7=NfI-D>0%3{$*5uGTTSgrZg(oyr1_nqu_OHRgkT_IA=5h=8r0*;Zy9Tz;#o3JN> z$QfF7%KMlN(YQ5dS1ppJQTK{%K{uD=-^r$amsUv)=^%@ozVG=MRfD5qEn4dtDvgjO zU8zbH9I}NL{xW;0zaeos2e#uQAw5{&xtH2*cw_AhbA|A7!SP_r44BD|To0{F5-2t# zT+x=1jdD({LV|I`N4l5fzDjZAz*^|@*SKNA*}(T%)8{rm7Ymy+8y!^m6+XkP;wF0 z%7(PQrk&h+5~LxcB(EKnDJ>)nC>^pA(`px^3w8=;sU9V>qTU&8P%ATEVQFqNF9DbPbbkb`4D1#CKx-3{Bl zE&M5S=B2E3`tNVpAhIWYlppU|-IPfUi$FY3zAv%Bt%uh)GVu2XG>}{b05*hpO+1zU>nP_^6lnEXxQu!V8DDx8U}enny>)? zAGj9AIQ+o}^u~K&aXAAe(f+bOU6P>U$qE)*M9J&v4E{i zbaU8h_Gp@LDt`CfjPsPi>D6%5Z0ZhOoM2jr7Q)tee?JYq%Eh3e%$GA-hMRJxU0Y`M z$cOysl`F4V=`0Kv0qcdlQc1G#t|ymd)gMT?fvgL2n6X({kRMZ;)e}ZcvJh)CW$f|d z=KxSU0c8I>6aokKyVsayKQfa2lZ+dnLB8El-RFCyP)`dR3$Kk5a zBoU&?=o|vg{ofg#e+%yo%JiI(I9`_}aR|DDSs5ktZ)CAN=3pL{K|QuZpsDYWU$5`i zK2sp2SlPeL4nN7yqo%4V2{R=9LPJ=cmwSYKh+|7F}wn*Bp}tR)I45T zzat-vM1QTo%0pmOp)PHck#hUy+-n!Do_gNjH>dHj^a$^YLx}xg@9MGe1|Qf~&UEft zMttw)RqF{TTofDCRzx63uGOU`X!STw4ppYh)3C_<{}ii5!DA)!)w*gq*fO<}D;^Au zlYedWIr}dk?Trof0tPihF7FZmp^;meX^=Sc5KT&+@2uwh;ik>I_pbfXz0a)fU#|y6 zvxP1%vi%(HrlYfvuXVrQdoql8&n=>rxt)Kce==p@6t4~mumhJ3f>Psh0Fq^3P9CsI|eDX6$l=3vowONM!o}}F9TU?NuQu;H*6>rVU8*H_SmhQ6^@T| ziM~=33MEvr)4Vz~zR{*>E4&)1gP->fff~yV;8>A1?z$J__U{$QsqddJ5|j>M_vrgK z?6#F0*p=xm&e)||WyILHS1Y&H&=%Lk*r{&+m737A{sUr_`PwvIr_H?Sau_w29fQRUx9efElpQ0l~DIuJDTDVkiEDw z@^v*Nf_|#8e%{lo%=gzID1h1!QK!Rvp_Vk*yDI(oDUau*ZS6%Qpsuorj$8manqMFh zh+Cvv+0u|#bp?1Hu0WPMSrpY(}WH8Wq$}dc+|-h5>L0 zm)pn|zk+D}wU9?!BHBa+^?uR8RE9H&BMZc8Ns&un6+IyYz|A#3@JIIt(UMCt=BlCR z($MSfV9?<>6aak00c1N?h|&{!?1{pGs+imFoq!~#Yy5f&sU#4Uez%v=-aNb_2lGs# zOESvGfkE(K#9xD;IWvgSeg99l3CJ(Vgu~7*%nS^|W$Op+9V81xqnL)(y{*bwm>!`g z8*%QlO{&4lpxSpTl6H$({>$?Bt)1oDGvnleeAioqdFJ}xa;lY3G(4|TyuI}G^=*pN z%rC*#bA;X|@H-C&^#bSkkhiVTB-*XgxhT*#1GP-^(&1r7`K49(kBjeY21U*1@55aO zio#qUrsau~(_H_6 z1r$`l;MOPDm-G_;p{dj-So~m~J;)e!teC$b6s(82lzeFB^XLogX>Up#yE* z)o$JO+1=QRA|xOx2ja*tIN{4+R_fRLpIW+ zX)?JSNo(J^J8#{i6ciHpg{&L1sLvd{2Xna3aI^g8^}4?_5gD{Q(Y_5e{PNr3I;Q2i zFG_P4RgnyXjBsbh<(lKcUHE?J_8@$wcGnl{|lebpEU1 z;W{kJp;P~t{qb;S>zIBeo(OIu;Vy^mR|LC_NykcL;zX6vd~B4*N}Z=Yp&lrtS|F~Y zl}$t8JD?GKF;J0r@r zM8R&)c=l~{w|UZZTzbsg5Q7{pdlceM%ZGRmT=`?xjqJETJSx)0BiQnuiXo(!BL(vW zMIr6?Cs&(9iu!-#MLmC#`-0kIk54?##`6}sZN4`(Ca_8$7vy+$>u4w>^fEkHi6`u- z`1{dr$;B6bkh`BK{ky-Nb*LEJNa7m;I}Xw?9#MEIpNAl3jhYZ<;6-KvChJd(kngt0 z(h6pM6KAIYG)nOQ1t>Jv%i|TeO-a0pcJe?dWOj{IYuKWZ>=E-5r6o#H9H5L>eieh4 zq7B3`gL9T7nHVdlo7{68i`)|(vyD|RX31N+##j~X(i?gweb}Wt?;+5pIyDr6Jvb@Bu!C3*`g5a0jx&dMwskP=y$+_vI+&K%foG1# zS(dS_ef>WG=0~L5wIe#~cbt6RKKWDI z{V7p3Peh-+PL3@0y|vGiS}R7p=-p?()aQw2$aq7ymy5?enRjC7?E8j3TZG@FxA2=7 z!f&DpKX2%Ec65k7&pPS9?E8j3TZGu8w-B2cjBQd9VopCHb~5dx^s?_8`fOodlitj0 zVlb~siFx(2bKH|@Ck>Z<-`3&bo=iIKn@Q8YvGB)9Z~i#eU0wo`KAxRVbVQ%W9oNu! zept(hV=i4Wi~x=a#mk+vU&O$66FesqyWknuy5+=+-UC|}JY&r>=V{t_w}JILG9=&5 zkj6H_Gwv;T#)jY-Yl6oe`flew%NG=`gy22#I&M_YVu}i4ZT;^ngvN#t8f!vG@4s5( z!hihk)!U0_7iT}ey|}vg=H>IBpFMwjasK@36bx<%4hPaB6%+8{@(sWlfLVrD%t+%S z;&$9>uANvaom&}8kw~}77;P-Eh2nFM2s~NQRGuI^PfiO$vCTCV=$%>|#Yaw#?5*>0|J_C2?t&0VFWZ z5Wg;ntugTpACPIwAT~81Q`hcp^K3iG>%EiQ%78fa1ETGu>+AnM0$111E?)5=xVZcl zZZKOIrFGD8PdWDEg!=PG@uFw99X+y0Kr*{sONvt)wIg2iCZ(*QI$Ge4+t>LwJ?ZAS znV#4kH;zr2b$Tnaj-kvtC1tj6pJ%gfeV)x4`fO2Vo!-ihu6ISr=cj(r|C_1Pj-o!(N_F@%UylBzx3h0|{FJM8<0K3gP6@7Rs`$eS5`mJ)=C zkD)iO6P!vwG8F+HffU8$hK&P?{m*x?sS}IXV&^8XVUQmbYedNWu3Q; zXHSJ-KJv!Kcuw^3?57Y+Ix0aEyAs3*wDq~CLNFhBzR~Bg*5{sHkIAk$U-ctyPe zz+Uw3vuE_#*ZX`@x4R}C!*?e3@Eu0HZ9IBv3iFZY7~|pU2sTKe4be6Fs~C*?l7^V&Ykg{%}K9*`O0B@ff2;NRgQ z0NXVBYsPoIN>;=1zqxW`?M_`9l6Y~aT!Wd>r4zkN*29R(fiR!Gj-r0zG_Yycrqa2+ zRXW#D>0Diwxpuos$u{8=7@`ElA&P??pee+$wL><2&F!tP zxrV;xPHQ`4pFB2e1;|=OU<{glZF!I>PnP7yvXR}tee|De|qPaZBy*k=WJsjJzn>Yo!s#N-2BdnT`#6#0z6cuOVdXPFL;QIXhwV<}63t&7J zd2J}pwkfKI4^srnH8E}uz5+pnV7yI4%_Yn?t|%fDY*S2kAYle71Pe@6ZieVDPer0B zUae570`OHnp=}Df!w$Z$9@B_jt2bLn>7LJNSRlnOwLt_ zfAdusq9o&mN!YSmtpky#7L(hNb|*6`KOtFX=rW z6~mBlbtRI!*y_o#sdl|JJ43OXn`D$Hr#t)k^epinxrb%YZ3<{F{gX8`R8L*=bXsVh z{W+SYgEoz`x58-%^g`WqhrZSOb01vR(m|VY)>}6-RI`cJLC-w*fYB}7WirANGEEw8 zkW6NiDLiBe0+iCBs`^c0H7H^zx*a-??KvKE%SqV0??KpnWVpS?`cRmrg$S9J+JrIy zBOJd+R`bv1wCeA(D%0!h^jbX@<+bUbbPKfePppA2Cs&w@2z2T8^_1;^ZGv@Smi+1qs z$&+)-QPsTfN!5uty-sZh)j8G0CW#P_dEw5O3~!PMFLA(2=*hgL>4{@8lV&z9;3$ zt0n;E)Cb#)l1*`r7{LXKxR_Ao&qs3lIx?o2l`+|}etReV8acnS=IK+R=zQ7g@#w|% zQfnB8k(^K|Qur8j%o_9US!1>g;NA(q({gms%(4J-_N3e6)dT2q?3%o*L%+^Y)m|3E z(s5_o11+W&eQMfQpPH8SscBiCGM5I9rPh?BWWj8@2=4d@P`p88D-Psu5qytQknJ*x zHkSC^sYMx@_Em%Ds_sKP_=#*IsxbLsXsJ zisPFbez$87LA=Rp|BJFNH^E;e%juYp@7we7ZRz;Ev+*ZoBYaxo#M(G$>{i(;>Ub-H zJDb@uv6$48z9#jgY*J53CUs33J@@*8Z3502)V%Jc>vuFIeQrwH)_F%0-4`Z$PARR3 zxcafIKR=rEjnSQyh45rF)yJ|nMp_)ppCyUtcgIu!-<}FEv53-1Ur}llnV6JBsXZ*! zm{_OdDsdWCiPx>n9{b+(-HONve)hmGF#zIQk&P;I`f$9m4RO7c?_JcwsA(}NNqOxw zHP_-Z!r7-RUxYRbl!An0bd{p)mk6YUP>{eZyCrF8>qEUD?_H$As8KN~3G%i_Zr-e$ zrsB=4nu@I?Mem9fMnQ^6Ns!mn61WnU@h(p+3Q-b~9W$MeN;yk|Vl!ca}WbUUzqii(&o2@Jo15sU+rf-^QQvisdsK+oi2Am0C%)I(edZvgLu3*D*BHvxjE- zwiqYBcZ`#7#5nnSjFa9;6{1#{GawELd)N zbLNxhcid8b)0V2&vHjk$S-ugQ zsfqc&6c_#sp9c|6G6WKsQs5l{7{Y{~P4Kdg%ywsg1nOcHJ{In*+kSIr4KYk^$Abb_ z92C@f=*4V>h|2P`BnBCU6fL(=lp$)Jje3RO?|DrKZ|NGd;pwwso<*ONWC!pE?jVth z{HSscN(l(oI0{8ceTyI2x5ZBRJ!7YMOLOD7^_`Kr853xHCWim>?UmY8LcUcx#k5s1 zYqFdZUGrm<46N`Cip5cq+wmC1wI8GSwkRsUXA~7{IX8yK(T8Vd%=Q1h%_vAxa)Uzz zZehx|7w>$q-jEP1Ar{AJa7#&o(hbfsF8%pPOuAV#?!;=*_?7@Jzi$ASKQa{9xjqb4 ze>Jo0ZeYrIid+`LqM<2*n+V4UgbT1uqYS{6HKg0OL`3<0BchC8d|!)*lD()W!=^>{ zRw4}@a#lN-`Ib{I15KK3(@3UxsB}-aW8$l8Pki+)o>0H9C)6mX<&SiQ(Vo6zFN)`O z^!U4WkH4+xR_~fyM#(LIq^oT9yd6VscJ!aS_E0Qag{|HNwv75({zzBVcs71L88)@3 zw^n2*MSeRnZ2CZdb)Za!*NzOUB=1XxDaYH9VH21=<)vp%iqnP+Tb-ibWr~a{MP7MQ z##S=wC#84cAfs-OSDq9*8TFIWzg&+w8crKB>aQ<3>3e<2$;d1kR2~gmEV{LfPv6mS zN;f*56!(ZU)8W|cI;Xc?=NNXKquF)NTm<-9NU7g1PH&^eF^n2VGivsbQa?RTZjCwt&cWox4G?P>4L5vKWHDRld)U!NNzD~zwTKsmj z*!W0)Hc}?TYez=Cr0HE+$fzvj6q2Ty3>z!EOA3~2t`cWIEi*=P-D(vt`cN}7Z+{y>8%p1bEcG>8!{Q&3JOB$k8UZF;CspV)y6sPWIV+ZZXehHnBVFEp}&y*qxbT z*M3<@$wZrXJAahPM~I?mr!FGf#@h^qdGEOYKHqUD=9g8KzF3l!jfbs= zb;{DLud*~ND=0HVPpWiJ_K8H6*mC{GHPH?E-EkJAIH~uK&n)`RtgpT^E9*NmL*J>H zG;vUIlf-7^j*Z?r#c0-7F`AVXqnV)?S;~|0Ru(dPdB9l1ahZ%s)38b21LK%bo-Xtf zXH=|ko_-?!6x*0_qa-B($}(9;TVB)_>NyDWZnu%oZI_YHEIQ+?ug*9t>x?r)XKd*l zoOcTkn2YFua#dy=HzrGqlXx+h-QqFkA{>KbyVxWtx#1B`{9g!!v6xu4Mf9ukvt3N# z2P|i=Q?%dQ7VI~(sM@o>sy1tAC=MmPp&H=Axg0M7FC5tG?LxcGf(`VG@6KO?4Ng-z zwUbWCGxN!bS5=V#!IwKhJWbs@&^TFuG z2_}ARZH#mqpJlH|{F)Fx7X=S8!(FLLtmKi)#>8|pFl-lL%`8^mtgqEKH7>)M85Unr ztyo{CuTe(RZ9qlQ3%=O--8YO^Y5}svP!&r##7gRQ%jcTg(z&L#8+E3=Z`7Ic`z5r^ zKh>_(F@_}2OVCxP%xc*70ryJ?6G5$CAqWp7#y05KWy@*Zs0R z<5+8U%05z*(IRvSi-_NOx5^`PTj3E&ptaZiCwy*p+A`tg3IW?hW|G5*yBA9FT=JR} zUIPXObPJn^Bm4;oKRQ*||T+^8{STGzlgQ4-UTF z#v%?d!iyB9JFdxGr(1L`Bk1;haD{oA4TuPL2r(t7cq?voXX01>y(C-{fgr;h9KjSM zkW!S!M}V$zmgBgE8CYy_#6@$8cv8m(;+UcsGIRmSC|DqRi%=}|E&-l;E1x-U(id3#Ayd%nlCzv0b1vMigbI;N9Q9cKOB6L+2g; z^qD3-4h}wo*C-(wrX<~gkAMg3eFSe&%B%tK@!;c7dp?%_$Nt43UgYU;ydQj+4i2u_ zVBicu@EwXa;H4ZEksW&QkTR76QB^ z+Tsvpg(xWa|A?fk;|+|rFgpH!c#A96;xC@_g10$#+~HXm;&?SI*23{2SmHFJqk|#1 zLWpC2|7RehFb-iF3akRt2wcR1?dLarF$j3W z?J@oGFBKXs7A(Lq=Lq8LK`}+nGWninJ>Wk4#jcP`tN|y6l033FgE1ZrP z1vN4s!9Nh=?$^77ad$O(>|er*uJigTlOL93z`;jw{XgI%$Y{zq{zvd`@aFn_@D6+g zSBQfAYEy8HH|RekMhvoMx)yhzf{)Tw%Ygj)8;8JeN!v|J8Ta#^+U$vHTU(tKC8wtr&)RG8b3>M<>WTdEOMyEz6Pau#H2MiUq_8Dv*u>5(<8un)r2h zX^9G@dgOFKF2Dc;4A@XY6GU;BN)Vtd14|qswvuTJ0>34xaAV?lNse-{OTkZUb%rF6 z!j{Q45@aLIROeEQY||lU+){K&t58xtlmmABL?igHepE*M>cEd6!WmycKMjUMxTWjC z(I6%<8vIMGNNpe)Hoix2i~vkme0ydiwrDdPqT(*j;c%OwbQnSkhapb+U=``M6huVS zGZR};fG-WQ0wlbSnWYQD`51zaU_l6*%y&x|Wr$J!T>2%qaa^6kVrk=8UM(0}QQXw+ zGhQ5E2T**2QxbD7bpun(aAxub!U7%Nb5`&##RTN@zz3eG9R)yn`7sIws9PLGY@G>n zof7GG%%@5E_q1**WlOPCG5Atf*IEkiF25crQa3FsmRsL}6{fcR{X-%+iI4+K#6T%#B)2wiIv2gR+mM|_-9Nf0AM6h})^6d-0xAPeg%lXfM}bgQI2 z|9~^TUF4~+oOt$&IRe+pQUd5h!jJhdx3CsSY{Z!6JPUz$IQ%)y;JXIqI>PZPMOoHj zFTxnek2PPp$yaS?Wcqpy8m7qWSn^VV-I3gq^gWJO&v05ES76ELPge=SQRiyL}R7l$o;$_+n6SBt#&CloHR}#q7%MnU+KMx z5zW?wR5oP~p_hXyBpyx4mMv`lv%JVRFYSWqns47r61J3vHFS64={be_7`g_%A3M)6 znY>(wd{3M_$JLRK=j~c@@gyZ13UPD~OC<-TEtOn9ipWZ+*4Y~KTMf8&ACdRC`!Z38 zD%wk~uH>ZDD=W3Yx~w@3e)F2sp!ZvIIVN+>>5%Vf&E>c{uDQHj$2B+Ni^8Ovt+fQw zbtV?biYIt7G=kY#0KLaGB9Vc5^ZF$N^pby3G`&gU)=SbKMy<{ z-X!s%(e05S@LL?A@`@bD9WXd$()4Jc4z&lTgX5bdK2~i9#VckE4^9UR7B?BVBvS3E zc$tIYEB;d2+)x(B#s5JfenkzNSXun!TxcZ9gl9|O?d7YHy*s1)7``mHOT;rGeq7^V z%@>(kTdburaTikVmJL`NF6j@@@bS^mbOo_kO5ejUWGb*&01LEaYl5cyOG*TGv9lmu zkNDy&+|kA!WV=lkJ*kje&vd#o1|EXfjVG|Z(UKiVO7Dq@eR^7%c2~nb3X2ED45B19 zFjjUwun{wrV{vd`a>#F4rZOx39a zI0Gmq+tu16#EcecWR6U3Ddd`qNcFe^tBi_Pwu}lptf<%w0sDLe-oglnYNd0VN;NtH zYDP$^#awfw%O#F6-PP=ZXK0CIW}T@|0upEZLNp4}EqCVp^iztK|0)g+-sgL8gbC-+ z#{r20l+f%r3)U#yMmSy#(T#Ac9W!%w6%P{<4r3Cc<0lH&5XRvU#uN|LFOo?|369YP zUy7F1B|d3fTm_I(vW=ok65+tGjW3q32)z`hUS-VB1PZYu7zB_=5C-&AKlRd}uhv1z zMo2$h;mw*+ncyj0mEqp-T1npjm93#SnVx!c6#C;62RaCi{pAcUrzh?bg_Cf+3_N!- zai?&xbc3;rV2Gx3|777!!;@ehc)@IP;x|*nu``P5bj%-aP?|C^#*H`jg|ai10axq_ z4rEJ77QjgKB%j#7sU`e(#_GZlK=2(&@qbv`h?!8}Og5Bo3Ny8Fk?3w9`$92*^;;~u zd0W3?Of(%406Fn3)vUQXCQ$0seQQtL=rB8^K)e)Kdu+_RvHNJ7gJI9FO|QF&kU zxNwD*$y9tZ zw71ND3^nhjxTC6GK4j>P`uYR%s>%5pS2-YUIkGl_oaBT zr{^>!QH0VxL&?N6&_9vdZc!xlSk-*W5Iqhd+K@Oyv;j-4md4Fkt?=mGG1@(RGS*m* ziu&GcZyjDnYH#iG!mQf( z24|SW-{FjL+Lw64UGx%=&t2mJ{uNIU5?_P0_#8yydjlrn@hNY3Fy$zLDaAsTX#6$C zks1iCli;=96lhJGFl5_wg>2A^(KLW>;0GXEHUZzp@CM?DucbaHO6|*tm=;OVYG;F6 zUbvkT?65q~KYOJ3C^!Hx89C!ZhF4>H@N-QaT)R*IJ26;cd8*lW>J<0sRm^ zLlL5=+PnZg0?+soWgq}v#oSh1Ir z1S3a8)RvjUPyZ^(W3AvY|E^9bzmaswX@;@RRv2<5uZO~_>>|IKn`~o#0`%tUn>@Bx zlkfbD-!9t4YfYl-rIC5(;!JeI7-D9(3Y{ktLoH`=aQc&YIXE5gYORB#0bhKB(}6qq z?O#WO48b&5qb#2nbzBIZy}DB8zu8f)ysGdxQTtV(0UNjjDauH6gFu``guLG->O6wP zBIQMMpJa$`6S;cBIIGckSWf+RzrEtgX7h) zbU+MYB9fxmR1f8c$4`X6pV`55jnvPFvX6D{sP7?;>**eW>xz1I#Z%i9uQ&x~hv52u zPQjb&bMVa}xIDYM`tjK*`0KB~g3)Vv^#G5@{Oz~Dg7e}7{-F5g+mvkNUjU3oYA*Qi z74fcKUMEpaKh#?uFeKa8fAfK&G=|YdOi{Xo0jk=UZ!#n!qOiJ)VOrn_L6!8oTh6l%m+909fOfuinQY45a~^y5y$i!|DA5lo;jSq}gCVD2c#G+p|8och-N%P{PZiUu8Rs91gcAMB zqTt1jY(?enoZC_Y-dWh>yBuZ39V+MQEQ-jjat3psIr_jj5vD~m6*|OV;U@2fgjw&p zz)cQ|QcL}tyrJoQD78?20shyOx*@QnKJiyva}wU3{3|F%fGtu4vmHoq@LrkcOP+YF z&VQM?egyC)At{A1wd_n4k+Ij8z?#aB(O!2#@nK(Y!Up2_uL{mcCw0VL?XiCIqo#Vx z^p+n2G38;w=8wnzhjmD{lrVu@xAf1pltk>EHZX!atN0UswH8U~k%$W7zIlF;KU<~Z zM&V3vT|deL7i+MkJ4!h(GtJc-!K`*Ibi|=q_`@Zpbexr;8AAhTxHI< z&YaJ7G447vo(`HMC=LZ=ktxEF7Fe=87AJ2hUTX4gtI8*o4FW}9vHqTBC}G+fIxG>w zs3Th*jYTr4<8BmQ6o)*JvO3b7Yyaf@i~pm{I{20xq7QJBL}(O|07jgVFea;ni|GQB zyOgU7bsHf^$4}?gKk9;{F8Q(Ly@0PCuU>MIEZ8DnFu%qDS^<{(zS+S>fhBy=F${n!s)ZErs`PZ$n%0G%C;tk4{{;h~-Qvvij zlAKA&T&YYqtay^tyh?