From bc61ff98e729a8a6d7abb96eb3bdffb0db1d9373 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Fri, 11 Mar 2022 09:59:03 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- stable/friendica/2.0.0/CHANGELOG.md | 99 + stable/friendica/2.0.0/CONFIG.md | 8 + stable/friendica/2.0.0/Chart.lock | 12 + stable/friendica/2.0.0/Chart.yaml | 35 + stable/friendica/2.0.0/README.md | 40 + stable/friendica/2.0.0/app-readme.md | 3 + .../friendica/2.0.0/charts/common-9.1.2.tgz | Bin 0 -> 42696 bytes .../friendica/2.0.0/charts/mariadb-2.0.2.tgz | Bin 0 -> 73711 bytes stable/friendica/2.0.0/charts/redis-2.0.2.tgz | Bin 0 -> 73842 bytes stable/friendica/2.0.0/helm-values.md | 59 + stable/friendica/2.0.0/ix_values.yaml | 80 