-B7gxie<+p8l^QNB7C?!@w{R1aHS~S z;8-kBl7=YVpF<)q3vBF`Ob;nOQQ;x!Ha_B4D~Ku(`4>k#{WM-NjR~{qrV0;VasqRN zmnhf;W~|h2?<#t6@uiwvwhoPRJ9QbUMblQVwTo4%=eF{r(KfAfLj+~dCf`di7IuR0 z&2Sx&ZA!^z-@JZ##Xj9;NDJ6x9eDQ5NXOWC=A2)%YCmw+!Sp+AR!Hj2wG#Xe$IP@QL1o`j3gb!W51Y>I-#bQ$=wsq6ZSVC;te zIE0?>1Y^g8-QtK9qYb?DFSzVxj_cgp~DOmUc{SA*m{1B|qYGf~8_% zfaz`o8l9_vEF24WBTcNNsx2_60#hEQU4pWaJWt3@3*`dI|H~hSsF0j733X45$yr~K zkg4I3yf8_N7rXaBv6zRk2ug$xPKLNOZt@n9hdP*kELg?b1raXXOy+hkq3N*OWxJsO z-VS#K-=2-X2z)r1F1)~U*<0PB7;<91dN11A`Av1cPKZ_geJ2gA^5Cugv&2v9E7=Ni7=PrJ zSSc4kroTwPMcK9(l@6=l9siB>@n^F9nXb{#qT%1)9p$GYlz_hu|0<&kG9CJ2OUnyG z%P_Rg!9BYq)ULK*OA!otWP8o>R%{tB^-fjtIsk()ER4JwEE)cfv83kn`3sz<6+tmE zWSR31)tMCivPBuqdsNG@Y*_V+H|tz=5|{X(Tx>FjeX-=HZEPV7-yMN)7sCw>1b@pg ziRGn%D)zY4Ais<7-BBs}G;fU38b`OBLLE{@Hb~r0h@uP$U_9Zqe7UIJavSp_UKE0- z8tOy7B?ZuU8%0MTCe^zUnaac2JEBK`m+n!aA~ij*5C3*y+mLUhQ!60xzf~nH?(ch7 zVu|lYat$&)7J_WM7;?uf=Cu(-2DtLwhQ*f7D}-X2iSnEl3ac?z$xWbwtE#M=e_n~M zIxQ|nKa&6a?(zsEH^C7=n}qJ3;q*v4!j6jA)1#uyDU%Je0f0fZCQ6CrC1&HT#K*qp1KUSoR$6jZG3F5{3v5lW z`;KIkGgVO?f#6uHZJftIGJ200lqHFH7B0!p$3^wXNhHzc_{{?H9fknhnh9+iP&uxjU3mo^zU#-PZzg-4A7D>ZX*)~#|?cFqdUBYO~ z_whT`pLg{Hh3KXgH^_%Y&~rZ%XQRkA2_d?jT zgDG+nIb;l`U<3DS|-cQW-}gKS*XEzL?ws0(Vf#0 z+a5f^d9NLc{W^G$c7xM_ssb@M8YH6f%4Rp@b^DJuyJ7zJw|^OmxkM}AHrsp#DSra9 z$>@>Yh!!6<8qjheTUpNr-cM|>WowvnpML!rQl2QL95@OIC4e{0%cPess><%f-#D%i zr&R?)P&?Y75N~VG2~^Ob{DKlN_#SOYx*HVh4FbAJmKk{Z`t1AR0&*V750-WrMVmw2 zZ^q|NI!6`AHKc&Gl1J4ftns@_Iy3wqq;h2Ijx-p6cUSm7NYMBVr$v~-**maAkY6>k zVpG5itjM|~JF?|x8JUW>0^F_4bM-hNAbTZ8v`QaE8+(d>?>Xn(3T+Z1D!IvVtHWJ4 zgKDBaqiN)%ezuc%15;V)><_VbCApvf=2e7#&J&+*t=j5mIPd8;{)6mzN$lr3^>@wy zzsI!ggoI~%%Y@X_>`0MUTGY+swB(yDve4GqMVy~NqOUkA(V1yi&Kr<3W) zk^1YLmmU{EQiIdM5B!?F?{T()G*}Og2K@Fty&eDIO@>nWw|)T^|E|b&FNY5+;(($~ zt%}RM11W`(tz;utHGk7LsEW&%?W(7?1< zDvz>DG2uJADbML#oL;GKL68Sg6j`&B$z)!IKvo=;;hHjhU!=6ymPLzWFbcExTsn)L z&qF?Q!LI!t;TsgAEE_V55c7ZW;^Et5C}>dUX8ezl`rJm@OZA?AU$<7va7OBMzs8j1 z>;(%GUw9Rde7bmS=&m)%q-YY9EA$U7-cqdtRdDF}t@l zYJ#op$|qT+lDXQ3=t{ocvqB}5`(2+BXk~ROWUba_R_Z_vlm}gx3h6zsN`0j6ZB3Se z)^y_D*CQ`!->iS;h58$`PaRNC-LqWRzoL1TFm%y7Wy5_4t4OLEr#BiG6@lHEi=2}% z2tzlV2F`r3T+YYyz@G(Zyd2La)5RPi$MwDCNq91z`tJN>x`fd4{K?dVHK`p2K}y|B z7tp$Hl~)JI`ZljgBr=J$zrVq8sH)R2SfikLx8GDR+qXKJI(QP-9l$nGE8jJm^k-FX zKuhR%09(N8kqyyh>Ugbi3yH7!yC&kYEpKMaC&*vRGtw#{BY@)|+NvrMa6xX6JW>l4 zJBC4!pMIt(Lg&YI0~-u?kC@)Tucn+BD#j=Vx?HaPut5G32d>0sEPrA9{hGRkkR2(8fb zEPxST=F*pTG|&rxvgK2)BziPRRQoV*rp|$16GFeuo!;tF6z(5dY`j6(?Y+ z-t(23IE)YrrPQ1oEm~k!& zvoWaZn-RDY$2?sspVUA`LuVd=9Uq|Kke+ZaG_eSTT0 zdbmQg*r~isE!#hDUccmT`M%Z;m6|$5VY)(e-^wj&E^6N!&K2S4FR^+)0LzqYg#KLA zH0E!(8{u66@EuPwRM${RCxX7d6nl~Za)qqcJPXG0_q&7x=99pSCrSN^4N)i=j?&JG z^!1$oaTkVdRg}+5>lvWN$@lQVDvpjjCM#W3)uTq(o?WBhx7;|Hz1T-CgmULn{;dh6 znv*Hbw2RA9#DvZzbwRyJBJ`9o*M(%Rhest|djxWLM+MK-$T(B>U86^$#uzNO?|m;z zzU%FvWg&ZOXe3jdZr6y-xn4X~0xYyCW!cuCu-u+@U5W54!xq-(NL|XC@mPpZRo<61 z+K&JfKyap*77C>kkLrb?^J$Gr4}?KZq+6sNVl;l zIVvHQuD%fv_%x4JDGbmhN-+>A2VSe5f~103;#GF z;qb;iev(&GJN#FLrVYw6xI(sw`Q@8QiTJ*V+PmLWPGBIun{4nG2heZu1b)ZgZ zZ2))Yt#y6<-{p-ZuX*|8B@7V^)&PZ=-%P!VbvA5Jb zFm8Q0)vslFr(Ilv;}GBAa0?@5s=QYv%XulujKciR`~23%#$%5kaf)8>yB!Q6ol93756@|JsX*5Ij$w;4Gj&+%Mm?vC^NRx^mk%M-^v@lPfvD4hDU`C_^} zSo;(3p0gM?>*+w)wI5;@?2woBJJDc zVQyr3R8em|NM&qo0PMZ{mgBauH=4io6!^wp_V##N6akVT+1t)eyL)c-T-tq^iMPMK zCJ+fpOj9I7P~FqX_*>^S&g-2gIg0=(krD~s)IBqfv{sxR2?Z1iDBy=GR3QpkGLI?y zyFWQukT_B9$kPAAem|~f3e?SvsA(qp15o$ON9AY5 z5)%JG9o*J-=f02+34$;oi5CX!XaqnKuc(vG1Ez%Wd~$Je{PM||t)eK5lOymb{rS;u zF^42%9>yMJN8sZK0073oB?*}lMt4ikW8%^ya5W;4_m;-Y3xgwYgGMBZ*8haMqABXg zr4bEW8aQdyqcI4`k{$skTrR_41VBuqkaOyaw7)?m5q5db&q zCR9aLVA=+AVlPVgmuHzeT>SiUvLa-44tJtsW z$4C?}FwVkN?1=HpNp5d%l}!oW{ZVok(IY^j$oCvRAxG<>vJ_P@N1s|%ewUw}_1_Pj z>pi#8u>Px>uI{Y=hJIN8AL8>ME37xCEI9&fL6Cuu?3w0ZL=B{x)0w7Y4N`4Nw3&ve z3mpq-GpK8}i(JE@*fzA8<`C%M+0?=_N1r;QISpt`66zj-M@U6ztl}}$FQIXS^dqP% zrU5m}MjHI@M~6kD;ZxB68{)4hy9WT+p#LU@Xj}iWW*qeYAwJ%c%<0jVrq35ntaxD& z=oI#I0HT%epM}2X+#P`zv)5sA7E?xpB*l7Uegtj=eEV~z@CGqWY*3fDQ&Y2uflb3S zY}K`NO^2q1p^Hq6EN5om8J$g$K{eGf)tNz6-NZ;8jhrw@;?VbLoU-~A7>~gPO+d1s zVDl455ro2je@lGN1tAA@43L-tmqvbgx1>SxEpQ24h5@4q2xE|co^J6nyQ{8Cm(sV?Y8IoQJ;e1@o)OB}vxfw62Sc?F(92*_+^$`ZS@tRcxvk zm7Q_{rPTm$9)vLk$--mlZ#n-*%S2;`^8B*GE7bjTm)Sv6tMPgh4_-Btp}O`zG-3&ciTy>iLx2v4k#N5erWEmw z=WzB@lrFlFp1+v*v-oxX(-AOq4XwXQNIa*>+2)7QS6_k4H>Yooz*Fx7pPN(ST(6>W z7>w6ble00RK`Qwx@#PP^)S9&@bT2CUvkH#cvp7r(s-w|O=&zRa#3$bJk}e~kB$RXR zP6f}R0r!X>3;8$8a1|tHBv~ARN0X_S1Z3$I7Mw?;5g&)MIGl2&ntAh8ERG2LhhKk< z>Fj_0=j$Axq{p5(pb2H^BIbq;n|kN=hK z56LPTM``nH@_6(W_;aQ%Vs23|rG9uj5(U=N=4DnDh${F_%T(6_K+Z#90zct0;{)fH zs;!Y|VHxrmNJ8+}^ryc9ZwBtd6}a`-BK?*{)bVC_>31;*Z-aH^XY0D16-&b9cGZ^) z%89|uqrM9=Nixo0w&KjfnEx~HWT|Q;tLlZ|hf$w833b6=i_QJ@Tfx3)V-fl;%WL!k zuA=F3T$D+v?mF=T&Uvms^uy+Fz;Q1L+|3sNi~(De{yBC^|9rFx63++G{JqE0NplCr zSKxpD^X$#V<+JlA7w@kwo}B*%#tYzw4)GTuOa2qMAz(hG5kMgQM?fEqHj9l*yk660 zJ!7lq&HCqinK)!L!sjmFXnmhThiG`~3#K{)8>S@D@mDWs}!y55GYs6+x zJR^+VhH-iVPAE$v!q}t2&sU7b;v~<1F8*|y*=2Wripo{SVVFD`(GMO=ykLHj0@36M zJbJ_-P5So;04Js{4HA#|tZr|2NkVc_ZI~Eu8vFNu{u6u+l(*vWx!XhVaXmdA(Pfm} zJpzxxZ@>L}MV;B7jg?1DRgY+JlQO*?ptIwPi+69%Peo6J0Dhu(=X93$O-MU!FK?|Z zxX4Zw8e`K}kt zK}4KuGN()#eFZL4u$|opV1O;C?}ND?PQj8S&cX}k--4L>B=K%2h)A+1d`|**^c4u` zoS#U**HKJo-UsS}TQ6CF|Mge_Zvy`ggaM~aSppG_f$s%W87Ze1?=O-trlYUG316bX z+mj36dNCU*b1#|j{|fd;%Jd)cg#S1HVlkhj|H=Q!Zi30CB4G*xGtZ}N^o_!9qtQ3Y zlw6O#QIcge`sV+Rz5;Ja?1d`^UYtH*BPEK%zfmU{DV|HoM3jrezm1d|=7cUy>wfd@ z^^@}pUMWB3{Is@7jl@r%$%h{E{=j7NX^ZbJSv`s%B%z^~iCZH%vydooVAj7Ur; zTf|sVl}Zl`!0=`xW2~WDe_e3A@R>&fx1`ze1K}wBpQT zY(?25E&urONFoF*5dt0}1Y=hSxRnsx(7C2D5I%7q1Ys~Y2*)ew(2Q;}2<7?sa2VMa9y-?r<35{pOq2B^`MLB*9 zI5&wm6|iSX5=GW~DCvE>NnFu;GgbWxU4oU}Ul0HBDhbEg91!ct`IF<*S5LsN?AnWf zE}n&ngr5Q!~nQIwMXJ#wqy^=TDA*dhz-h5YSD`P_5$()f#4~Dj6en-(#f8 z$7o;Te^4QczSc-l{5VLATPvNYu_#BQ+ums_nu2U;Z|YVp@#CQ0z>40K7OtL12z4A$ z)HI@XYnS+OkPOrc8NgODkc_A$?Mdm ztz;k>QC-@by5pqyaZqoxir(nO-l#o#qqQA(+|Bl2Vu|fRbVnwsK^V%az)+S}kQAyt zE=nYYq`i@0C~FXgvMMl?g^InwJ$j=`dm}?b)*v)wRiGgY4(tsSwjtB#X3j7Ti8(_s zE0e<@9A#GEC`%nG2P>09w_Vqi*~kR55;>TIu#{PWrA)ghhuZUwe7(}U*@{hFVk;Jm z%49GIfteKu%(RL!=yyso^>!Q1Mh1F=3}oob9E85i3iM@~MH$rYZgLr*c51qo0a6=e zAj53tAk1b~U^cUe*u-)*i|u0?xP!Fsef(h1yE0CE8s}%CzN@!ZKKi2f<2Q0V{D4R(8FM z!6gNyy^#S#JP07-3UGvr01@^uxxOY5S;-;e|mcb`H2tMHo_=HRFsfR&V>OsOX zP=E)40$c$Kus*OeQs)VlVFEk|6X1%S4wo=N4}+wcP0)@@xPe<=6Tuzr3Ao9gfMpvg z9<-6-ij5SPHqsteQk;pQ+wlP#4aWy8+a>X!UDBv9FJX0{7z`nXj+ch8?9!0nRU!ss zkafwZ01JlQN(^-xA?=B5GjF+r)b*rdGdGHxdCx0QSnoKg^@d4p$RL0*2m%-tHX@@4 z0aUA>4784*PHO;lhRjCPa-pu1K?MvliZ&v(^I=Ka6B$e~2Ei1g0;U+o{q;nKQH((t z#i+n2MiHa*xwE5*sR_H8FEMN|Um7xW({i7$6GMf?!ziMgo|k>F+7a5Q4X0B>X3H=J z*)og@glBAQ8M?&vD3yWH((9JXz_6N@X&D4-33TdYPyxXVSd>A(W!h-zVOYz+Y%pOP zGW=x>!e4p?{xZ~}4Eou$jFx7mjSL#*fi44I`XKP7SAZ|wZY2YW<67Do8UAVsTkASg zfxmRC*qL1^AKVPo%>rtm1`DVz19$o$ zaHm&*JKZb@xV!TUWica$+6~_sY6HI0W%#aTOhKI(D)60-i(=@xc&Z(zg4#3{WXQ0k z^Sw?6706IGiZbZuI??TJ8;EWL9kG-fQ5Py7IwE{B1K&G(K~u1^d^slE<=Vbtp#;r zs6d7~Y$XQyq;7ftW+Q_Jlaww)hWa36s8t|Cy@(8Z8glfO2E(-saKlMalOe;F7Lz&| zR3JmGhz$38^w(stP#XjbwF+3M6=7lbGjH4Rh8-7j*szdmGHj;}!gg8(w$qB(u6w`) z%KRRBN8^CrWE{|B*sf(DS)CXvu$_kGVrX@zr$wRPRgYzzkwG$T5F|rYt5y+`@c@x} z){tx&LW7neRIv;pYn!#bEvQJgRG>ji1*%vo&}OO7`o^tjEnN@!I-wa2*dNKXre%0y zoeV0p24T4j_Hp+QWsXj*<7Ee}>9PZoofXlbvm&ZEDVzCFVTuEK=Cb~^vi(Wiq$BlQJ78cZrE3A%4+~+dm0?Hr@@Ln4dO~!v_Ar9 znHaiR&^4_g)CbD8tCr^aIx$piSFpHUZG2--DM|Ql<+>tYHv?e+SV97q_+dZ+VYk%x zg$P>e&{_nrVVQ%nU8v>BvrYsRyAaf+BA_3lkWmnaVFK1!c14o#FaYzFCxp-vd9Hw8uF8sP?R;|& zW`+USGC#mt1XhzjMrPO?bndJ$Yqk=Bdr$ zLIfS}oj|qKj+52hQG3-U#4p2EL&RHQ)qt(UEA7A9F?FXZOWkQo5+j;J5+mZ8@YW)< ztZ;#3i6lirbsF4&SsX6G-&d6JCouU_9-CtPu^V3OhQz?7j!&}0iPdEC*(;>mF>jYD z@^%$X8QX~%U!|Vt4VN*j-!^ zyNk=QyOkp>9Ro{&W@g(^J1!xr?CKhpMdso`k+~@~wkzbYndwM!rj^KnFQw4#7NMM$ zm&*ayox#M9gXCcC$^qL&IdqKjv-m^*LJr*$U#8_7u^Q1y{NG$tUcw5wITF)PzXJ)2%*R25PI0zePSsvOO64}mhf;b z2i&kf)&}6?K>_%Xkk5sd@Ngpo$<1^u3*E z=P7`lUwGrQS~xdwM?{O85N&Oi13W0p0j|h$fXi79WO9(tg>D%qp)}(pmZdnrgHjye ziWCR9oZvpr1zbq2AmrN_QP~PIGC6e9HAD7*0+wYOz=JXk;EGHGxR7Z; z$e|w&F*;%~qX~;?GCbNclC4e#6?jxL3Nom$D7_>s0ph7}9+fktvoNOM`~-n%Oaf;y z4rjB?UBkap*GtIMr@{jFS3np@79Im$`u}wOJ~J0x$NMQp)BTj%+zxn9ZU;_X0b}#r z4t1hyRwF%=LpKO#m<-LuY#F>fj4^_Xi7c6lU2t}RX5buy?xuE>_lfbS1p z;H;)33FCEWC*#`%f5V?|F!YATcgeyF=F+~&5NZEhIk+NM4ld-%5q+z*#W`V+5HFxH z@Rnpw!F=JwiWe4J-c-zIGSn5A+37kadWA+4YOl@0g9l~d!4+9}a3KqikWmj*DPAIk zdPh{LH=)YfOgwl{CLUaoi3b-l@ifR`=k^Pq107E-hT5D?ncU)Hj@&J#RGEbDhS{Hr(J zi9s^l*YZkLUB4@EAJXLgt{&`eVSj1)hE5lO-p+3Y26wMvi8KS*J|s5fgaSsLRqQ2q zAR=>`?_0$83#)rfXEdgPBNDG%o}8SEzIC)i>bgK}G+?WkR@YBr3Zj^bP_J7rS%8}Y zoJ@~Yjt6F8%>OL04hWcfNdbHm^2JonO7ZI*NMhmzqC?%1SEc2PFm!9=J6>DWbz4$d z%W#8rWw`X5Rh2e&Jb~!gl=ZdS1x8)hcG;_~yjvcVw7i7Vj#n*pv=hn46@<%iN}Ox1 zOA9CFlQIZzm2|p>aZH^AEW=fhL?l^&rN8NALZ+^Up6^2gA7tV{*}(@6I{3hfgAXhod@5X6?Y5Z?OS-J*oF%k+v;S{eRscq#IeT>S~d`}gIE7_ zakwH~94@4b69duW;MISpmUUWo;_9Cq4p$_H!-eEv;fjoI zxRBAUf$x1FA6chmR^tA7&u~TFGhE1f#yee~(6Gf|$)HioD~5G^S3n~Oi+tA}>nj#| zuVJT_0iFIC+wgA2HeATqCc06xTX8%>=IQQ~gn-=zj#!wR2StWD27!)>jn{6`lQL4R z(<#mB7LB1<4bd2~-FH}=d`0?*q8QK?yv)I46o*TiEa-~yJF;yMq%_cd(1rGjP{7JQ z$QMGbTk@#1e8X)Y*=3(WzMqP#K7|g~-{0TraK~$ITGKT*sf%>b(XzrjRP1m~w#(+_ zMYdH9+o>u}gmR9nhp6S{!1WO6O*me*Hw@`;)ecwL;jM)vTRDIifVU@?GS+3=TJK%W zP*BzEQe~`X*D{vgJWKhMJuVo`xyOw#wp!AH*%WvzJ!Hm|T&HE61qtS~uBV)#nx69C zhV*o6R`U9aJ*_e4RvtFfc4VEXn`!*FA)QcnI|1dLs8+3x(eBbj-kdK40xMLsT z6;}2*k7nWXv+NaJF$!2h5;|M?J`e8;+_il~$fKJRL7LH9uw5$dD6}CsMV~m=HgjKz$ENRtZnIN%8+^JMjb?{F7 zI7m{sLQ+M9S8+{52!h1nDsZ{IEJb)Roe?L=b*H7FVJ#piJO$ajj1xen+#ciJkiemC zG1N-ym~Bf#xDXt-ioi))i09qQ>g%|LB8k7HW4d#gr8_T$)<(XUfR!s|U*beuAo;}W zc3nk7lItpB_+>MzH|plpM#ao3;_mt@9a}Q(7)zyzSgPFxkDoG=uy7wn%+-!Eg*(yE z$G#ul0u~WRLPZ+R^n-{*Kvp*pjVya-TVFGgqRHFUa2^) z6i+K^3#3#x)*Y`&AlWqu&ZqZVqK6%QDLOl5}_wc&xyV8|bJOo;2D5!t*#> zMd`Y_^cdr@EMWjHPL5wbDJ;AUgtG#ok#$f8BL|_#3J|GPcCh=bZkZTjJ;-{4X3OB{ zFf_U=1Jp_eQ!fd~(ks+=1a(DK)cn4>>&+=kQmBee&7A2tlT63yFS}2{J0QbxLnKp$ zW?M<7E`mW*ppnU-<7Tg`MKexCPE7vQV^MiW+b80-&$`8`WhC6DGKtTI3so{&y+OBL zJzDDaXjQYNOW4wfux0GJlJqLJific1`%vkO;ddVCEs%!k84}NuF~qZ^?>cIYl4nV+ z%3^x#k|^PvU&br?`uHN-1kO)tL-TZr=T#r#dDVCQn0m?cs#XPfuWx34n>)(fRpfgP zNhsS`#Wyy(O}JXxYu?YYvyBG)*TPA@&hxf@;xGx*${d<0s7!KoOQAl*A*xr+Vzs;! z)<|ySYb$Q_MTx8!UBia6wF}H|sJ+PpJEkIlA{7B= z;vzd0r+mCvMsYgtFM_*kupqHZ13qir8;^zYofwF2&r7A{>jy%UUG~=oUG~>1F8gcc z%l>L9W?lHZzX4})_&4e#<0p>qMT`RNTmCHkk|dr(eE)89k=sk?a^u2*W;ek=)7mv? zY&ULvo81YHqH#=#yQJJgnDdkKvRP%a`OwX_0xgk)e!KN3MLOtPK+^R-U%$8uYjZ`w z59e9;yTLzbmI7ZS&`Qht)a^J4`E9j2g)uu;X6id;pKW33-|`2UkE008W8w;N1z|#x zT&uTyejVQdgxNcQoQd*Oo9$IG3}~cWJ(WbX#4aC0SiH zSsaTtD2_#|h-1;paV$lpE(a+rx)m1ZNIb}r3OMz$>%Y@cGncN}07ZF|EmLO+E>ya0&loWy*NdmrB4 z5PwCp2__`UgBQ|YlLgHp;<+E0%nP0~rev&jbJRf-w^D<#SiT?_=MZm;Ro-~V7lNSd zg&<89hNBG%!_g|jaI|t5j#_o4Qi9ebeW)|9YJmL1nq ztZvWo439G!vkaf+7u~(P3|GM!Nfx5nmTwNMn>8ffbxjsLqYVn4(JF#xv~uu_ zT9v({#U)iu7X6|Pihj{5qF=Of^o!c+5=V_a4|crB17*+VX|iYQZWP8U!2{6dI?wK@Z@Eolip3}&g40;VhUKPO0ZqJr%+aI*+S8V#lJ-=)Dd+orAW{ik)-4ajLc?rmqgSsQJlO?TA}cEV&_|NkV$G zAt625uBBKjhV)2fP~}q66uru&q-hQ^u`49g@l8Qh_NJgFu|R7>EYR9+?2lHoK&O&v z8SJEXjOtcp`K&cb=#VxfbV%DZxogGHp-vs{2EU|_wQCYfxi-X7uI*aNwW6gw?Qp#t zN|RWdwISAKq@b#0No~g#r>Ry4<(@?CJ%#|GhnX4cIE; zu{BA^ouJ2&NTpX?}~&%#Cgl}j^Oby5)9l!ac=k5UiTqkYBJa2I$1ODJ(cI0GyRo$I2vdz0ZO9no$_02`~7zOAj9 z6?uU)nUDb8VoG(pyJ+LxTyW%?0-oRj@2>G+o)ll|2BmAE$qtclQW-9_>?HlI>3jRAFEA% zN0E zNrDyeCqJ(|=X!jRkU04xQlG6nm$He9$G)g;%$K*v;P1RxI@}4Er-hWfm&Z56^Z7l^ z3|NPm6kY`UrowEMqyUC@j%VHU7?_8dP%ixO$;{f@Qa$|L0GRPhUNGc>PDZq3-BE(hvIo5TCD7J&Qwk<%pp5vur+G{QPn> zN_CcBP7`@aUCO+9AQXPOp2E}xgl%2;CQ$^!z`s+#I|>{U@asSG6^TiZ&`gnp9)sI3 zzGmW%FH1<^j)@-znRle9B+BTUZ!Xt#sRpKXE{P{#ybGox&~g>AB&K8uqU_!e&uSFh zOP)Qm)FA<;mUW@?!?4n)CIpTXiU2Rrhwi~oJANi`uLk~(iH_eH<4)A4~t2{x$jta^8Gz8k6{LoUN|qg%*6wvGhj( zRqmJtA2~ZO#0ceAy7*)njV{A{=r$X|_7(t~1$C~)x?fnp0bjoRt@voXVP{N&@o^MQ z9`i*WTt(U4%WuJXDER$>IM;k~Tm@cTFIJq4ehcEz_jyWcZh-b_LN`5|#o_Ya`=*aY z7w9-=Wi0sE>ga_qqm4#ma3;3c0xvr|AnV5r93Q)>Fvpt(V)7WwyqG1*Xbdj6ic|3G zJMY@7YvJ)|3{EzzoqEg(V|P>96<;Xx`6PME&Mu$7yG-Jg=uJceK)|nD{dy|uXgnT| zj(s1Td-FxYz&T|!zM(D{gUba4g>^5xJ@~sl5Eb_SbjclO7a{iw0_6KYRPoOKuOo;K z`~O3H(j7%S!1z2J{9>!>#`Z`U8^ulh^l(#rqS7IZek;CNQWB(Jl7x4s z*kr~`3X~Y-RzyxK_Dumcip8gQc{dcmam_aS;MVhfj-u8_jI0UXyi0F9l2EbxY`3J0 zehF8+f^WehAC4&n`~;Ha)7$XBG5@;x@ub9diilEjmahK%=Zr2r<>WMlVG}!1K9xR# zpJ)nBF7KigoaECj{cCeIJ%=j07-d|7Fr$xL80j8JVP z(^=V@%g9&G-dtQhJAZQV{`7}3zyJIvP=taPPBf<^A=4Cc{`T9W+M2E|o}9O+>x$8s zXYbmoix+$vhs$-1KfipxuKeuy;^N(#^HYVT9e9{~YJ}%?7s? zh(lPpgI|Lr^4Hy@A3TSYJF3RhZ-r-%JizKJsNg6Uve}43kGYqL+qzxnSokNR$od`qY^e+VmIHcE^uAoENx>Qg60r+*bf z%ATLkaJ;B}5&G`>75XgtFoli9eq^;4`mrACx;~s!mw0W)ab4412XbBO&PZg|1`@Ti1t+?B|A|%xY;TSXQdDqLwdJL)iA-Ly7w)@bAvU zFnQ|vl-;p}E^AR|mPJ=t5-(7AV(HDFo6XD6HPlFwka$j$vwFgt&|fX-iBG)cC0#~7 zN!NdODj7g28GnzE$9|T!tI2MJL%w@`9`?tA{jZ!7V2^Fc?SBaBs=00d)9}In{~({Q zzzc!7|H+g1vEN4PX>c?GU<__Z?4=rU#527Ue*^#!3IC43qm%U|x)&+XeZ+tC$&~uy zM*)+-8K(q4tdb-QL?PxZ=#m`qzX3nn9s$>LlI)9x=ejfyD^m6qNs^f51ZB=Lon8O7 z;Xy3Aj|#sO5+WRdM|86&i|&DGfl2Wxvs%la_)ynN1XFxzEBz*VnJz1o1f^fHg*qoH z42mC4iT~TyNNlVEJEI}KE)PVN#EI+j#hm!>gU5@n9I9Efr2PB`P9 zZ9gR3TrP|>k9I1`MfG(qrpHA&UEW1>m!?WmMR{e{qIZ8@3$0{sswfx>f3#a6Hu0gs zYFWjA5S_oGN8r)ME>+dUt`tuj%5Q3J;C{F2izb2s*SQ6)CDV1qi&H2!Q#VYbO0)Hv zxPI=OW~I+-OE%3IFGyt51$Lbx#m?u(+6UF4%rbkCwS6x-R5n@Pmlov)>~_;JFMR}l z@_c`7925SJDV>Ee1-wN1Wk7F17|@FOvc*DEM=SU!k{p2(VS`T_VbWFj6UPn7Vg%M^MnDoU3iYT{GbMF6F8Ojv!=JDK5v$kjKK?TkO|}8Y8S#9(G)*bV&Vs|s)@Jzsoxk|_qv4yDx^{O z^X?f`QgqY(w8wRQ6rb(+;xX~K8~qT4EW78h2@>N!g<^WJ-O0E6X%eLP$naO0*-Xm~ zT|*6J8*xYeX*kC1eyR_4tl~7c`{^Q&suSPtM{)+NXujR4u!2x>PTc*J=4u=!p%eOz zMCDmqbLy+$td&H?rvcUOem2|6<;htaZe(zF_p?TI&o3{}TGDK*Y)aaWvm%O2sV>@* zRW;d~c-`jZN#8EEmVL2@SEsFsw%cn(TAbrS=+d*MHCcS}IsQ6yvkmEM5o|>K$8Gqn zTd(IdVcDYX=C|%rwiNItyF14`m!=0~o?bi$1N?;PG4ML;!MEbQCJMqBybOu^1M$=4 zExsR3Y+mujXXyn;z*beYU1{>+2w=m|j822N@s)HK#!F5Fn)g}p*+pkw7T@*t|9V{7 zT{nAf`mf_iq~G_#fWtIU4_%6%`x}w+PFxMHDL*xKhuC~y6-Uktt<@g_%6nwxUf8(j zRqt)Z4lP2KWULpY)2dVAlXvZT$dYlP{MRSpGJ9CTeY`h2@GhpVIKXGWy!2SIb9k?E z@0Et=MUc>W%wzn{@?6RZxDc-xh<=o(dJBSFoY|LLmS>wp&G&l9a;Fu8b^1e@!Ccm5 zn`#(mC^_`qlAh)#ZKd6~?wk&4ohv&Br$RdG9|-fD->QGhq3Um=QFVcAE^L1Dg7gf} zcD~OY+&dE|$It6$6L$1^jhFKxTW*l`EXaS(ra}Iu)~8+ywtV{)(`Lmpzox;^|X^`{i+$)xNVsJb6f%kp_v9B@O?hTxO%&U2)!h4_Ry zLV#$)}NhAt6jH&&5Lb!X=;ayX#A)L4}2D+YYjQ&$GiCvN>%Q7Ne5R z-qU8orFq3Nw{?Z2uUHvy@1n-E#EaAX3et+vIIVU4rU2P&L+v)7ZP>Sgci5`$1HVpN z*9rckycc|&UYr)9WAD8`YGrR`wOyID?uUp+$^xmw+W;KDe3`%N)Di+nN1?D|@67sw zf^3Sdlkt?kB~?Xvay9nb?>4-%@l&|}m9IT}&j2C4|7Bnkn{ey?mxi%+xc~JKpYeD+ zT6iuMm%WnE;i1u^&HG>A%}sh#PQV*}FSh6q zoaF9Yo>XiZ2K)}=XfzsSfrt6$WBQ+09xGqueQ}!oBqGw&KQHJF<^BH%c0W%(L_YBX zLA?9<2wr-@HRCr%kH%Y{-EYR@qtcg0)kSu{tNC;&Ir<1T=_U$bK!~9zv!5>Bsw&L> zbry#XWsIlxpgz43ubwf!`mdok<7HnxIel^U3Va0Lxilf3&;IlsTP>F)zWdXY4-pAm zMNz(+z%nQ+kqTu%v(W_?VT(yynT(j4r&YPBotT|d^gEO+)~=#ku7bm2!(ONz@bsX*4x7* z3f*!3k8vKz%_d*PlqIp}B-DNMr#)Br-Guxp75@&yY-)-%43`z5|OFrdx=Lyx*9hQqlmh^)XO*TT5H8+X>w-M zC9RA{al2K`@w7LtD+0)qMaXCtwjNWSwTrquOu*yDbLy;kj-7_tE}g`EXMM^f|Kj-N z%k_k=RD)vwl(hGv_t^t!JhqxEL3?7^hr}y}+d(#>Dq0<%z$S zD*H}-t@YH`4pYB*>hE=-KTP@G!IXz6``7s@U^(ItC-@$?hmUK~+9U>=KRhR_?73M$ zJe!z=InW_I&-147Bm^|z3736JSW>^}I zKDpBah#PWs2xl{HPP$wB&r_YEcZI~WD@I*FKREu1c{kL*b=OXE9g0Qk=l0dBK0tLKlLH|FlRr-oQ0KhR@{`hpGmu}`**eC^6Mvu z>5E$Xu+TnySijHd`+$q?VcLF@X=`WyIu@pnC=2~fPg1KW63?NfUp#wp$_KEkb>*aZ z2Fy=xvoN0WyXwM_l3VEcOeM{X?9AGM(=nos(l95#l@u-T=W`17>o@-+no19}^@OwH zq~~vvCUj0?Fz0C>;`HPifPLw}@5sE5?AAJBSL?_~JkgcS%>3TeDNRITzv54u+ewMD zle(7pkr&XT8%=?Rg7UPq$fmBQTPjg0)wP*PX4rx=>Kd*-a}YEPh{<#Y9UW5QQfzD1 z6k*qLYzH}}VQKO<3vd44KwZ%`>2M8Vn%JN&ai^wc5d)isY1pc3>6#8r3qu!~7+KED zz%x3VB7FI75oZ#?ya^xJ?esp8DN|KcyQ)-lnG zyq1}{mndSk`d+a5!0RMD)#ilXf}AYV|73$UQB@U=eQ!FQj#=nj6W5IqOX9KcNpsi6 zIEuZ1<2L@>6mgOif+!J5oW-US58CYhI*-Ny^TY6Z6^$7Qyu|wl9TVRdjZ=3lV({5G z1qmCD26ui)v$D?nWV*`;|98&Mc>UnMhA}L4p(}AMBf*WU1RhJ2d3ZCqS@}V>3)ZS( zOM*J&>8xVEZuvomiL-CHLm~akR4i3d$FT}NuK$Mjzx1T6^jLaQvihZG75fUK0t}UD zltr@i3#&{+$^ETv<$m@euVrSz9hhN2xx`{B<|Q-`){wPnR9bAvye;>wB|&Y2YbR4c z6B0!NO1d{53*);y+hQ&U!YXlhEib)(6PjsiEmS8hc2J#`s)Ii#)#-x|Q?eea z(-I%9OYT*5hTubKe`|HZRP{EyPFn1sI=Slj-t=&`I-IQzXRF_VvL23ChvU`Zc-32X z4kxU`3F~me>Z?76L)PJtbvR^IYY$`od&l=^kQ`j-2N(Lmg?@0Me*zc!KYVXmwfsP9 zj0{yn+b2h;AO*s4tnsA>DG-UBy!+B47H;2TSx&Oq%J*H5IewVV<4MZ;pD)L}vPsA`*M>zksy0E!1g+cc zO1KvW@C5c_08i?br`48}&+LvnSx&Z}ootthUgWjR&^RUuQHZ}Jn+3_59KXCc&TVKa z+`_2sX=KajVm0L=ToTu(@g!Yec&xS)UQ)Cf)>T1Z+2yrNxnhu7>%ud34;ec9GtMx>ZhSS~BrBjate6bRLj{StC z0t{DylkJ?UK3TFk&-l8-N8dX3!IqI%Y4vAotBwY?X4DO15{c*P1x$^dg?B?4FEEM3 z758-`f3722QpU)fPF`Q2Q}pcV+0$ole!P0Azx!D`y*mEIeEw8_`|fAcd^*|g)WdV| z&?0&J=BL+Z=%uOY$4_4B=Iircp1u9=7e76D`sV6~pMNoaxqp!~a`4b1`OBN1p1!(x z{j+guynFWQ_~j3;fB4Il_UwtSqqnC1?&|(U(#S#IBiSyLYe_KF5@sMgR#nyRZV6jc z*0ZpR(qpSaq9|LRucwpemk4UeC~UjZV!bNI?JAeJe1r-~W!%~`UCqD8I?}B|UX-qswJbz5 z4-Hy>(C3&pj#x427jm!QQ`tqC6<{nd_h-;4@r^~4f^$53Ix9J!CmGe`Pb9%4nHANtN-ypTX#|n?* zaL4^}zTEZGib)aTqnedn6RX5^X`vmLSZ)5Pd=8(L(@#l~*%cx53z7_?wamiQ0+8Do z#3mqTj7z0m^55vjKN$h_CZ*DXO)eeG0er%u^Rfy~TR}p~N9}mB`b2`j5ClT`bz_T*&ms6+r`>GHgcq+OUAf; z-2({x=I5!1ICLDd1vU~=e7K@>x4|D8(QRK|$MRl8AZCx)f4{|g$s)A~zmgxEFdE@pX{C`1!Tj`EEaL7zUo(wJQkD zuy`haaGlLH`S0rHN#(cRV<3%s2>&}5=x zkHu2CQYU8r4Zd&-BR*(?PdvIz1m{gpw7tzRVPn8-xeFyqttW!gEq1E#z@`AZNFJiD zy$v-G6^6-Zp!uw{*`&Q=#Nlv$iMaVO+Ptx2z`Kwf{J5b2uDGXxq#-9b@N`2lD16+y zDL-{neCmFzkjM2=gI_B0-u!^=zJ}75?56&gSyok>4NuhtBezN?-kGoNc`>uAZ`PMK zq%Cze%hIMJc0yjawzT0N&*iix=ce32McOQxy4%%6CunQ0lo+G; z3+2dUpu`+@RW>L8F^F57u%St9aIITykYZ1>j5wsTVPIfVXh){b|Cmqj-4qRtbNS0- z-wV=8J9ZL!SHhua@uQs#m(e6OG3L}sG_s&avwQ>lU~h(p>mEh65Ds*LyF=LHXt87Z z^`rCO*Ehc#X%>a~1=Q2AK(ZaXIKc&+6KY@61n)JM^Khb5UZa}??%}ntqgEswRXO?^ zCgDfFxfbeM068#wEBlOJZ&kl~gm226k<7P#T#JB=)^`8}cP&lYU$wVhP z+~j3s2a5Jug9hRc`jd}%mlzqud_=B?d_0q!<8fT#23gxa5R~(*(*OJ-qqVA?WIg@8 zI+H-kRwD;DOP`2ai&A=a&T01kin<9usp@M+&38a5NDclCXM-9AUQ4Q<(TQ`auMA(f z03+9z?CUU|f#+8jyA5-mZ#D6Ao*yp{r}rP06V+7DM>Vfbp2$bYgnVt2vOE1e3XD4W zHn!3pMiYnBh7X{Zklo{omLX1t_POA$|DI`FBi6brZTjyqxez}tO%|u7QZE=XX6fs9 zRY8jW1~*)0VR5QNqBQ9E=>`&27(x{Y#B2#l~{f@0s#S&q-$kV_8yGK``Z3xhImq(tG1C!tB zdnygG${f2eM>|22tpIW6(1dE?xcWf^5&Z_-;>!x5p}Au#qg zaLYs1E9zIr)fnVsgk8!5mA3Q!SZ7W+ zx*hSeZ-whRmYLQ7i1#;M#FkpEb8|%RCMQsH(Vd}BQ$*F4X@%et3wCo%1Uc*$bKs_0 z((uxGs03vT2MT*k>k2*%(0ot7ec+!!cysO!{uK zA#;d@*@vuVh&@@Lfml^phZ9H9N|sgWgf#V0ZZSE>AV+EzpOi~K7TKzT126GBKGt`n zF#8sTAB~T-d%|KLvQpFfA=)mN!~o?3J&YHdXb>>kqV z)@M#Kct~U?Xr-+&PYI6|btx1nW3aj@qhTP{;fi1+u7l~Zl5g*)A5FRHJ|7yigS~8X zgTFt5m5_?!e=sYZ@tdF>ar&v^>oCqGnHAM0x@k+Es?aB z!241k`p$jWlw>0v2~sPl${u`x*c$sY-cQmR*dxo9`9tu6B2P6~T6eb2tm38VbLyF1 zYYgSX)5HkVb39w&i}GtBMCLf0 z`H(|j5Xonj)&qdiG&=Q|L2~b7;Og?S18#j>IC~ZTaxmG;*o=Sk%dc5>9i`5L)t^+n z$E;8xoLYeu+^j0tP~&D#ryFFp%YNPw>oA{Wf;gO#7(vMEz4?bt(mR4TGjilYbp{I*V{K^1h&QD~V}I3~k{9;-iw(`*-4%fzG*7vV_vXpWwNYPh%f*W&P z)$8r32|T;e?LEJ!7ryq&f}b(5W0{E|T0BKZPLL(%Mx*mfMQ7(Ym)%+-G2fg_I=aIqgYPLX=np zNH0RWl0xp$aTZkSpr@C-r18g;NcDOAB{u+L_!>}fb=dGoWe(uu`s)e!Rt&srY1trd zY$o>G;Ioi_|2j**|UZ;5Z{W3V0`{?Tz=K zb*!U~jCMUj$XeE`E}nfHL>*hIi9;s&EA50MC#U^m&BZvCw9%T_WzUY2T`Mc(wkaq5 z3xH0o^N8QPVUqu*$X%X}1rdr7P1}8X=APew*{;75LMY}Z{76XiT<~-LiM^a}w;RdY zL3VxjnV(YvfhL*h^d`Houe3=PbeaQjy z(N4XXmWSooKddtUsWS7Zc(QeGnm4Lmfr_LZYB7J>2CZR6iELl8ZW+mJ3^Z}#Q<=R} zZsfBnifS&lG-~22vMZ@NPKM7exJv{i`7CHt(ymDx_|-*RHtJAe1oMw+#=#F|7L5EV zoh<*O!7)v!4d4`gZ>+G4McbGyj=anFiYHbTw3y0jmYbO=RlC z4$C11Iwx=1%K>wfvze*X`4tCOGxOENF7EYI?d?IRcCSciB-`)V)YW~XuYsPHOho=x zX*|e5(G|RaZA`=ihs~$V66@4FH$AdhOGqd^%};U;O`A8v8q(pn4e9-_X{)UopZxT} z+nb`nBlZNeWqM%G8iug`cV^b;q?y=e26!O)1@Ym5#5*Xk*{SRCK6LZe@5oZS&*OVE>WgCpp zGke`ryuhAO|E0o~6yI0Cs}S>-%n$q1-2}9r0;7t4*^KQ_=VG<|>-WTs$K_=5TO< z@JIe8HuG}f$l|iq;;VfLdqye?*0G=WF@lz)4~^gv>L$ijhV-a?Q)(E1wc)AP=-6&U zm}*5AcKvv?L)q>Re@LsCeF?TNn9Va0f4Vo6fM1NFiTl}ib%t2z(W2n6CpQSVs5Vx# z>=`_Mk+`3^J0!_5>gos#x>>jzlu28ezU54o!$w}lQ4-Nn3V*}!5vgN&@$Y4S=CP%T z(s)Z#@7EP~?cfHy;^=eJx5xYb>!a)U%&K5g#!iaf&bD$qOF_t}hj#N9mKg@=X%X{lPSeD$# zd22UxsuGZgLYv_;sjsZ*9W~!^byVeL)QKY8@G_`#cH+60=X`S-$W2EJH`hMHp3fkY z9zyWuzZT<9;a{|lp}+Mrp}6VdpXDV#YG(UQ+WKuWoS3|}flr)C7jV&b>WGpx*lX=p zt4HBTgpvk5BaQPJ!Gkou1S6Y1h8g9*94-EZl!0vdrulT+&9vzc`3Y2{7D8Hi_@gYe z>W~ewCTNss$!ZDlSuLIuFN!s@-o0C~Ahf~we0X#hd_?9Q#)YppO#4Nyi8{2a{}mzi zwW}$u4u6nN_PCPBn<>A4^%zSFzN`5@ad@jrLdT2C`N{Y6mRLeki&gq|UF$mRMlWQg z@PS6kMZG2g^lm;Ozf1BOEV7f;kQdzM>vOsH%lq>E_7yQh*W>O#SFQ9f~vr_RtRUiW9YFnW@C}z@b zqzPN^_tHAKUWjCpsBFVtOqaQTGuf*u^`qcFy1l{v9PvRfpP(GKfKxg7XhTFRimW_k zvhrlB?7(vV;`Ke_Zo-TBUGOq&4;=5zm3p!snB=T*^_Xm&xQF5Cl%-bMfNJYbKD79a z^=9L?TxE;}-f>3%_SfKCNu-8Ewp!!uh`$Ma{?L{axkVk%KNpf^ z7Pqy-2~cyPeyZ7gvyRe7A?=BrJC4sk^tb20yoePYIF5QTLPKybE4Kd+>Tg=xm`_>s z+=WEOHgriwY6FJLkx^(b%G==vg3Id@PX@}@ubF_MB7recU0Dy~)gn;Yw-o8Y#1mGQ zV%w^_Ixkt_p&P=(R`KvULw<44!d$kL*XJZVWy&Mf_>4lbxq0?Ux>T{8HeJ4K^H!A& zvLi%L!4k&%L0Z*`ik-c-WX_iAfzTxuBgoX}+1%oiR~_AySZxYea0|kTcZwu;k(DSL9=kczTeLD6%h*-ptc=Ej88*C^!0}nPVt{jqk-aOu~zVMqo`Cg1WJl)+z!6kh8 z+|M`Bd?y5kZ5VZ?r*iFGOsKLXs9$_Qc~TGw{ra7uoKFg7`58@VXpMO2 zksEETu9b;PuVV`M^@|Y7Yl5MSdg_-I(|RIDG%w+hOcUeCgx8OWXyRJS>^nz_K{M%` z$aafY<58Wk{T~Auh|T}J&-ljMdwx#9`VBHwQ`x-TC7bMU)KYWtqu8?PwD*z*2D_yH<711T&WWkHtk?a?bySfqF za&`p89_Q~`xr2!#O%s>;uZo@g_M;`kSF~@j8mZe^*dul+v6GMi!ePmh%HgxGJ5Mzb3;h`eahekC6Mo zr%chG{~9YFjDXqW>SBI?yetZm8wK#2%`#c~aJ_8IqZ(7AJH8%oUAhHOMOA#KKI69$ zbVz19&?Uk6TWIKix>vT%uZ&e)o-q0Y(yH0Tl-{o8+iQIc7rykxBVd=zs5yNUx}Cpx zr`9w!uHg_9tYU9bN-meifI;A;Qv4oA^vj>MeGUE@tl4#nb<1z<+KwxJz(%075o`00 zFmhH^46kaE)zUU|$3=T3_IRxLy%;Cm0QZWLnJlYpq9gq}ECWnq{ZflTAP6K!dL<2E z<)0%WB%c?T5mG4(KbNkLxxZNv!b;}a!T7so6ZsOwNm9xRPG@I-)s^_IuoGOXzZ#>F?NP3fN1(|e|@81`G!;PDg z?g85pNb46@udH2mG#jNk!Hx}nX2|+LzRI_^@439i<1jX>*5qlC^NV#-QeWIWIjNGS zu~CFLhM5kOu%Q9+R5*eIpZy(kU#_7y6J$j#x7sbFso#T^#75m&$xs$IG3;J zn{~Qq=`Rp?>0m3CikN5&IrrcBTi9x!cm~=BxTzqu}|$9*Jd0uV>^#TBBWi4{xT%ZF`#!) zInb0@wy)}G&@cx7@!K%(NTtE(rg*vhfsQC&kpB8r8A`%(YO4QsQ~)8r=Pae^Z=NKI z-;ss$g@ekQ9O>9s8t^pdSNYA$=Y@nnjrH+u5n|j;ntiY32NpdzC@EH0TO{=E{hJ*4 z7{`fDn$Rh_H^qG8tD~c@iKSfo;S~Jz0)6reSQV^i!oJ;jCh+~0+p^sTlKJwRXd^{v zdr5C?d969c)Bn_u;(H`r9CNaYdj0&k&x_cSf@_L`qBo<*fJd=KQmOPCrmuwP-=t@` zbg;Gb_!8B=6jJR6ha=y+H9{x$jN9g-aPzAG8aYe7@CX z?%YSpci;EEjqa!$;ce}tnq-6$5P9dp;z8BxP6pK0K~45i`x>6`=5^LGZ+7LIj3#8o z8^;cT18)Jfv9!LkJyfGGD}k_TaVsK0x_xS?E`A;FqkRyDh1GE|@2x0-Mc%pAV;mQI zF_rr&;n?Sbl49rEO4#e&v7CF!h8XB7j5J)zgB3lCwoi*AGWW+5ai1Us95MdljkrG% z6k|Qpgu^F)hTYyTr6y!lXE893B{_q++YB1iBmK+W4s^o$bZb4&+~sH0JkLk|RW4RX z8%X(aL@TWNu4P)4V}r_JNOJZhteAD4A8BpJGA|tiE4hscAuIQI+uFL{l7mIvYOwdM zzY_{$u6J;~2qtPmgzfT2RJp0f?E-F?TO4BEo5!jE3K@K6i8~D9_?HDS{>rYZxZxnv zjXQ#$_E~eB-7HhNxFqH$3}nlhdPI&j2ASee@^7<(L-~+-f05R|^~x2aKJRX0$%0d6qg(F4gRaw$sI+TBNZ9h&Xwn+tU8fx=6kRCQY~w?sgdq z?BapCq)YqU^3`nak!R&hVSdK9Idw|xJgI9DgEbGY!|pyiCjR>C@8SbJNpKlH&ELCP zKUgBC3@Eg4@r1@F)T|to63hq0TDZ6cY7#}MYZmFn!@P&rPnT9H13D~Rd;(>?hgrfp zTf|`t!vYpTz8si*4Nh8)q$~Q1&|CLP$L6YLh)r6GoqA6QRkRfe2+Wf%VdcEO__ zT{33R_RM{=H7wq2x?TVqW)kaJ=zCFZl_}Th>!$5Fu5LC(q4EwhYJ~-1fvY28$29R?#YftMv8`Y8xF=m)Lz-%~PqtSIH*|glt!VG+^BEJaa2wKZj=n&3Y;CQ6P&1R=a1&(&HonVzP1K0x{`Y?V9YKWSiWx z33yG`!iR!lZ&fZA6jRTfg~pX!PwZ1GN>A8%&{H?0 zNNs@l88@+aRk*0a>Ol_<;ueQiH!Cu5`ZZZyxFrOK<6*!?}BZreZoz6IMz4WtPo&Dc);q&FHhE->U$6r=Hj!lZQ{AO~5( z5b8>T#p=1D-PZ-|b7%Q3hj_D=Rq{lN5)qO(6hM$|Vq6$sxR{S%qw*}NNN4c0okEaN zqr-3T)Y&(Qr|Z+A`_p>(B@_Z*&&m@Ix$`v_gYQm8q*WG~##$+AN6)c#=gfd#j^lwtMEp@J>$W7G0^DTCkQ_2B@+_ExKPc6I zu0w29I%rk$scwDoX1&%St5c)qEP?W%y;h)J+2-H~tI64@F`%krvHgE9A)O0Owc698 zul9)s!GUcxq`;YmOEX6K2ydTKQV6?fsMPmI1Ew#U4P8*ANZX@Mz*EBd8HpStR)q80 zxktloSKHeYvVAhWwv&EoyJ2TsqR+kFg;TNrT|p8HjYqn(V{P+19rxRF9q9&NwL$3v zQoKrULzv{_>!K8fYj1jMr{g}p+7V!$EC-6pB{3wHSph_RLM!YU-tT_LWGo+9@^9 zzT+)ytxD2zdpbAb(T&W@8FryacR94+B_siZ;x8inPLTdxW=_b{CDcloxzsQ+El><@ z2H&+W%FpecbrtQ9v|F#xb2t9763FBD7BLAwte^L^3nWShoRo~~NEiV#%W&Ew0@67v zCY3bz_loppDOAQ>te-OF_TQ0tVOBVM)jy^-$a}iX9@6$`XVIh6UdKO!=RArP{=pMc z+rIHTAsOdDqtNR3udUT{qw_qGb1Z_f*Lis>R;N+?=AxFFltMqWNo67sn$L>9*;R2u zXuPHS%E+Og_K@GR!}q4#D(HUqtk?{5-fDczd@?Bu*e{S zluzM?Py$Bw4-E!NGoD^eINO41^zwbvDU}WH>tU6kwzY-iijM@?cQ^q8LN&t*F0tO? zFfZ9x^*ZwpdvqyaEr*AQzMQmRt06EveCN>Z09I4sKoER=@O~_>FQEov1X++z-o!_i zHHZb=KVr$!__hm9ei;q!|jz7_`L9W~Q*G>QCj8h^e;nTwj{a3iRkD$QJO|sF^@dM@n ze|y)6HC8B!#dVcuAomH)Dk&=o(F?1x&ofI=f`8=8@Pr_y?f|Y zBD`eGyxPI!VktgnVx_ruM;IxlBC|X|JEv+JOb_{0pTXC^@|ZQxQ@q+VoG>d7;Dz4i zFE{zq_RAJ0I6887^rP&R1F4b2yC^g?X!q&mWhLe(F# zHC^dy+7%5R7+s;w@1O&DBgkn=1yDoXiSqwKB_D7~V zuNK#Z<(9=hh~G@~tas+({de@IA^+m;MV^hA+|d$*pO~KRkB>QuYp+A*lfB!+YFmg; z*^^+p3^nrhxZ9$rSo~S;I$H_iv6#^P&BHeIh3%i(OSTlWi4ofE8CoqopMmV7KdJLu z#)c~O!Rzz9MRS5z<%i0MY*!<9c0QG>P0;F@R3d!?w{W0--b9fQLFyY8xBe-i-@|kAMuVLpMR06-8qMu$Kp_IP;` zFM~mlN+>&x*tK(m0*-#L)$idW(dif9v)nyMtM%7>&E`TEx2vb1YkY9?p8kgl-7H_Z zj<5U2K~;+_R{>#itG47_#TYr=Dw$j)c-}sE-lpDQWypc|wOQ1FROuudj4@L!ANW)! zAm0_i%jl|C>A;oP$c4VvhVOtErXMGoXgifX(2FViJ0((QJw!_@ET5J$z45;4CIuBZ zOMl6@B+u0M9GOJJoUhWz6N5{aDGeyLB+k(HffWL&#eQ*`oN=YeIe*Bh>&Oe#dotIlB(9AxmF2H4frYXa z0w5;nglPT4iq~77GavSXH3SQaI~f250sA&{4nn%ErKOWmpF1f@`s^0naQk+n@WLRe!>uKv! zkk+?(s4+&yjds%s*YD9?j~eoRnHCB(U%@M@>w75io!;ED)y~DE$M6{dmfB!nuW^H+ zEn2o)%rRi3l=R7H*dqg_TLqx>QECxdOtxiI;d9I(l0haQ->~b3DL$N;JG7}jpK#6~ zfVtY)Riz7^G}A##qmQ1MVDIi|uF!*kGHx05p1gIAU3`WG?K*5DL3w&taeFDKb*3Ke zN2HUCYVcx+*7ax29(FZJACaHEajF;V_3fbs^;Bms#g)UL<}pvc+9>~;e_j9zYk)S7 z*W|&9^*`gS0dIknK|F5-H@zn~g!0Rj zR6|c}Um7F_y`+!MFVx{c=5Nw~+%$C>Q@`34hSh2F>LPILttn9ZR!>nH zvoq9GLM}Ioal}WxS5VK`R+ z?j6sTmPNc_2|1k>HveyvokHYF$op1f173PoBX|T)@O9Jr9aDwnMeFj8%&8F4#CyD+ zq4{-VZe>sXxauUDdP3a}dB01n_WF}W0OiQT=h5u^FBU;dO_)tpULU$sWlD2tq{ zW09|JQ`kp6m;D=BxFh?rK=I*s=hDFd2x)1FK%fbz-(DWaCkS7NLMkRfwN>~n@Sj|>eS`5FEpz9F+7 z^Ye5;fCn81g0gxb}3!Ky9A+{30(g^&@t_p@cXs4Lw?9=uh-_5__QYLA%}(QpYqs zz;7>DN?}$n8==~YhCLzQBZ9^&O68Bf)F1)I#$NiW%I7kQ=YhF8$Z^&wVK1I6&b-k-(qL)J$%>!{P?}&X%g)KL^fy71}@k zhKj{cw)#I2zP0+Y#sxH*oja3~a18g$(pz@oW$jp<80%xN!Qo?_Y;UO7?-Ix|jIS|L zLGTe`t*WwqT}_KjnbV^|uT6TUI$gwHt;PSLb|*MdtEi>i{`RdY{=_OOLPZk7(ntnf z7={o3vsSb1_Bb|vkI~e0a>qob zGcn7vRl>xU4ek|S&b^QCJ6N6v`Ykg_`Hjwe+O;>v=Dy;VHb$$=Dn6=VdNGbx9d-X)490S9A{_{33m%a<9HG2*s=zTK z@5`-91m_F54i#fi25>c226rEm6jv0FZ?LbcjN2I+E^=A>0+);E}*4#Qjbf();8$QIcW{Od8EZtVzR|BJ4$ zMsx?p6Y++=*RcL%pQmS*r}yT&Od(8q?kXBB87@FXEJN7I8?4 z#m4`_X3`dlb5Kc6#P>d)onjx$l6p()9!fgmiayZ>+zdx7-2< z{N`7=+O4nS=%VH7ee7F0tXIL6lx!J?;dzbBgn>%g`QJSQBRlcb-0VnRr>1x`6VZo} z;6-=-4x*1ZLnHHBk{-n)Z6B{lnf-T9E0Wo7m1S@QAUt@c^9B7F3@6Mf5RySBiGx~g zJkbj?(ZnCkl6X|HguY#MV;oQ3zTS;Rng@mPJ&U?HBGcM_ek&b!kI%ym4bK&^)B$@nvD|RH0cg{ zZK=6}x0EpAfa#B!N}fE<`>39*V4|7Nm<7F4GaH@v>%|NCL2jrq&c9P5q1 z`#B&;514c-0aaICRPLITIYeI0*6jI3)%@UFse)E&EVal(axclt$0PKWQfVi^j_sL;WuDhZSr#UX>5p+Jr8)u5y^?@yfpx}j&mijv6)sBx%$N8Qs3SR37ppBOI0~B8ynNKqk|+~5H=?mxvxcc!V{Tj1kZb^ zH{W%QKXQn>)P?{)ucsxMEaVqXj2GU>9-K8jCBvqvC1o$@AbHwZMZsi ztOdVzKd_Jbz>6zZpYWhK?1eT$M#EBoasK@3#0Lf_j@;{dG2b(jO^DA@cM_dCSIPV8 z`0C-vM=KF^Wr=a8xF2n^oTs^FMw*k>bk@XP#|O3IsQTU8%lX~9W|EZzqLtYU@7rTj z!z^g#-NKU782_6W%`5X{w!v>UlRtYayzR0N83dcZf0{%q$VAW@T0y2+o>Q*aAg?AG zm0SI@Z;&>T;5-}5N5+xzih_{b0&0FiEI_Zf4;h2fE4O(uc=eH0KiKT@dID8Tv2wbq zu!s>$JoR0^)nSh|m^SXb;7LzW#AiR}N3ji4!2*D*0xFB1SgRz0)z}?-JroHPohBUL z_=gta=1~1m-^&PdXL}MAuk&Aff8(*FRBwo365v zK0^Dm)bc8cU4s3ejs|0KI*HTrO#UaKZT{=n8B~+--stjkyMMe<%TqJX?!McF-t4DM z2aCV#_9t?R2M2%W&;#@Wd`4rhZY6^6E?#%;5`*78Z2f&WEO6;Q=#+rpL)1D2N~YJ> z{?q0DlLhCOSGRS#uM;G)JA)S`o|mDW!8hakHWDF$!S1l4GBqCZZdJO#DXre7*< z+xL8cRx8D3`t9>issjGNc{uigh~2+T8&z|Xpb{4&oi4YH5kvqRMWVc^8C4ILa_}WU z4uxY2-VKGswoND4Bj6;`kg)d(e(%xZm5(zT>E%ra(W;xv4$V-YAxD@g2)jk9+aN2( z6|iknnnr2=Wcx$J1;n%Scx`5(aZ^q=%kg;-Q(A;K2f0S1wn*(H7b0T){zYk<{3X6q z5FA>%XDu$Rs2OrMtofSpS!pkRaqa1=z5AR&1K|1INgMj)c0NtOol}E?0DiZawDJaF zf|iqB0;MMw1AWWtdjg#w3Wj1VXtt=is{*ZSuPplo<6shRIT}G%=mo3)NdM{au>~_g z;&sJWKO|nPKR8J*7mt)5KDwWii1eU6a_3Ia5(#*nqdv~cLMw^b1EXpS5Y`|^DG$U|CyRQu zFB|xwIzpoQd*^{MLwfe~bsbiY#sJz`ZXkc7Txx`4$s%>4=kQ$A_Nn9<%yCwdw#DIk ztqu+D?7~&A9Kh>Y*;`t%So|S7fC?26M`RqaCpf2pT7J{mR`t&D91Hc7LZpfu+` zmwOiMfjt2n`BwWjAg04QjZx6SR8u6g?cMTxH=sZH$?0eaOx7ASPH~XxMAAG%eiT&V zKr%JL%f2$MP26sTm|;Pj0Fm0@0-g3%AIAY*O&35Q4V@?ru0o*ZY;LOSJY|k)_40K6 zqrYK>G5@N!K^kOLU}ovC<0*}AE8nrgY?XO^I_4^~^f;5vEQ z)#eA<&M4%Ee34HdkEDhV+EF#U`Q&XY0RVwbg_dF9I^|qxN4rmAr$H-Sfk{q}ERrk+ z0pH0oL4CW69`IdQm-Q{nhbAs--6eYiW(;!3OnwaxyNx4uM`4{+)>Bw45OF6C*@(CP z#%+=EddTAUYQ*yhS%2NC2jwhPJH(h;zlhDSvI~zGz&RjpzcNcv-kz2yw2($rN*JG11hw#BMooTfwzmZdao(z|^<${cp%fs&^BhVd5lSPPXaZ(??ivM2k(~S_yuXRPh7S zhb5{H9+*|mF1+qT55AGm8!v(5rJg(_a!)oCgPFRwE|7%X!A0{i&q~Ovd&&SR{{yT? zs@e`(f;tmx@C1Q%HjZFuHWzpHjok?<8cMo|?7slGu?F4gvwy6cXk0iQ9>XL50CcU}I z8Gn3W`W9I|J|>0ZdK8KxKSJwtj_${UTc|fuiL@z69fzBaztfBp%H)L<{NlmKe*l-7 zXi%&Klo43@;$-(E7WQ1J|NIdbD0uk;?0?DnZjXA6b`N3HM@64tU>vt;`8E;U&w-lm z6NNxBV~o*hDg+3AL~6yIe4Cd~f`s>hJ8s7J6i)_=?evcVhK^_GUkcp2xCDaY!h9&5 zmzBsrEQSlbyTupR$G#2eaMJf{=couhhJ=soaLppC0Ca6kPU;tATcMt2r4WL2+~a=lL`D0#$-SQc5r(_~yTso@A`r7@Obx*$ z?JO0o^+jJ)eg>J8F+>ho3F8~m;0U?lzB%ygWjE7*BUO*|(VF=i0ul#RqQ*~u6GP~L z8ba#X?z{q1Z3B%ymsTRAE=Bn(!fmR9+IuAfD*d z0^ojA=KY)MbId2AyMxW6G}`ljM?0ILR#4Ha2$IA!=_Crv0m%^-!?z35#`SN`Pw$c! z1A8QPn&y%2zZ7^EdOqa1DWHhypXhfR zt|9E}KlJI6sdFRmmP&x4W+xV|TZ4YMgYx-{$IO)N`dYxS09@o#w`gHD4T>WB?aibw zdO2jR^L56nXd?o8@!ENn?pCS2tde>KEg9(NB1~=31#jCVnz}7!!Q!|-6SavKuj%P?>LF^fydM+ zvq(Flu9^tKA=bEXLmUDI;HJE6;hO1&l_rK9e({YRUXyA}ycgHgfKumBR|ON9HGk~# zD8>f?hwb^Evdt_r>ghcm1i#d0Q?|)iYE(iey2zGbv@a2zS!OTNWVEY=b6yDq>nGTU zk~*0|?$7@Kabl0;S#tYK?mwve*PNAApJ^*e+JQ?&S)SlF$PiR9xY(w&s@i&WjLb4v!L+)NJldJJw4(nRY= z64xj^{y1Xg`+dh^oN=R0^R6HdAp_ZC zx=87hb49z=6{l>Of~qhO>{ax4>ZA3CZ}Uds`}Q%PW;xZgDZumve-ndoc^pFZyZg$E z0R)pX_y|HQ%D)$6tHGW}`oemVpMD$Kx9ICJgl`UHrI5%HhYhnk?cVZ0JC^dk)@$>I zt2zM-zO`7<#uUc*kv#9QU1ej5f-p=!)(b83wOi3|sL%Tt&JClJX)h>-R0wlNFjPqC zm@?VkBhQVPDX16lzn&MDRzxJ^N}9rs%ok^QVn99VH=Lmd4~VJhKKt$awIrFkXUubB-suj6mS> zPu-^pP1J)*+nN=3rH@M1)`Sf`YZ`m-{EGZe&b`*6q5Oarj5NOctvh|QY zy?anN^ky-OK$WqTgR6T=|G~twi?{`Cl9;(kyis^$HMV^e$h*M2j=8VXuPR6X(YX76 z0HHu$zdh_=#3A`R;lZg5B}h<~VjqZ*gD#Gc6MIX*a=A{0^-0xt=R;4O^M5xAl_M#~Tqf(W=75Xn-6t^iTwL+?x?Ad2IOE_0F(N1%m#(rpR<6At0* zNc=6FeJywDgslqLQKYW|C3G@7vIO8i&(2R&Z#qeU0MI~7F2D4)Vd@>z$^l;l^B848 zTts5*LmsKt(%bC+Itg9unZOv`!sSs0f8qnUK)#FEd?E-u_ZQkn7}2f;;XICo{+!X# zphI&rAEC%cF{1tLL?{Mh9Fe$vz<)jW7s~W~3)%W%fuq1@=6bSrZG$VJhtu`NBXGI& zV|XV$vquMy!0{oFi}Xj}*&#STzP$W&dIWy>{dds5;Dg%8flYXn92cBVV5uP_tFtizt{WNO?CD>XNnb&$*h4 zb+M=2rhW4KFj-w*{gSC!cFT(uCCd8=$x%Z7g3&Kmu}Nns)K_(rCK^*Hsjp)Nud+Z zp$A+TLn@F)2zUW>nUR**xePZXfW#5@C#Num0>=sT<+>Wgp(hPasrD&SRl{)~Oc>#S z9hY}JNVo$nb@j!RY&L&Jd=H8^Q{>L+0$akJP%y5qsTyCB7|k?4aFOOjm^o|Yik-U_ z`PSYt;|EHxvT-~}ekN$)?aeKWT+N041VzD|Xel98*wGzb?BSTnPG*1;#H7l>BM@d~ zI#&y$2*De|ye42W$J}~=w5!Q{mbw(Fz?UcqohkB%To8VmB44`A0usOD+FY@dm%*H^ zC0w6Kg&Ke_!kBqMh1w?^PhWA^F9!;eyjvyJ@hug+1@JgiHzpjA+0Lzsn#!Q4dEP!q z2xWtzf=fqiD4bTO?=EFGlPAgUty~KEZV(e8WWfwBL4-))EfDaD7X&x+5b#s>)YfFf z@LHAm@jN6{E&JkPcQ(O@W9Ea1A*245XYarK+ zbZRF`fU7w!S{TxUjD%|$EwMk!<6xw&=Sl66YI<-n(Qy?Sk#*3Pswy@arENi5{;z*U zX#79_^H_#Erz)|HgN_?Gq~ip>gTk0}B%CI!N$gMPM;|${2E#DPx37tUok#r8E%ql` zJVo;L;Q<#{m;5KojFII+>8L)B0t!#ftO%T)g2(3{&Q1?$%d`cg?FiY@*jpaRa~HIS zX`v%v_XY<5e0Y0&`T7Xxx+z6ex>?JH5mDon!=40wjPByL1H&}gNHC8Hc9TW@%MWLC zjI-`?E^~oa``(h)`vQB2%lu>)oNXbUOStF6fu67t69lve-UW>C1kA~eNM=k{kBW!K z$XPlbs%ltLKv92J%;;3y(6`w0D7Qs({|QyE&qkTc6sGR6J1wCWnK5;%#;19sm#Mj$9P24$jCDSTAAfK+b>BPkB zFA~Ejo`)Lu>vaxS#axf%vQE>$8-a>D1aoxf9pxz&03;1X)0j_C6>ZiC7Slfy{D7HB z^M!u;LX8q?Fx_G@XObFCZ6c`4*kz%qS_C6lS3F!B}`e> zot6kWh^I%%uVm#w`vr_K@?6Q(ys;vLBfl}8={3dC%WYE+IWcm<7ul0+B%W|Gc^%Wh zbBV+#;=ZIbD#cyJIe<}qBup!Y33{iN4BlWA7Y?8)bQ;r0akp52?Ud$!wl%%?eUJqpBxPPd_-|7Awre_hpwJY;0i+ zZl~Cp^6g&iF`q;FCc7Bm7wCBvS1=G&U_a;bdfO)ZtFKB-Ovw%aL%qt zsEU35LRXJpm{01<3+Q~>CAo}tbb%TtMl-rp?OaknuoW?iYfR7O8 zJJ}ZqOd{x@@!a#44@5nqoz;3?&=>jjvaIQqT0-{8v)eP0yQH;)-;G7LYEHW{b z+%G;KkMSKxFLfIqI!rPhkv-8-f-=!UVkenvf+PgE5Luvx-cZFWz9t*Xmv|O>=<%BX zx+Ca8-$Bvg6F`4H6F;9wcl6o$6Ywr@(K!zTm5Mz1nhyw4P6bq)3#dF9AR2HU1q<5f zil9=i0A_H>+&t*lIgYp}tcXi099Gzntc{K=R5wYWTG1M>EEuI!;s_@)3)N*AKB5^H ztXwp#Gbt!o+Clj^GrmD3ci^ugI38ms7quY;Map4es8AIph2{>n3;&cu@@#2DyL-K|PK7=pe40}uI zAXZT10^o26#x(t2LBX@3cHli;sTwNOLxwpR3ZI=@N@0R1KFXD) z@|LzE4xGSiE8i~XA;Y1ZA^JksM_-=se=q4DS10Gf0Q_)z{zV1nODXzEEUH3y>jOwv zW@)sh?}7=6Q;o#}cPJ};xOl_9GX0irwJELV1RpW%xh5qJ=2SPaU|`nN+^UuDm1h(g zYc<>ZXTfLbUK{(;&W`Sv6!jN6V&dd0a>cSt8HPkRV?Q|{#(meyS`GUoM$iSpSgD7W z{t~h(*l4ur2uFN~;Q;&`j3v}f}r&8zrf? zGqwOxdurRA&t#L6VrJn9w1MeNlawA63|bLKM%B)GdzS4oR7)`aSrJ?UdCqSA*Z&+S zwN{$hqD&n-J1x4Mp)K%K8`?7JuD+oyy8x^T-z}G=^5oB!mUa@oST0LtE%$C|C!Gsc znA*qlIPkE4qxKyST~vi4W$q_n6vR`0o`#7hN&uq*W_n(jr1Lm;~VwM&4BPQix4_UhW%55 zlha@VGmrLSo2jXZo%Vo=llBq}Lqyl|6hHkfs!r=lqGwY`{!!GI9tKQCG81f&(3;M~ z$1)D$FhdTdF_^~y-Gu>3A|FNV$al3l5qfx>?^_|mG{Eoi8bN}cY}~Z0`#+-BXDVCC z;DE1lStpfOR$0ku$KvgdfIq?hT}9E@BN}vAC_J4&t#5pxxZ@?JbRdWhWr2uwMC&8D zZX#-Y8B0ky8EtXlTvmL<7pezBMBtC7M;vH?mcF@ z!lm{yH7S++pWq))fzdWBO)p^L#{`CedYF|3Q_g_9dUKg)mo|7t6*dp>Wf9X1VwRX-!IGl$-#j#Ce9nUA>|bk z(;i-7dVdg+f#O6S^i{D!+kki=9aVFjdWwgg2c=5(!{syJB7SsZD?47HwrI=q8Y)fs zdM&*#;&Qc@QkcZ%*H~#NWj9@Fa1=j?X#MK7Mv}>ZvX_&D@2**IBm|bNI1*@nz%F;h zGz*%^@&eW!PtC%XSqcn6Qj8w~kja;G@;EuT0@Sd6DY(W#a0Es$TE%Hwb6L$X6cKb4 z!DlHw$@Z#`~Sd= zf~3)2GP`o^t+MlqgQV;h6*iWSC_9E8I{$d`MEv>c{0ZfVCjiaDczKGWCqm&pNvGTs zrmR@f6UuNbMnc(13K#0KY8*sPlDj5kiIHeql&=4TJ&&0_Y~AE9lN4)_a0Bq=9K};| z-1QUlRKx*SRy^V(@a8ilS8UnMc-g_~k&rK)|Dxnv2jlB_imo~MKfXK>Ma3}v zC%_Lfpv(wm0Z42km`;{ykoYIc$mf-)IQZg8Q+Zp&Bi%xtXdyy#b}|W|J4_f$Iv&Kc zC+R4Q0HowQooSghiL#?43!P9Ltny_rk2Ho-q2YsY89IUgZ+XcAb6I@JAo$W&vRFVs z<|B=VbNNK_VX_i%(-|s#@GO!%;yIGpG4o`u(6Q6Ve8d(Ff-F9pq9BA5abhAP2annL zoVS6RwNXmMILE7RQ&(mn40&c9GZbJJxG0%3sk471g73ue@o{xg^#2n`8#&=Qj!sIU z#wjH7ppizYAlwBHlcpVk3k2Oy5suM&YOtowXU8LxR4$T6*$S#@5J|TzD*J}u-_Q{l z4u>ys-j@)twF_rSeu#3)rTRP!eDHi2UczF6Fr=YUR;?3((KRI8#j{Oip*sx16Y*GgdMnsQJ4@fS%y6 z%u>)#l%!;6O2ZUJ)VPXo5%K}_)bkbx3Uf5!jf5dseJ+j;R|ld}65L#Zrew9rm9(Th zubny^xWs!jLoS{(S8IzW`)Q?G7lL>ejtO{tar{;rLFb0DS90R%P)>A#GzpXBoGB4g z2Bokh*%A}FlYM8xfLENAkZjNH690zy$7ihekG#jefH8tG9rcMwL?im+2@|XilzELv zx|4~2<6>jR&;ijJF$C$<5V;7!BVh0e@=dVD0!CgiAsh0>0!AGQzUPhy<_<2a(JTzu zXE0VG#4$_jJ>2yU0Y*k%0u^sn}YEPJ$Vtf4BC0zCx6(+0aog zZ4v@0-P``6L=R!##S84R{EL{}$XifY1|$+g-$CsIP9xhIl4(SV$YIIiFjzWD)xkjD zvX|->M=P_((PH2Ez64ugKY9e-M}TdL0S}W{x#oec(dS{I7Ugxa$rMk~CI7oY{pL%| ze`R*?oGF5#Cf;c*a8>mBJ1Rl={u1qQC-6xeLCg~1H!^s5I!EkJG_>HMB^^izp7<>7 zksr9I^T=lxZSupUhX?f6W#(w9BB2O?V|FHHsnEo8RX0wgSBErNn+APXgMN%P`R4FI z{#8O`9E5=vOqQ1+W$KeHDV1l%*%5JmPFz-?5mtkib_O*ntEwkSTGko7ySzcSN8rD( zAEOD1{=wKo0=}kF{l9o3QvT(3iu?~gfiWgyw%L^X<Y0Vf!yGRsWGo?G>|5hyzcY z+afy{Glr9mPl}iIK~hOBS2SJA9eWrOlmv4L3m^G$g!$VJik%LR(WJcjGM+^4EqNz*BAs_}3fdx)Y=2zdg?+?mqK-(nxr;cd&12RBHf9%MTd zu({9M%6oAfcwTVJlJ`CW9u*f)0CfL7Cow-90txUDmFX~AK4Fa)+0gk?H1d{U6tUwJ za2%ru{E+tX59~HYHX__Wa>Dr$uykFY2_N)~U5z<-iCMlYK8i|FBUjMY-(tZ8GFc~` zF5+se^AEXnLo8bO<@txB9LyNrAQoRtxr1qGxkW@`azOu^#0j#ZGXEk!`pN&!rVTs* z@Fe2Tl`7Fu4e z`eeDNF!jdpT{IW@F@`+sQ6%D(eok81WhQM1lPwxNOmI+xSNLQ@NXTsvxqOo+m`~)X z1G#oe9FHI=n?@JjV9&d}#j!J0c23b9yDq~OnV-q^+4;gsqD#xZ_VPIxgzTqHQIcxP z9?Yedt?0w-z=J$gJ|4>Rlw8Tl!D*iTQ|43Rk;~Gb9QuG@7dcS5fK2i8vNc-9!7G-4 zv{n4t!!f@kF^Ldl6pKaXBIA}zuK4?k3C;u&gIpLf@)xPsuy~~$D8vG%7m~P)@?y-k zSUocqA0?BRFY9>e7uZYA;uLrIOZW6P+7`*|>n%c`{;y3*5MTX(t!6WI?|gTm`Tjy- zhk^E2>!3tA2*F#T9@MM*xmafUnuiAR$oj8OZ74+7Q5p_gDl)%J%BUi5VKn#sVo#(( z3#WG@mN<{HA`kk@6}j70{K-zheaMNlxtoa#1^#}eMyB(WTE*S2%+5{kUzN@)x-!L- z_oQn|V}3%-g)!7z9PtD2O2DTVh>RO?0K$k@k{Jz&$YHtEdCS-hv5CV{)8IT2FdFa! zUl9X&0+cT;5e46AF9@x%RgvvSEaw0te+uJdV5#{)Er2QVvn0oKf(T^dMmiSl%>$)j z7|KN3d|t>y)Ku<-aGG50jw31+6Q)vJcMP|n>l8;k8Kr6#@n}|W$#c9*kpaO=94j{y zvkQD6yGcOY?HS<(j1joJd_@JvS_5i==${B-1ioPRIwJ6k6vi2n`297h*_S&&tIESPbwqmn zA+I6YYgKYK(HfID3b!Xm1#+pNq?xKFV=7ATw9pYS%&uuDZ_6kGnG8QNm#d&Q&0M3@ zqZD}b=w5QzFvJlWAA#NGu*p=Q{z!A$fNsyw`ST{K*|1xIf-F?`0JqG&>ULdv-HCdUPQ2fRl8Sk*7gtXXvO|#_OacjG43Ak7Y_G z7lp{DMjJ+iq7t{V1SF;!=vOZ-uq@otQgLWKfu-C~5P0(RU}Ar{BPT*GX-TGcvUggs zoMX@j2$H1`_l&XpAV%UW^@oc$m*PTdMJLcPIDJOBcOH4l*5U?L+OcZ|LrUm{a*r;h7ux8VE;fHG4cl)RONu@_8w5lQz27yyGc40K4b#%C?svM`wQcJ=px=M&rHB{3YASfr2vPm{LmH_f-La8NLed4osXWfJlYZ{xxxbbZ0A>{)x)FqJjR|Z z)E1~(pnaG}&-`Hmcdp7dU*^@Tffh~cdF)~*1}(nCXyp+f9wr_5J@zLNt)EZxq%&pO z;2X3gg|~lj54nPcZ6h8%1+DM>z(vb6+)#|-((Km4Xo1#= zJX6zB>useFt+ZXpkE3N6P(y<@>=uof-v$+%rj$&2O9g*gS}xy_MS&z*%_M|^S)B|| zSHZ|i1WT6mk2+@_3lUH()@FJ3)D|78T#_Sb13W9(3y%T%Rm_F_Oi;e(1Sh-St|hk{ zS{Z5unX3G4CmR@fa@JR(ZgQ-zC@im}tQuZk3d+{2tE=;z1W3iGkfN=U$(xlf8N$?Y zD@xDUBiZKUDkH6xgC|E1`Yw2!=TbJDhv0GP*eXnsle#5HzAuP^ipj*Joze$FB$gp& z-%1cu^E+dIFAQOACvv64w&q9=l5HDC0Vvby?0XBe!5_e4C2;jO}$p_6$*}~l7Ckw`N&!d0QIi{(i;yrU22q{48coldqiddmUEKVVLjh5Ag zTWbEqmVg!FMj`NNW7Wt1{sAo&WwMM(QMaV5R-4nfcUz1=-iWj{a$%PvULjqvNXiyv3X8%8#2#IJ zw3s5{R}*j?42dN1|M`C-|IcrMmZoV;pO&f@F5XIX3zgeSyST?D@#0({o^q0RbrLnu zO!@H0mBO71iBgI^(sqP?S<@-ueB@#0HCpmc`2)nkB|G*6{s5z%g?uNge<*5pCbkA@ z9w<~7x2kV8@KEia`+PRg|F!-8@>!$*yJoMK*Z;aDIxSXl4J&&y@ig}7dkC7v#ERo~H5@R-WV*__0u2!$s>xK#XMsY(;&Tbve( zOWYWl(QdEN@*OiwMEUg;rIjVSB&AKh7D15->Qv~_K9xUs59j5f`ZrZv>cDVm&VoOK z%)rzf3Pl@yb)5@Z3U!nN6H{QN8cO?kUEif~ts8cpqVK-C-rKgb8VG=7J_GCne0P$5 zCG~nTogO9K*iK#w+h2A;y5*o$2p-GNg$`{i9jVwRhifO9+FW++j0|7mS@df)aZS^{ z7ql_H*}Mhm0%>(8CDmo>Pj*0>!QwHfrZ}0xk{ua%TkX=KBou|j{G#)7g-G0+j`#7@ zu>bgZ-;NS`-MLN!)oU1o>-K-mLi~r-H~0I$5AyK%4{6k}O!F)nH5X_f_y=d=M3B@o z9e{nFfM}ZDtCHA91dJd-u8ipAw?GK#u}YG%y4opwmF_-sj#Nq|yN}XO(fK<#X4g6v zP7S2dup;U-&5EC%vImSp;qXWy%H3UglG_OYU*S_#@)^#&tbw<+=rnvhJBXr0(>8oeG90cPOM!j$K&rO|wRjCTC=DMFEZma*t5%XvsRddZeZ36n zYksD=1zHP*HbKGRs$O%8lR?H+C_S}un#ll&>~u@UkbV4^nmz0ARCHJlQ_j`f$_s}Q z1Qo7Lfwz^b;V^@ygg@A^pmqvfQtjL?t+?56$dHe^!y%6?l@5paSZ6q7y%oKg#k6iX z1cuJv!6}MSG?TgJ_&K-ib(sHue*R9hSMt%qk(&#Ob6KsX%s*M!bU4g$=faWEKkNCM z2lyx-7@1lzw&nUs8jh3gClT?YWjB$NPJJx)?P)0yNTMGq94a`LwUhrNmamp&WY|1win4PWp&|F5oFdHdhCx_kToAs!L`oihva z=dZ+(Z|oBkv5X}REO^x%rW2cQrYR?#*?Fxa(E9!NL^7ve&*;ata+d$kKaW-vjNt_Q z`DcscJfC~sdEjA(?`l=Sgh??LcwIa%m^mvbe!h%?c}RaFe{rNnor}|DtM!a5q^f!7 zy9qSYX6Y|}(wi05l+DOYVIhIVc{TMjht6#F72}k~5PP6?&h|2sRB#k=Cp~7aq{k>b z8CV&jB>rM4q*nGxE`a~$3HW}&{bz-?-;^|Xu|5n&oa>jEGUx3RK0TKqJewK{JlH35 z-k<04NE=s;nwDhe4;Td%P0~P1)0izq;Ods+88hmZ7AxiqS0*bu#+GU_ z+$ad*PMeTvhbPG3=aOYwT=6c~$TgECO)~lCpP5{hZ2H9kTcfJs1?KigMfT5s;IpCq zN1DU{uCf0NvuOY6R&Q_rJ;amPe=^6Uqa=ppqf8R(k7r$MX8jf1f!YIz@si_vwc@+V zcK3_XjDP;Aslq-DHLhGRuL<~iAHrYfXuX#^+a=UkW&47sq8VJ1tg&3OIP%tounFCb zF^U1G9gn=%KY#7Bq5KyY81F{@8&*;N_xJ1n2YC|tFSalq%iF`TKLHaQr)KS8&Itgp z&$DWa-KmfAn#PT^gSyf35E`Pfq0e>UQ60B@IqDsaY-`IQUOiy(;uikqxT?|4MRT?l$VL zOw-+S%wO6)D_2`3?vCs~%Qo}#->~-f--A4f{io(q9^*-KpRYvF zPS|7B1WrmTd4nolwyQEeG+6h_I&*e-kA-|* z^Ry5{eIS!|PomJte&k=6#f!xSTl5)Y5AmjU;#t^9zNfbmRoNm5iC%DnrB&p382L#W zWSMoMU7Cpq0OCY2L}JD(KJL;@Y^A`+sEBjh2t) z{-2Tyf_CfwDYJC$+5eMvPvaAx$;!O?tY=!JZnNcDKYz?K#gu7l`nvI9&%BFbC#OD> zrY!F3sAo>)-}`~jMhnlVLF7T&xu4!!ZO*r_r z^Xu*H#l}zl`M(JL&h;Yno8JJj&i>O2^WW%Od;iaaJXQAJ$Mbi8f$6sh{fyN|%ea^b zJ(;rs880qFlvU8^SI`PV<;DMfDH3 z;7=Odc)d@yPwXU{OLm>iX|HR(if2Rlztj95{a*h5H>=m(=l^?fNu{WsY2E^l${OtZDUIJG;hXwYJv#cP*vJ#rqFe&##S438Qbejb2-C z>m9>v9f0gTdHlXo-kB9lamVBF#Eqlm`s{pRWhvv;{{B0&xWt8`W?8>f40$pn%aJQ1Wq&A1GI@jwdJw z(!>{J_Xas{5P!3^KPX+4Ts}WPzBs;mf06MR{9o0jaCUxm{Ory1%j;*yC$FEsJI$2z z$8l@#UMjkmzDfVm>$5j+EfARYA`t1CpRbZzg{#@Vx=liT`_FXU6ceQ(EJu`n3ejF4#inVe( z(f`+YbecUi>_2wfL+AQc5aHjbHuug0_jn!$?9#g(-2Y`3^MBZScc1^`K^|fMVUp%P zWrx@afCNA=^5%$1DyDs>2@8NQZ~;u100iuo4+7#Ti~)=ga3Ta_rwNVu+h5c>)H9~tEkYpg0_X@b! zo|?hCa-j6R0@M{iD2}kB_VhSM=gIkp4>9)eZ!pGze~uyt`7xZJG(QB-fqWtKpI~*V z4%6HY;>Lz>p1k1|94}A=CrGKJq_@^l@q0GyMQKakqFE3vciEU3!?;O%YS2>8PN=W{ zn`Zq_~cJMm$uGhf~BlV1PB z!;GE4*IS_n9;d6W!{P>EPEAx22Yo+?nN+Svp;Eq_Or=1oX&chZ`#Ygo(n?>aWf@M1 zGK;Zl?YR%%{idJ#`d?l)+W7e28vSn=R!`5L|Lg7ZKRwLTSpT1iyJGJ}`zKe5?nw6w zd<`|fdL8c8dOv@+?pL7o)m|y;eD!M$jjs^+eHh^xjFy+;ir=HBV501R%bR~ol{6l; z=P~xu+v+%~+=l!2a2^M5uzz!pRS118YFNcO`2oo_zc4V_?<)qVgoNTal@zK`L!QYB zwaH78X}9L_u`2{?b}qYZFzI5E@?s(8Ob+qk;RbyExSTuH50YCz?k?y&7nL*7`iWFJ zPMHa`qB!el(a$-8L`T=1eTlRqmoXf9RgzNOs!pyBmoUOxDpAc`_co#}AR*+_tR<*# zfowXIjFdZ}Qao$E=TSXX_P+3)_BYB6RY(pCR&1ga@EvmBV%PQ1EsVJMZk3b9)2zJ6 z14tp8i~r6cW>a4vD%6>g=(I*2?ybBoA@pfx@9zm<)A^rlMisG;>t;Sek&j|T zoXBmZPQ(2EdQEZ?Qnsx)T_a`JOSxg3RgGYNSZ1XoGHW;(vwGt&TQvl;EqcGY{>qMT zP+hUla{{$w_?fhvWnLr_Yh8bpb8Hb;(ie18R!yQ66_T>b4h!wg`yR?8h)V@w3MND$ zcUlN@x58ziiu#9lSQIyi%iI(N=RqruAR6PFr0FSNwQw_f?;I4xt@6sgZ(kr5eAd1|3rros4D?a z?3+4zK%VeVmS1H?uvUZ!#j>Kr2<8`&7h!lu^NO-xb5uM{cS7Z>WF6uc=}{?CK-uri z`lW=X4CnGb4`tjF>vNV>zLfD*UQgsg?mLCPVmpYx|DMX$^9YUcU5g{9pUcn|C<9;w zog3u4N12!FiQv~5V0F7vKB?xD9bJG0fZb+Lcng3(pN&w&!P9H<3+>2QO*x9*t*@V? zjJ39^e3w;C!T(@icYXh_2u$Pw(~Z2q>-@hxGk^bISMTlf|31jW{J+mKUfy_$z&mxY zg|C;pdL8JihXH|b_42s?^&VcqMIl4HGe2*JHye6;GqAhy`4&;8^5rk}{1*GE=vOS3 zslV^b*Gw7a$*ji&ZtPFmHv_f|SQr&ct0Ea+>jLZB+6R`)lrV5Fk%yc(h>nU&2<2<8 zk(DKQ8FqmHr=^k#E$bE#&@&i2(>HYk_u52M{-z|3uUF-8%CwL&R%%WCo}_auDbY$c zrdZkZ3poP+Y6%}f>wj|2jtX381*+!~Q$19IENvA^N!=5WVlN$wg3L)){Co$CmE?by zFGkdIboLaki;4q~kw%0G;xSaXfIG6oQQ}aijlO>ot|F{MXp@Windk7x0 z%y6uG4hs$CiAD-wZDpqN93vG)p5KL(A(;F-%&S2<`1uhj;7NK?cKvE%RAas%PEtf` zu#^Ze!&Gn=yM7&cYDW}kR6f=vRK?ev+6`Do75255Mgb_YOW|XdQ3{?RpD5jy(_5fq z*{D?($}ITgpjFXYmz%2Kx8S3dJ=BPUR$|&U?-Y1RH5|mIrYOdK9IZARdX;8FO~oZ+ zFH|RMx$4T4)R^H_&|dWAUVrWN*Is|smOgv^wbx(Yvi^EV_4WH-k^-u}|2JGX8^r#8 zS0n$6(a)d%G3e*L|Mvl&#__-B@>GA!@BKOPAfDY%G;p|Z(%V2vJh$q#7h0MCVztw@ z!eyJs1uEUO**Tk;zTbxnr?CrrHx6Ebg(|kkinAzFvZb|hfsm5kq8C_xSy^SiAJWz& zF>^tb*%QvyT3#&0mim-S*)D(1sN9n*t5f?ah?2S^6hrKTGN)~|(^YArfEV4`nj&x3 zCew~Q^Qnogjw5h`P?qwy{Og`PqL3j+*YVyCYd|+1`_Vj_W+?JE`MqJL%oinJe%aE66^bz@(R(j*FyNO1&XEYh1ghiFfxJ5m>@ zYe3Q!mlixvpv?EqA~a7uFIt6!5tCKUQYAV0cB<9B;2b<>X2s94!I>|bZ;{AY@BFNd zLpK*K$UnOh^A%Rn??KP4uK(4#@U8R9mHVaoDZA3+iFtU&DHV4iofTbRB*EeQ z`7XiF?y3FMk^lT;)Pv{$q5l=~{|t8bKRwD*TmH+O8J|f3V8Bav{nR6Y_u26?j~3S2 z?c4jP96@0ryQG7WF zY~d$q>MaoMwFMz@>Nsl7DUmb9ME*L0{`W9|p@));20AQ3Fzu{DOtGL2nH|C)i0;}v z{eK(Bb#9paaw^-swkbvb?MDgUra%hmzd=U27Mj}kG@Eu0lB?$del6EC0r z)OP8NLLWb>x1p-%O)}D6d>|+ZVZfa&3Mp(|iBjw}QcCJcBa{!I8n*Mx)|Qf%Y388I z=%+xbDEmQwrx9-}Zd(+#^4Dww`3i<}nd`*$RjU7TPHlx&>wHy7$GDmy$LuD7vl;gC zo09Tz);?JW+)}v=XUaqSPG>V5Vj?OSFZKO)TZM9rp2|JuB!%$#SW;dN* zrh3nwU#j+Cb*oi9;kKFvI9*&sY_&@Avl4nZ3KLIyqmwUFz z<-A1Rcnh&+))OlP4M$!wznDpq-P9G9((xKMmN$Yr~Hr8Ggl z%8@xDqihR;N1%tuDNhevpQ!*m5M0W6P&X|^m1yT1`~yC<{eO_}tk!V@ZrT6qjr*qmZ_wYxe?87q%m1hE+<%rxFnyMN z9Wh~P-Rr;fAcTk7ODw?rTJ{uOcY>w&xf0BD>&b8thkSpa%fGBDl#0LN`GA_NYhu zUIY*0=M0KVNK=E&`LuUJg1SK=*p_F@^RtW>b0@o)_~6ULwp|{?7=9p!F2A8o+McDGmFh^#zZ@{#!ov_`jApyRrb- z#{UO{iOK(m-Ch32M|t={4ua?o{B<=&Lj3|H0#gJcuC4hf?368JYd-bc9GWT*q${Fx zrdCo=cO(gtSt)>wZEKSsT_LhcL^{eiPNF!$)Sk(;N@m2E7Z}xTn3^a)Zx=U`TDAm- zE&YgYik54XoJGr+CH4PHuhTnjS$870_iIN#&nt+SA_6t6wiE-r%gz?ayUn^JB^=+T zcBkamh_uaZ;zkMh56ZhzDA~!%b|1=4denI8@qgjutr-HgjsFjOX8zxPzqgD3ew0Vm z|3%a;(r2K>UobW zxBqXywf0~f8?i8J4wq|{?153 zq4}0Apq_#KEJVWc*>1QW)#d;L9hY8u3&&?m~zxOW@FOX`w4OAtURGO==h{yiafYV z5lEvYVm2ISe0(Hl7zKXHHfI97#02@&v?B|gg8k`+jq>x0Yg!hEbLPo9=)J9wJ0+u+_pnw*`477@ltHeJkX3Q zfGf_rLJ?!;$p&tpeLQwYRyXT8@wE$zKz^G|Ltt5~M_Z3K$Yub?qsve;F(#+PUZ#LR zuaw{S#x91`VLS;7kV?|(Wh;?atF|72SdYp?r;Jf3g>;g$$u3q7FU2&O?Oal5yN1U= zX{*9|#NWBrnV>j;9s;fZY=PGMR((bz8)mY2V@H=nw1L|jV>^Vc&1d^gXoqhQYh$?m z#J935d*A{b>U*+9$D=M4AC+QQ{;flzFwo+U{eAK znymr`*arDp6tKZoi_ahqz`k5i7ZCvvtYLtCVB*~WHa%#$D6(;Ar^u#5+v3ymKS8U* z{-327Xo1W{_2PMip@DfhjN6fE25am;C>9_ORJ>2=MkT(_FuMA4&Mu9fG(P9 zhTxX-pS|v&Z`gmsZg;%1{~qI^3;*ytaI-*Q32_Lr!7beIrO2`G4l|}<*&oQ6Dus9^ z0dhvu2HTxEg$ORZlxY?%b=b$;lcZO=Tm^x0+#uTkr{6kp_7T|Q6(|NM;{(JGEeGf= z4*m0#O0oop^H%Ph({4d^gt~7zqfjBXoaZWkmxUQ8@HCl=B<12Q;SoUM;H{0ky4(8j*SXzCudfWD|KPiHMU+rH2~pbtbI zbJAWmj#IPX3-Ani8&6&%n*Dr890Vmx9P%VoOO&Q`VMDSI{hELLG5>Z_82tJu6xLut zl5-UonmqtexR%*yIp4c{d;VOke&%>TDW-fi2C_q|h+fk!m6aghUcb0{|L{;B9^#Lu z*MF@ElhxS@^!@dVn}-H``KoFMuqz6*_0^fBEQ?wh{8v|R-dkI`ygP;hliN8ac_83r`1P1|D<`kJ zo#(om`uw=OSy7OSe!6aIySv>R&==Mc@aSOpd2*yKO=8G7hNkOnnH|0Y=7z>6eLy+RE|LM$V z2UG6ZVr38>8#_Lm^XzZk&@KVS8o{dFE94R$Ergj?oz=+tcAqRXyx1U_tb#?nk|y7* zC1!oaj7pzLtPr+}hlPZ&ucur-p)Y zPr7~QwpH0Sv*-|q#O@1sPW3qKhi8RltqKN8#XJ41x4BWZqv|gkbMN7UC{gVHes)c5 z`TPt~A)>~d=6SzMiOe2_WonpK)2LzwDsp<$Fv`|(g7-nCVs-hvfairEy`~P~s((*v zQ5ZcqalXVOj(uWTUZp;`&{-Woz^54M(~u6^5@78Kp^oOp`D=)e*P_H<$nrJZy>t^V zFpc=MnqCx5603`u|Dy%^;RNi>Js>Jmr4~ZB)b_$In4d@Of_{uQmt+%p-fT^%kJ-Bp zzayLcM}2&QfOibdIQvWRS=0P7YadAneIUYfKqUfSwscoTvt{bG;TBwf;>bDdWj{U% zJ+#G1X``W!$6z(*9b%5;v}n;*Yd(xOk|z@Jp>_g}j(TSv6>%w@41-ySwtQ&4D?HFC zj1KN~K3IMSyS4{h#L65!*FoBOSDr!S`@4|s?kq$&=L1)d&$N7Kis0Uy?n;auzT2Fz zehz?H6>lOv<@vMfp~jIU1QLOs>&7n1;p!4*#%7*hgWNGzpva zJoT5iQ@r0D)WIcNW~?pZyA`k$CL3LQ`WZ+(>u);CGs&~)LW~13q$lnNxt><7M7e(V z>PRiGlQ^jFg#WQ)bxusoW77xsDH7Rc6a{fFM_@hfhwY(!p^JP@=-9*O(f3LenOMf@ zA2M{R$m?!-d5vnA$oEoA{!6Li?X<3k_qjo_85MU7~oJ7a%Na#WbEGf!g69#5^$~nggzI{F(Nk ze^4@&3A?$YfW4Y$TN$GS`>#3(Zo&smSlU*ekU|r|;QE8U_X%MDJE_V#FJjmvQ-QsZ zys8eY47d7uHo4=z7o49~HhI-~@QZwx+hp9{ap+wU%83Z{<05J@j*8(KTpzFR`qTwZ-OjgOq7T?~CKvE8-wkw(`U1_EJ8eNmYgf3bs zF`4r)k_nvJ&(8sP<^<0t2J-ji5PvZ)wXp^!z+de8Q)CfErep0sf;hm8rkN;4;_^G- zZa*07L;fdK#UikM#Czm3q$$wUFO^_EwqMKi>xVkTx9KP%OK6S`gmdE%F!ePs&zei0Lq6v#gb!f~fJ$*OcpERfcQo(l5nT>24UqCsBBlg;Mfvo3O9?sMiiJ zTF(go0^j>r|A{0!gl(7jYkit=5z&<5yWW_0|7n5z!FRP*YjuiwH5Os@>t9>HIvvHB zNg4X!Jr{>HMy7mjLJK+K~LLvwkQk+B;u4Igpkd}?KH5F=?Lxj?pa4R`!fjUcTR8n!hP!a zx{=11qsUZfYEjZ*z_;P_5d$YQIH7WW) zLK@04;%PBH#V~U4!5c{e;XT|nIiT+Ofcgg;C-||>ZpItcxeput&qr8%*1Ba$C-29O z2a{yKpBW>=41Yw*`eYHj5S~?GRVkF6yHpY3uo`epuMG3k9H1**IEct|jNa~nz(F?> zvT?G{6>O|E;vo(4-U!tTNtTjhPk6J&o+m7+33UnMTfvXG`6n{_)X0I=R4hEew4hxA z;b+%zx#1fI&&KdHB|olo+4+jw8*2E~U6+8o!GAf^X-xd^HtX%x&lkKrxIY`ea-}zB zYDG1JnX#p)%a9n>4&*OI7Rn7oDsUV<-bb|YVNwTK6T33*&M1DcvawRX$ zTA+rt*$&iS`*p6fNJSqsc)=*dvW$~~-E-u$8#K>y_c290K%c||r= zr;%>Sd2|==wO|wmWa8gi_wdaUke)Zt?`vHF1&`&Y1Kpx)tDv|WCxDz--FXrxR^o${ z>$!H@k|$297frR2JN+Y>vb9NzkJ({NJ=Oe$>_kcv3k#?t!q`oQ@nOin{L4QG?-Jva z(kixRaw}W!wNBaDPT$`JuL18bTZJDD~4e?UdqajWybG_WyX>pyl8@CdO(^Y{g z!?dDp29a-zh#`?wGx3w$7azLCPHQxNVyGUyt80E{Ee~=(etHbc>2NZHd{~+{W z4iWQeQ@G{~57rL)j)$s%ufBtCmPNw|N9!3;i0hnK4XQ)oTH5DQPG7SY9E$W&dK6_E z2asO!Y@fB};Mz_=Z(DtT009zok7H4?L$lYUE6-%bF$|~E5SUu(fFpNDyvL-_Ny0ZYgE>6MLsVhIn>9OBDO)nWccs>a z=|A`6WGnvFdp(m#pq}h)I!Ie&2Pgeq^$*wjP~(0UAo%Kr33vBa?oW=SyUuzfT$-E9 zW03!hsdW{UVD@{LUxQ+7<3m>fxJ0H=H*g>;Ns2wYshj4@jIUvY1il4#$jk2w27;F4 z(BX99UocC#t&2lxllm|>w=#{!>wI(GrF3${!*9NV^6yUqSHHV^)XQ${>x0+C@GgYd zdy~oEmusTV zPw=-goNLb*9o=DOuA5(sMVV9`nEPqW@ZKZ&_A&JDW;b}{G&C}`U+&N%ItP8Fhh;GFhvMuEsy0X@ctY@)Qb`5H9Wz;*LQz=GNq(rxhIT7B zOG19()k<53m8c$TUiYdO(N3Wc5g$8fyDdjF;8~iZ$By__?hk3VZ36{5j>>`zsL1Qk zAOk{LwD8M&G=@{13C08(VAgvgR_EPTE8@iJdUVWJhKaRXW-F%+Gv-3sqT=>Y&$_Q; z76!<*R6CzZox z9JZB9YN&L~=8MlMbV%D*9dXEkr^Pq^1FubvJH0>nk~?4X6xSIP*_UhR<;TVZrdD0o ziE*YhW>cL~$Hi5b=-G(|OawA1MbOZgH$QZCQcPv`=IHfs&bc7fJYku@Ws(U zh(k^p#Tmk>MGx)uqoGJdKN9m!rimeLANnoqg_Oou>eK@d8+=yLG(={ZynhR&Zg(e# zsaP4z)@2`itHW6BLOj7P6RCC2zvrv&=8v~~f!)cLR2Lmufdfok0!So}!FSR8q;r~4 z)s(n48&|kJn7w!f0j8xYUdQiSCb?fsfcvAr&&Oh{KAaI$bFpTbThb9%Xa_oV7b!O2 zPm!+44o)vG57c3u(!OyAK(NB{y9;BG zFQm`LWZjxUc7g8IUGpP*ZFu3%e8`|_3dnDe5W-BdSfc{K6#Q3~0{ugzxJl1l(TCOV zynK1aQU@I33}_K&mnsu4z2pEuCuq^7jAVZYsDG`y17=Md?*QR(i(P<&?kgIFoau?I zA_YJEdQjpmEOrH1>FwUK_IVRSu&`!>UI<1(`sj7T+Zb%+Mpp{Ww;g#($aG>yKNXTHo{>KZdnECA*^wYcv~w3L&{auxxkL&B$Hdo>_E=GbZ^{t*|i zpYkiStzbG+|0fPLwB>TN>Lvxa8S|#ZpmJ_X;+=d>fc<(V#jan|Y?epr$Yv#&`o7SL zgd*sNkxBgFGIic(g`E58;aZ#y+ZBD2v-v-e{S0pMae$X`2=rbSI)Z`xxZ()d-+yz0 zh_Y~2O#*aiD_{^E!8C*)prvpQVvo z5U0#A@tv&4-pzg|q&ca2fD^+8xT+xtyX$SkFxbJq@|^k3+18&F_g4>swC3QxRv>!% zNINdOdf41o#}qwEEwJCy=PC*T*dV=Tb#^a6X!j;$x=6?*4`59~pL_$6{M-br6PV*J z0L|h4ZZHTfpY;&Hp8ID82Enc90C|BwvL>b^ijc~n!gJ~U<2zv0pmP{FwqJp+g{%Jh zAyQW<@-JRNWx7@y%7Z~lc7Qa#DWU}6k%=@d*C=5UWR6vgPERZTVny%%45wY_z`1Ky zzx=~qVQYH>7&lPEcfz&KsW1FgUOFWJ|K}~+&78|t;B2ACCZMRX=`z>TXsQE^dgDXZ zgyGW;!Np|<>tw-MOaE?@k7w)cZ60Aa%?^S$9x_D6Le$2 zzhK^ZNH4bDx}dPA-BU1Lv#1P#?IOt8S+y<|xF!y_hPD&nRruBnmVC=ujy&LRz``on z2yf^%y@*R>YLGt%V~)Lnk3odw<~E?$i(VWPqJOMMGIno0Z#KQl$GPC%M0lrn0QnQG zql~Ql~Bg{$$PW)BC!=!NhG* z5y(FK{&mW(d;W-7^bz%H z*8B0NguBB(?V9k{9j8@{b)@ExRB6L%@T)2nuaZKz552hk{kuNSXM(kEuhWljdGa3i z(5!FFrVRRO9=z?XySe>Y_Am%r$P8XhbdPEiqZ2x&>m2dELQBxbf z=(>N|`qkT?Zi{VZrIU8>j^w)uD{gixj(ddC>tvcG$Sx)?Cs64e6fC4~Tx4)J?t6X(r5a z6%#7L)rVZxQPh)f%xeUbh)UqsSlW=ARoNu!f)>lj?!UqEltxXjHH8OIEa%*2_R2;| zapc;6FfE3}_?2a5Z{o-`#zL`I1)9iOx@&~$Oup!6#Qj)UkGr#s$}rKZ)d~`c zXV!FUVb?4lwZDnRm~6HWRDn=38Rkn?3}m{&L^ktSuX=6ITYXNW;+#BunO;8TkR5Bf zHK?<<*cMc*Ns=}pqc8QZdxw@$)l|Jak#3*tFUS`4HIgrSf9k?EGV#O5WOt_@>DmIj zgzk4DpYxlxrao!ZZx>E#UjMAIaJSYgm{yL=b*iQN9Af%VEmRr6mt2b$lc7ON=RLW% zKrcqCPJ%e=d#5`d{D4ug^ln&Pb4d84aRFfq-!S!;ly8@nzR6?j#l)33{`N;UmjYb_ zuO}0aRPAM_N$oGrNaK69Rlk-htD6&B9^xnd&f`pP`*#|?VDOqW zkVaw$j=`EvQx7&lZ1XH%9yVbWKFwB=IyY(NLA;I zCormlKPrD5y#Gj{rTH3x(kE~%t!BINRNAge&#u~!9bvL4Hq3N4ARVEL~s#X$>J>%O{FrsG##Ai5XQ^#2ncpai% zY`aO0pg3wOtuGvBcJUCL5%RU(%b&}NC$2qU49AVHe+c-iQbY0zEn|f5OJ>2ToCTG-T?mW zfGVi#4iFk|3W5IScM7EZbdvRwKze1|BC&v@52dw`CO!?R!fZ0n(*l#Z*aNcGNM-&!J zKS`ZBN-cMAzUDNQ>0OBwmeCxX;j?H_gv(pYABhB<3@Rq=jA7TI7D7SHv$LQ#m=J+# zc~?~WPn3O~Q|`F~CA8_(2RJsC-odPn0AV4oy{~UKQ@|a)>f1k6ZmqLSRTL+@ zz6D%&8oC(SiGv0mDmN4~VM|PSZ8ZA+d{aZYl)&1WBUp8@ahGTp;Sav#P!`#gdsQaRl9+CRWQ&vAEUfmZmY8oX5AjDCAa$+~51@0V(5f@QGJOYJ#rhyZM9CgK zzyLe+1dHCQC&G6X-sy6MPkSx1a}z-pnF95!HnAH781m_hHoaJ*S4`O_Hh~B26jA z0!GpwR~tuaV6@%hNCB>Ce_tqFT!hK$d=ji9`24#42Ke4G823SJeCN#V56kAOqVA$} z>2??$iLXEI9&0{|`Xl@;z;?z(>Al zupqjkPr^o09u8QfwFJksZ1?MMidp90m}nL)cug`HE^=jk7;izJl`*%g(w4PS;SB$G z>)wGdMm9H}r)9kefG{R37Rr9I_d)2`2-an3SFB$)x&R1x@A>r%U-xQi`iuQLFdk8w zfHarM)q9W_gfLpw&pkapr(wL;yDC{q@z@$^<9Tsg?dX`lS8-uFiT?B8#lO!9f+EK& z7l_F?#Un9l2G(x*SAquMYS;i~X)#hP-!&N7K_;w%U?=qiw_jDyYrdX3zrLXR${0S# zt3}SP4V|yWBGj>lEc+p~+!s@!Cx4tdxZa2gj-i_lSUFM48a9$^R0`{}j75?3hI#B~ z!SJ))*oj|LXoZgDd{=DqOJ+>JIod2p?2L6UCH=eW(HE7fIsO$Y;GuzfHU*1y zip1K+-=c6^Ou@NMA$QZ?Q_OnRjp)B;B{GQX{RV3rQRPRANPf*nHw` zcj&Y>wFoJmiOx*VziQ*4M-&2ywX~N)%J_WiZa6R)FAyD?03Tsj0K`XjdEX1YB4zyO zP{B{}EEa5P0ZQ}NYrK|#4n*wX1q|iYQ110Mn7Xap;A9mzp+PcB9b0a6^>uF3rt)@B zju#RR7T2#SjlboN$zb94M~9tFsVN^VS3~w%bPsw|JVlMZ!?uNMxS);|mSAU6xkMz= z9G%iUS31MYMYXmrvYZGc25Efa&zQP>DBdBDXM(&6xjln|mife74@5VfdoOJ`*e(EZ zC@OPDkGT)9>V>0^BJ+0s(z`U=U{OQymAXh-)`}Ts&?_0O8@*P}VUo2xFm+}4hGvCm zD6ynoUR4We5G#wu`}(f=Yys-Q^+n+Ws|F^L5*D7RUrkrz(F;D0o!jP>D(({CWONNE z%XGfw$$BX~^qzlM89epp`1B)dOV=sZe)hQ*u}cH}!VTf=$_z#lljif})wa@LMJGhp znIxYE4fXvOnpwu$#&`8rZ%?lwujDeDvrcUgC>?ty8hd)5dJ2jPW_I~ZWA5;3I%T43 zbcg6!BZT+wS}=Zq+l3+q{-i(}=N~;Rl!mV?JL&m+l#GR2eC)?1!jZG$+Wm8{MDk3x z*743$8%$dfyGqNautxuhzCa*p4lWQQYzeO%edasOQyu#7?>VN&P+>c?VJCseiuimJ z-D>qadwOOug%*iHT?h4fjO67< zOtXo*AMQJnGGk3&gBpGX&ueF^T1;jzeX-+|KeY*&!zyX#+ZCH=J-`)k-+eZj(A0$R zq5>Oa06*IU0CB*hC90WA%(cAH3Lhc-_BdXiMgq?2jFV{G-(h(Lgt4(QGl> zW4l9?ySR@F0DoS8yZ;zDUFfN45QS#0nDS;5k+Lw-^;I#h9Mo7`^K`d1p{<}7*QHa zZIQBu9hxBa61;|gfm@QkKGpdhP%~$7`TngR4F9ksx~MZh`1A!Q@e>+ca(1Yh)Jl4p zR!N&{h{G9(gKHY3Br^z2W$7^u0j1Bd$K^qSN_dac+7@t49i-{HmouluAt(mUqlRcJ z>>rVJ>#3a_kdk*!uZwoZo#O`zb!|0`l&nli^;DDym$1$l>ktgkxRmQ=PzB116gOPo z?xL43OQv&cUVu>{fPE_m@GSn_0l8D>PU{)1`r@Q=i}tgfvO zo{z)VHbce1QL@Th)B zlK-!U3NxNzg4Emu)n}w2PDBV%l}%jHu+l?6yTpsmCgadEfjk!{g83R7mpsHw6Yu@! zy#Rw9YDQu+icyZEG+e@PG=wt)gsS5K+oHI~G)-qfb$vfOat~4$OHjihrWR_B%|I07EernK#Zq=bnop#0gVv^TbUDxb0GyRL0mV6#8(_OF)>X6&7C%vp=P(T?W5C^XG z0YH^lfaVGm$_d>h1whfVhd_ur?s)HGPbEP(_*PAn)HbD${GFdpNH9tJZS@h3?=-*iPM<|W`^1{0EcB>tueTDKcAtr1e zorlr7Cs9YVSO#B5P;AFJOgLVr!St;ig0128)HVQ7HG9KE?#=;&l4T76bFITQ)$!@4 zZ)YNuEl)1@?{eDsAL&CcS}ja=PUp?x^tNiLN_%1}JET|ZOpPDfGIZYr9<`TXBSRMJ z4t%)ge!Hk4##tb3UszdMy`LJn>|%Oixg?1(xtb3LqEcSPZbZAkPe%j9u_K-Tpg|7@ zQWwpb29qehJaKM03ubKi-uBb!`m(h8HQ~*ir^oov{xpe8AHPM5pY{+e&?F-59AjNJ z_EM!K?JU)RrjNLMC4XlC*k(B zX!Yk=ABEcC=&r{OE}A+VDwez)#e_bdCWnM0^<9duNBMZrjcWzIFI|L0@cZ669~Z`}5GJ>6kI7hdkt4*wRso!{4$H9UavQ zT2IN^>lO#8p3bgv36hKNUym{0o8|?f*lT(c}yqmqrABy9JN|n-o zw})$XJm;4sl)R(Qm}B%ORdXO3_rzK!b$sj zrf;J)fp@a^&=`GC!bfQ!V-{JN|0ik-*+PLryh*zc#zDF=<+F5^c&2)2J*)ENyADXX zNT{FbTod5nJ>#P8W4gAm7IEmFBA={OaGWV%^?=82uff7uf2KQ$am)8J)$mq*ogC?b z5v`b#%0u0SSQhq?2d@%@%y@R`)mIh@QDrHW!3bb^0rd)U?2GyYLv=CGmuE?2XGX_e zPldz;Hxi3Uxovu9jYBJWL$}lOqUNGq8ZC1*#z+@@fw%J8_eCNCmecgJnX{grVW<4; zS~;#XmE`QU0D{s}eNJq^r@mhPp4m4Ujq-JNkL%pivwU^$R0?GWxLyN zT1Sx^^7uwWOpggShrr%6lg%^wxDb$mS>pX*9`F3Cso;}A1Eaf-y{lVu2sTH`N5NQ4 zo(fPL(uv^Pq7O^l$Es)rRYncm6qYx&&5l~gv+?;~EfC{1z;_D`$r-$rJqRmb0o*Il zna6AA+qSIN3S@c`t}MeYE#ytj;O%FH8ZJhT<=KcVhLUzN z)G%_|*34;$2>YgZx7=h?=0|4JbQOyXByYw`AMV4hv^isae0xLig=_j`0KqguLLR6Y z>&;IZ34vqQ`|{`m5+3SM}D5s}KR>l5w=d^$WsC_=)Dk z?e_R$F+En{*({5MMO&caC$TtEA?8e-70YHE){ML^^MW7l0QV4VHj0$Mhw^+m#r$Md6A5Z1Tmbse`*zEuo@L(u#|IpynC`|oNhgf9o0Wiei? ze2W)Ezir@>Q@;5XNAyhV8w+<&xG3jVpgTjY`+n06-Jvnlwq1Gie29%QeN)h&l=*8( zHnkqceL@Rg!R~BqLhGD!-Vjbhov+_oSGWGY)U&c$oBs81?=f7JJJc@C1p`Z=FX^Qj_s~avg zYfjEbTRRCx*6Yul+&DOUE2ykcL4;zx*sC}Pxx#!Fw*uBVwHQ?qzWyBYl5XU`^guQ$ z#4b{Fjr9+*FTJ2X#zr$A#0&qhR zkkS%B9aJ9$Dbmuh0;Y_RuS|y2c3*IOvHexgQk-AjD_W7|%|B$c3le9OC|ku&on3f7 zlkZmy0#-KX@V`O#$ooN%-Y96A9_GxK0^~(?qA30Xtwsb4+#GShQlJ%#gH67qoOH1A z96!6X3jFK&SAFe|`g;UOk&IrNbQn3{jwdR@Co>rNRf7Q%x~N9MXgqOE@GL>hB_T=8-C?5^g_^qpNdGHVzyLRoBAV!GUBq~3fN9RL+?RsNPPq_ng9!%$A>-1Y0 z8N^rAq?2v(M-#%}mmgup0@`Uidu%(yvq=c>fbqy{c}J1V-=@5ihZ-Ly>RiX*kxcB((PY#^71Kd8FVXCT=+n`C%6E<;jiymu+0l)38n*ISVZ-szkdla-_ zDeD7R4NuGxW;tr%Vtq=jfh?;;RKNDM-sJH+Gk{$a;yKK`^I>^-6E&v9!7UbaZyX z=WPYcO$>k4j!$_*w444aCwu737Bn4C^^q8Is#4g=YxCyMHBT4s+!bhj(8fb5JW`1Q z81n?cd4l_7LV&E}0!ub;P(#JK=SG(^8|XASvLUry#KQP-vhuiq6H=; zjFjy?2fP?gWj_PISE`THyRO7(9l9pVJnruq+p-2}#^W7^lW^z`oD*U^)s@cqZTC$# zM(isB9YjXDOF)}xr^)1e01)-cUl|ox^V(Z90J*YhTnGIAyO6^adAH*JeC+X?e>KF3 zRuUIUjlrYAu6jcM})@IpV$yMu)ll*m>Bj)>!JH_ZQ_q|0{= zRkpC-f8Ql3$?0~4nZQY`HTMtk?GO`(fznHdvOCUvAT%r-v7lv?p?K!xC${^i9$3oE zCeA}sQI#1e-YDYn?yW8u!xI~c_(MoFEe+}rJuEDSx^>+h_~nf|0;~B6op1kHYAeSW zo}BLVi*@W6<*O(isE+eZ*JTvKYQlUJb`QF>?!drw71KP~tTksFgjIOzIV<+K+49I? z=-Pa(l}x?AqVK=!zJdVVj(vjZJ2ojncgL)A-748q$%7Ye^>I6tthrLa##yx{>+S6B zRp2JyGO&tShF|xk%m1#j>HaFB=*QbrN6}WkT`h2#-)0EJ-T1;!;b~={6+WAkj)AT& zF5W`&EWMZZunYV)PTjl*mq5Vb2guVF@3t?z|B?vU0wgY%ol8PC#jamns-;JsXc;o} z!<^rv%Z6|efwYnvIY&h{_y^46>!yG2CTa8Qez0(4l!mPC`IZM&C(1ST6&_81i9c2V z8``?!ziIl9!zO!}&1~{K$vKnP$TPPM)8G_Nk{1}i@C4a-OoI!&zJfSmxk7|<0Ib|A zN~mr7PGuff0rT5)aImm$7`hQDkIjaeU(q0vZ5aBQM|$vWPt>iy#kddBp&!$s`MHXp z$yTvz&rjD<-lz>Qar^rrJ#A`Q@+$u^y$2(fOYZN^%Qnt+)x*%53npy!O&m3ndiIYk z&cWn)3Rlya?bo(%oN+Na?pNH@UP-dQA2NjmMEGn(*5gS1G-6N`(@0K@U8*1DmIUxK8(1@XtI zk;fK?(nAgkRBp?&4;ZU{c^Ek~j#2(4CD+!Ugmdq1nG^i1&-D4Nw87iLhPTpXo|yY= zBJ)MQPD#|cf-a^RJ4j=W><1F<9kGyDQ71Q@TAB()?1|SwNn)FC95&#SPBE@c(VIk| zs;l)-1or62k~N#aWoyP^a+Cb0*?2!Q$-{`l z%b3W}HAIE&Ya*>wvnE?iS8$mhiUiBY|B}7{6ei}&9#hAvWU(ipg1xa9* zFyAp-GYs(yq10AQOT!Q7D6rLY&f}7W_r;Z{LzGx|rbZJ(1&29r?Cz7n&ih_$JV*U{ zdB}cEqAK&rpD(g{VbdKFIF>OS&-0IVFgJol-O(ZKH#>1!ui=s!#Oq8as6CiFky5Z2 zj^C<^(p^AUW7%|FlWzvG%m!PlM+u9OyW~V|UimFv#RMF0?sW-KWgb6_q6+43X&l^9 zdetp{#==DPn}cz?-cZR z$;4zVkD7j=j`8Ada`l$oHz4}VVzRh9D@e3x#9P$pw!afsGy--m@95(D)FNtkb#l#v zX*X4{dlQ)QF-)n$oB)PI24R|Kz<-z2Q1zN5W+TYj#%b@35egL9TUX8~NDx@x|L}2egv#7BJiLI4s`-&V+Yn2cn1VQIWOR`8ydgE) z!EUr~I1xEU|F+L`3_gVB31_fu%d+|#SVbXvJ1~j{lc?z+us;!*Nbz#ndaQb~$Q$X> z@_@$)`7@7@&7V+YBw{if`*x3w>dC=O2eQVMBmE|`A?aNGZ0k5z z*McfDk)}j|tV_;y^!IImO8uAj^!TDlx3KkoNtuR4OwBP-*B5q0OL0Ic@LHj|9$CYUOZzHlOG`>(Mj|&^7RGS{fuHKplf3Y)Z$Kx|-iRf2SI6QDkyfMVSoCWbxIm4ms;%lbW}z>s7m>H>@oV*|ufOn+jF09+~N9 zk!nDAZ2O8qM<#Rbp7S6J(E_ts$m?3oC+% zidMvZfsB;1^DQ73?ho9|p>lE;-3vFN;r7@H{pwO~J~`3TPg+HWPc3wrgcSQ#;#zpr!I(V0SCIGc9vYYMKtppT9J1dhs|>$&pJ2aOTo7+pWiZB+R6pXe_TcX zF3zLK3YW>qq5f$8wFk+rnUwX0?qA}GieSd2#*07QCww>mX(tb|0AKa#pX<0zw@`KH zAc*5|bd_YC{S##Oi#0l}Oj7IuEk7?c8u5VrKikL`^|qhNPezQ!bqxy3oLU{Zm2+;& zJj#jadJTMnC>l6-_lz0tf~tkue~@Nm+0p!PyotrI!X>SPjb04u8hVyE?_0K3)+nBK zX4Q$w77c$47BxyAYZNlt_O!|nDQKx`7jEoI%TUujY%C2%%scqmiw;kUZrCwo&bzLZ z7d$Ks7M%USE)s*pmcmD?! zdQ3+&Y`tQ5!UpX!9`UEK8MX^W#J4H1LFK_j!CGI?v&~U(* z7w_hjZ|<_aA?UM3`i>s<+p6#HY0BVkK7yVyy#GpGGHjK+zDbc%bjnEYD)YU1cH_{e zA8V8NWTItwG9IMI*&Y>PlPV3?QR{3Uy(=Sa^d&L*n#hWEjnFKcB(L=A2tuV)wW%_q zCRJh;TkNV=2_rWfXH9#*H1ts^i;g-LQQHN=Qd^O_3_yel)U+k%c(vy1qNPUiTC znX*I0rWYr_`0U(6gb>o)xMoVSxtAv2FWMJ#)jMAL^zC4L*Z63LT0x7RCP(rWTh_CX z@LEk`jpNJ%XIy31Slw~n>qKPV`FsTx`YeBR-(cVPBH6;EG#?bE^v*$oC;%EV6XwCL z{56@c)jzzE8M{^DLPU6xWgp-!kYuOCIxT+ZE;`S%R9R>?-`Akyz*7-;D-=i@tY$vOOn%^r}}w8V%vIhONHrOhXhh$OKW(AG=y6oRF0$hyB-QjkuC?5e#h2S z?w1N`%N||3*PtiAY8_ATi7_9A@LOnfMZ-ghcf|s_sY(Ahd6cwt-tME=yT0yy-vfg6 zqEZW=;<$?hk=AawWo2sT(Ck$qA!2rnW0)}gR)=5g$F_lf*Rh!xxy}nua^zimuzk_q zjwy*Y8CTRuPLXi5w3aV-u>?Jt(cktgm1;G6V=&){to`W@2k9hdSDUr>XYbBR@YwF* z+4Cie>qW}FZ0&bMxQ_&2H~zs~>&0PY^3jToFb_>qLw{A1`U zmUMiky@G>lDW#yH^!=~4u=l5&l?;9|DyN+8HmdujYx8=`xg(j63$D2{oJ4%pWm6cT zDsJxQGr1$mEp+<<5WV@_4TkV&q$MFDUMKPx*PLIDz6V=;&Z0~0PSZJ_l+sd{o3|HP z+@0%-?P*nS6iuR);)OCf#Ln! zWOcw+A*-zXH{rWR99PnsOLVT6Uq2&~HI8lSQzLKrHwBDzhSSVrZsmJe-dRosdGVpu z*SQ`Lmn~6|;9SUcIj7F+91-N1MS`VyafF74UL||| zW@b~dA&272!`%7oZRu62tW143vU>#Vj@9!wE$33qFjrmt^%CFxVmuj@s07->l+6XD zC{^ka5$PAI=Ila*gKtgZSkeeXY|2-KLmn;tpGS%5D%f1KqPfJsxJ}fER+LrT)2S#A zrz93S%b-zH4$EO5q#D63Z*Xi`B1ipaToIZ%rOKUSP`+k=cg~E4`qC%q_9FX`E&-JP zWLOFD-`B#GDUD2^y=TekR~dg6fwq~O!I%b^Wm0{9%6LbqD9}9f68a=5TreZ*^5S63 zPfJvmPLTOF)AAT>^o#G4{6U@2F0Xjn)zrW1d6O*i&kwQcf`pn#t;il*-Bj7|!!(Myi&QxR+8@_bi~3`y z;W}_dMGYE9MGcIosDT<4)h)RZVaol#hq+2}!V*VxWr&-P=O`t#hsKk^WHuc0-l(|) z+1Fz#%1=J^2Q`<}plnImb?iao*sOsOn>A2lv&y>KSW<(U^J!2vpX^%h;J&e0U8A8x zwV`H0`c;ZD&n=af>b?@!)_Gu|qWv=Ip@b4fA-Fy}ef@&>P|f4EefM$Of&EGi{-NoA1xmdk)AdRK}sM&vsDnJh&V^XuJ8{UUK7G<_KeZ!tD|A=MW03S z2H+3OK_V3SPGKLEM8I3%z~?FT9e(72D|TwoFm{U7G#6ga-WZ{qQGv!rqW!m**K$#D z`BrEY)mHhaiF8h6!M0ISFvn{Y@~xy^&25yPdmCloilQ1cjH047kB#o>s@*d&#`^zR zr3A!Dw8lOHcQ9egi#6U`EF&MxAm-a?a7CgRB}<&9O!~8)7}c|AdLySrGjIfO4VngU z4LXJbd#rXt(O*q1yERNGPZ86CTQnp=a2enb0e=csNst0KcZPHi91&52rV&v_F#bS^ zh!U-^li|`L8!M594mq)QX13&{%RrH4t0WLdJmhiDUd@BAJ@>)afx{CzXzB?y(rFDk zs>0|#zT-}c*Q@FA@3}qxuB2Oyb8ZZRB`R>e<7H`p8zasQ7sWQ3z~QQv6!vYK6kdUXL8@<4>ETYmQM-Q|Ud7o_tO5^#rrABBG= zY{OuGgUA7hRs=*daizYqNj6R}X{^*tbfsouDm8@`(fR=*DA>r0$X4MhMSj*g=D*KY z917WGRa%Kzl+gZgwa}(4O`0l86J0@>7qrlO);7@Rg5OOVl*)nBS(5tR?9&~BM%s@IMm4) zm35ooJunO-!j22Q#wp=5oE<;mKlw7I+$c^W52dNdqb)9K^VKs5$MtR_KXzS4K5^)b zlcqZ3MAsQ7hR#^gIe1(zJm8o|2k2Ruaaej-n(xH(&a4-Yam>Rp7`F3eoJ4CD;l%zz zzz_Mr(j}r^m7i`x0zY6edbOhcj$Ofi6NjojX{u_|iiYB#=?%pI7slmS5_s;wUaY3d zbr!UvU;S`)1(rBT#L$jv9iBNJ9XYP`^;dC#JvwzHC-OuLAv=m^XmqabbEzfGwGzGi zG@YbtPSX6QQeMUAx@eV9)l<74gw?-7Gsq9yeJ8fIMS9EtZm9GpkrbF&vLU|AQmPoF z*he011RsxD;UUMai>xLN8)wqg#+m3g&cv{Bik-T!b6z?vH)S%s(RMHF5|5gUt~2btlnL>{bUk;}%w)H5(#7hz2t zR^Ozl)i*XS!J9s&ey>054hMhg_C}*__fMev5Dnb+ ztWpA#KXvbo%WT~5CUCL5;7+$1Y>CL-vz6}ZOim<Q2S4_&tl5CIUf-@gFo7uPqZuV24-4xXQ1y*Rsh{XY!jH9rr# zx7P-j?2I1p7RbA0hQQCiuCRC8rb~o?`3n0e%|$`Z|2t7KKU~6a1%t!?m({qYHNNe4 zU$Hue-Cq0D_i;FH=X2rk0L*ZblFnWmTqDGq`}0ru7P~MU?6tvJPTF&vdQsx%rG5UQ zGoK%lcj@KL4?o?IgjRYJqYyywGZRpCL|KUL4!uPbrRZR<-EQxl1_8Lj^94z%YKf9H z@$4b%(vt#Nhwq$z-_W|Bvxd9>(L0DQ9WF zV*|dor_5)Zf;hoTnBZW;n6OWoFjFWuY~Ej-UW<5S%H2DAKSXzEjgqI}4vEvVyetd? z!T(c`5*Ye0@i|tGsRPbK&i1pLz9~teB9m`x zGGOl$xcM9S1X7Yvj{gb#(t3My*7^l}0@sLu>}peRgO})EQHUsH#dOW@J_VnItCj-! z_#1=3Zb{t$7;dcAZVDDCVdwv-u}eQD8-NK~rXBDCdJDUWoGzkOkX^NwGGEax+H|;N z%5zD0Fa%S+dD4+oQ=?O%lXCqjqVoR}W1`X@#Rg5JX-GjzCld^4{dN?l9a@xK^vB?H zSIR0uK3Ii5O85j~1m#FOUgUFrotXGlcd15&R6Q~}AQNB!0t&1xpmCy@OU3h0nt~Y) z5S_`S0)a21gu5|uIE$WUVwZrQ>Fo3)PY7Eo+afRRD5g4-TG1+LGd8Vp?zW)3EjsM* z8-?Hld#`lZ)q$TtfKxVser~nfa77lar>!swQR^RaMk*aiv9UFRLj+(lXUj9~&`FzO zALVy(w%e-|C2b!P*!FS4Ix9bJOF$6ud}e$pa`0LwOF-P~m^zxkosT~F1g23$2lJO1 z3{pfXe$~#}^>Pk)S-DTG! z1@fjv$#U%tm}BBv-)~~hNw^%KDnDN@5WK!T$Rsg};`Kk+zIKFN{Llt=yOO`6IK9ajA zxy9l9IZpIWK5VJNmBJJy0b_0~K0>U?C`KXj#YrWVp%JE8ozFlR5q@fm&k7jFyt34A z#Cl#vtB}NSAy+9goD@#LqZ59lrPS7hh@^`sDlEzdLN5cAOFWW9D>|{+YjKfpmf8iA z1zWzCkzY|7TIjCD(=!UUF?0obGj^U~GI_ZQ`GGijhN~tY&+1j=;&Bo!3BC=|n)NY-$ z4%cybDC@TJPt+K0owO({W->5IBvxJ%l1j8T|0Uja6D%wj? zT?=J*pRE;kiANhAfHz?vuLP5M>Htmw3ZvD0VG?3Si-cfdOsU|-I3W>d*ZPk|hfC{bdr8PeGdhnQ?EtKd1B;gDKqvWORjDZ3Dj zfMms-IY0lLpxHn2jf2~44R&zEIP{?xg&vAYdYF0(5*dL8g`p3v0 z43E07i_mZ|o50!ls5e9Y$REzUes47Djp20G^M*YHeKbBE98LRU|HwP``rc%8G$^Nr zVW$+?bj&wvlq6J)G2@Mvkangt;PO?$fUHQAdNANE$p-c>ati-9Wp%y}Aow9l@V{u? zfSOR?R8$mjax=AblBjMV_e3#(HJdD|d263BCYlM^cl+^qhjwYn>+Ex1Des~hZV$NwJ zs7~?;{L-U1E>k01cRHoWs9n2ZVTO zu;9f(z{?vjBNm_XmIYIGVwe!jWr@OHLmbGCP#OuY)T%(KT81HAC3ED0p7*8!d9t5039isuRR5y+~&j1urX!<{~*x;OTvF+w%p zD|rFgzK{+F%(bRb$-NENVi2y870{dTISLR##p*fe4tUO{C^8s~h4M2R-57=GqOID;{q;s6tjj78sqzTZ0e`5#YPeiFs>FUAJW@?B~c z)j;Q~ZnShf6=t*|)Tope{0 z6^a~*>!GkryU4EQj#eSt0eXA=eHPoR$al8K?-uR+vm(*e)X1!HVal6fbTPGCxz3aF zt`;NNI{BG@Y@M`Nw$|3u7MpynlUA?w+drPRQUnukfzoVTQ*)mg`&X^ zjq|i+!kyuEBf#mB0(MFp) z>PLt}JKY^{Q&7*Y+0i!1D^9@a0l4|w33z*R2EIQ4m#5d)KRrJIfByIpbgsnJ11ui% zx8ME@&hi56LE-vk5-r6q06HBx7VLdNyvvU_abRhO{K^7`M16ai4+JG449-J>k{R?+ z(Y}0}A`uaV#hGMC2n)?&8w@Oxg0FilfplaPCtcfjFhM7Pg+fg?F;8}Wdz5CAK+=)G zQ=56qOi}s)=Zr_HqWLBYWt!8CG*CL=GK&_IERB;$`4z=C527gyIJ|$uj zg#;&vov@&IaG0wN0vb*Q^DQnGwOAE|Fa(h-B3r<3#?7{01?dbjUCJzDx?}v*??Rgw z_ral%B$&TFM8rF!B~#D_OBlzLtn*7+Izg$ZO20E6d;hfyeZMWxw@JiYQ;2wNMnU@y zlLh;;4LRM12U$xc)3WsQPx*lowPc>~ViT=+=I)H!k_i0bV3WUOC=2dTF;=HR5Zy^< zF!PzC50n#Ol2?ssCrsHsov6Vsfy zwqjrri{qg>Pw(iMPannosbu7 z>P=We9R69t>8PZ3=%+2#Z?@HBw@mNYCJRPu!5)h;`@ig6-E-SGlFzgM3Lf*Yag{`q6h%p{ovBKk-I>%S8I|qq z+||`o1d^c53q|M%(pk-H{`V_1J_vqFvgNEZ6+I-D2zEEV8jVKx4;NrEQ?Qv;Z&&TE zQ-gHS%?4)?r_3`&fN8~rs#qNLCV!}{ccp|+sBZ|QeAW1SLGgxJYxuM#2$PPK5RFBs zuyNOtFU}$eq-?h|Xzl;8e}g~jsspCv82=NkHz~GK5~36o2~)CiacR21#4H7Kp=%;2 zc5pf`|L6*mTEemAQOLKCSC_CPbF~PgJYt4*Mhb&1hBE8s#~%#Ga=fv<4X*wkeI;Ucsw>(nydfH9q8Cd`_9lTc-6HUAbxf46|Y!`X+>2#Ms zTK9Y=`6tzsJ9gOh;$6!`i>QU=?!CU+F|&o_62eLpf<8%vVbLIS_$IJXxfaRFvG6d_ z_(*E+10#P#Ftx;a0zI#c3oQN@Ka6p;a%LpbJuywq`kqA03{S;{Nm{(v(F4UY z2xH-ra37oqaT}cEdqf`UWbUVeWvpG8CY771Io)e)4w&uYy)h@gAMX~w9TPtYCur&i zZs;tg$P2s>PeXqe2X^S%i+D1(C;rrRa1c!#KZ;#6i~M=uxzk_~dh=jn?rCdNC`*uj{W7)8J4Nr8XKLhkr{ zS(Q{S`6`2yX9QS$L&7%#ptRn;6{v zpHU_-TL2(0Gvtd#$le@PyHjzrqMozr)m%l|vezL{O!5%7JR5vrfM+tU4gi3GIVKNh$6BY*M7)kvL+6vX(;_%9;5fa=tPvZxOXEyJ+45031Tkh8jnTaHl# zk?kGBTdL(G)+^P@>o6FNaka_o;6jt%8$)WbSp1Zzv?9bihQvyL$japS|4K{?RijRg z)yGx8c(cn@CwTD!b+AcA`%Mg|ZEPTnS0f|ZW@w#+T))wTWa8358GBrNLES~T8r7mt z)yp{VaCD0<)G1N2#{7OloKnn*LBebOa#8)wGJ_*t92qY()~7HfInk_4(~*&p_T7lg z@`G?{g(Ul5iG&6IzEw>nt}HPInH`G^S_Wfq%qD=1 zz%#(5?>4HYv_c3?3d-R*dn9bfSZ(e?8C=y?7{=6I+o4asi;Ps~1 zzE1LyaD&u{}B9Gd1%=C7|ha2ZX3oBff6LW33fjdT7XjJ=m;dqG;CuP1Igq) zV^m_2LKZGj=i?kbe9VkOLY4IQ5&rqDkmc04{^j*AhKQyGGlqaI{a?l{qDGK1mQj;) zU(NdxS%W0INB(LjhwkZOLM)QTr!{TFYPNIIz_>(d3G;X*>$B<>D8hGpX#>?PT%O}} zT%SaJoe<%>V|0Sfp~tcH@5vwTl(c8KeC<)vr4{9=WJ4)}2nVS|#f0Kwsol@i6ZZqB z!C;x{mpSn`xbT*I&iJh|a8Y$9D{gu1J@~Jn_*a|*m3(TT3Ke zO`J!cB^s~#WKjd;ai&a3^CMXXCC$G{>p-+X-{K^yb&UBaISpD0b$*XN(D|P9psl4q zL+jo_)ahBmS0EhIB3W)Wn?Z18Wd^H=N}##cozsHb4nEv@uN{j0VSd6}^W2mu5a!6- zaO9Qsb_}@vXY1`)J^k`q!!Q?YIo;tsUqh5X!M3SUqy9}aFF3e?77e-A?zzGDkvDAg z7Ukg6?><9PiDJ@$BbgM$fL9evdhMbr`XK!VyrLv;8xUMtYmK9%>^vusL5HG5K@9U9 zUXy%lR^tsB#d;G{XYrnJCqBgvu|SV3UQzQ z*Qf|@&5;SW z@9FQs4<9Jb#drMzE+|*!y4S;prErFnPL7JDsz6?#v=6coOwBL)1eJ05;=T5%ZAEk_ zVnpDr)YHs)!vb9mi3sS)Yeo9B-m)q&80B11`ignAt;lP8a<2N|rT36+}^G%@%A;1{4B;I4Z(5 zMfg5XY3UmldmMumh<<|Ana_L(`BV$L_IsM#;S5tcW;?;K$a6FJV#(rt zlD(DBp?ud^t<$mO>3+vn7Sv0^xA@$vn24CKgx-SbB6@5quauQkm%zM>-A+Jvo?ua{ zL>HZALZW$QaytMSKVM%j#hWtXNJ8Ae7+}xO*gsbaCE--dtds9_aixue)8_pq@H|d1 zzn`7;HLW~eZRo&Sb6GN?j)yhk$XM~dIS25NmAEjCQ@rsc-d-8o+%mbcrLB>@zqOrQ?oHMYc6OD~5ZG&#I>V zjqr6xXvOx(L$uyzM;oI}vYl0Vlu;^_YhM#xiN`xesGxG(@hOP5MyF)9*Vv@B3UpBU zs^d~JJ@Tm3Tk2?IvQD(45=S480BJvLe=4B<0qavIbWhu}j_cpDJZl^du{*_!yBM~a zv@K58@+w4NXXapg9)(flM1E*5f;e7yi*Pavu@`%@sUIvbww;L^&!f5LPn^Zvj}da+ z$<%jIM`}kyAZc#q0qPyM(yL<#e49&>@=Rjw`>Q02BsvYFWrfwV-COng{#IwxMNja0 z0NEjF#k0XJ{mZsDU{C4~AY0M9M>fPET?bg_EkBeh7XV-$w!^fSj%GGvM+ba-11?|;P|d5$S5^RNZ$2neOrJpaQCH>G)Q zdbVw^&5_C7bLP1@|0yxQj7$-Yua$J_<)-$##Qak8oJgKBl%E=B91)fFq;_*r)mE`@ z1KI|zQVT$}%~bee@+i60%nBT?AjXDl%9QIHQC@*ih(!|CK+e%JUI}bC?qe+=V_t&; zWh)cT!hE|C2~uKZ9r3sfIIRTe1_-RVOK2kChETQ*NVMh5WiM*S`r_h%I7!7CD#11z zy}JDH=CyE~eR%is>OakMx7IUDfx+;B;@o)i+IYcUI5lu~H@-u;A<=cxZH-B{zYn59 zmU(iQr1%E^jfN`WBU1+eWy7b9BswxT^8HA?CeMK{2`T=roZj+M6z~teC*Viq zza8QW>_8NdxG;NRcPae89WG~8?qSGX65&P{^l_29YD{)n#%;x~8na0%+58=?lQikT znPG-%vN2-$9Hv%vw9nI9R37r1<()TT|N6a5wq1tW6#!LS6)61FvQm(?K6H`(_Zu9N(Wa;vY6y+zT~xL1}A#oX>nT= zo1tj|)bBfZIgZo-$&5sJ*#kCJ3y6{Bcu1Di6>kZOUZE6aABWW=*doDSBl4@B!)HcZBG(+6oBhq8$k#`p}N}NbH3=>aPMRNC?7f z%7bmrIWQZeD$7{L6;FoNO@I|EyBhKTuh<{g7t0lN_v*vz<;pVnPM`fC_WT?4IWv%P zeX*>e9^T-hnyCO&%jVCA%eU|p=CyXHG*qbqf*M%a#7BkAusacDo-hgyV`b4itL zQfcR8if!7PWi4Vt*OK}|z22nw1yinpP_Cz=nywugir%QwxtbU+<^FEaBhj%LtiONn zds)=1?z_m-14Gg@`2b zzQAZ78Hf`}s8m`w5>C8A2ZmN?mzsbF&cQ(&9mp0Dguu6&^0kCktJ+cv8sfKVlgP-+ zj6;qJO0}zRI0fit>n2AbUgA7~&YxksJU z{SH1VM%^bL4IT#^eW*8g^6cQ#5pQGJmTS9?y>L8*Z#6^Mi|4j8pUkIo9Ql*kBJksR zJoDo@j=k6kyqOoct{cql=?vQoCqQ=K;c4uNT~_ioFB{r|FbxQ z?>SC?Fln((F}=mOFpaYxPfngc2khT5s0;S>`Sa(-RfsaCQ_8fUCnqN-|1#ba<6S~) z%ATzyWfsZ1dzijFAMg773piG5u;j>=cL);DA9YFd@9wtmpYNaVpYNXsfBruJ0RR8b KjQ$M(_y_=a + +## Helm-Chart + +##### Scan Results + +#### Chart Object: awesome-ttrss/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'autopermissions' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-awesome-ttrss' of Deployment 'RELEASE-NAME-awesome-ttrss' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'autopermissions' of Deployment 'RELEASE-NAME-awesome-ttrss' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-awesome-ttrss' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-awesome-ttrss' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-awesome-ttrss' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-awesome-ttrss' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-awesome-ttrss' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-awesome-ttrss' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/postgresql:v14.3.0@sha256:5a7765edadb738a56757590d843417861d27628cf56fefb25e30870f5e047620 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/postgresql:v14.3.0@sha256:5a7765edadb738a56757590d843417861d27628cf56fefb25e30870f5e047620 + wangqiru/ttrss:latest-2022-04-19@sha256:08c55163614f2b3307d6916b1fde725f5a8606b10856c6af0f6bc2f52f9d4347 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/postgresql:v14.3.0@sha256:5a7765edadb738a56757590d843417861d27628cf56fefb25e30870f5e047620 (debian 11.3) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bsdutils | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.32-4 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| coreutils | CVE-2017-18018 | LOW | 8.32-4 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
| +| curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libc-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-l10n | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc6 | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libcom-err2 | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.7.1-5 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.7.1-5 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| +| libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-13 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libsepol1 | CVE-2021-36084 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.34.1-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.34.1-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.34-4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| locales | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| login | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| util-linux | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43784
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| +| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
https://www.debian.org/security/2022/dsa-5162
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/postgresql:v14.3.0@sha256:5a7765edadb738a56757590d843417861d27628cf56fefb25e30870f5e047620 (debian 11.3) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bsdutils | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.32-4 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| coreutils | CVE-2017-18018 | LOW | 8.32-4 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
| +| curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libc-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-l10n | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc6 | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libcom-err2 | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.7.1-5 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.7.1-5 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| +| libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-13 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libsepol1 | CVE-2021-36084 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.34.1-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.34.1-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.34-4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| locales | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| login | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| util-linux | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43784
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| +| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
https://www.debian.org/security/2022/dsa-5162
| + + +#### Container: wangqiru/ttrss:latest-2022-04-19@sha256:08c55163614f2b3307d6916b1fde725f5a8606b10856c6af0f6bc2f52f9d4347 (alpine 3.15.4) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| freetype | CVE-2022-27404 | CRITICAL | 2.11.1-r0 | 2.11.1-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27404
| +| freetype | CVE-2022-27405 | HIGH | 2.11.1-r0 | 2.11.1-r2 |
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27405
| +| freetype | CVE-2022-27406 | HIGH | 2.11.1-r0 | 2.11.1-r2 |
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27406
https://ubuntu.com/security/notices/USN-5453-1
| +| libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libpq | CVE-2022-1552 | HIGH | 14.2-r0 | 14.3-r0 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552
https://errata.almalinux.org/8/ALSA-2022-4807.html
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=677a494789062ca88e0142a17bedd5415f6ab0aa (REL_14_3)
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=ab49ce7c3414ac19e4afb386d7843ce2d2fb8bda (REL_14_3)
https://linux.oracle.com/cve/CVE-2022-1552.html
https://linux.oracle.com/errata/ELSA-2022-4855.html
https://ubuntu.com/security/notices/USN-5440-1
https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
https://www.postgresql.org/support/security/CVE-2022-1552/
| +| libxml2 | CVE-2022-29824 | MEDIUM | 2.9.13-r0 | 2.9.14-r0 |
Expand...http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
https://www.debian.org/security/2022/dsa-5142
| +| pcre2 | CVE-2022-1586 | CRITICAL | 10.39-r0 | 10.40-r0 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| +| pcre2 | CVE-2022-1587 | CRITICAL | 10.39-r0 | 10.40-r0 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| + +**node-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| dojo | CVE-2021-23450 | HIGH | 1.16.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-23450
https://github.com/advisories/GHSA-m8gw-hjpr-rjv7
https://github.com/dojo/dojo/blob/4c39c14349408fc8274e19b399ffc660512ed07c/_base/lang.js%23L172
https://nvd.nist.gov/vuln/detail/CVE-2021-23450
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2313036
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2313035
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBDOJO-2313034
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2313033
https://snyk.io/vuln/SNYK-JS-DOJO-1535223
https://www.oracle.com/security-alerts/cpuapr2022.html
| + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/incubator/awesome-ttrss/0.0.1/templates/common.yaml b/incubator/awesome-ttrss/0.0.1/templates/common.yaml new file mode 100644 index 00000000000..45d48a1f3ae --- /dev/null +++ b/incubator/awesome-ttrss/0.0.1/templates/common.yaml @@ -0,0 +1,2 @@ +{{/* Make sure all variables are set properly */}} +{{- include "tc.common.loader.all" . }} diff --git a/incubator/awesome-ttrss/0.0.1/values.yaml b/incubator/awesome-ttrss/0.0.1/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/incubator/awesome-ttrss/item.yaml b/incubator/awesome-ttrss/item.yaml new file mode 100644 index 00000000000..8a7ab4d55a2 --- /dev/null +++ b/incubator/awesome-ttrss/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/tt-rss.png +categories: +- media +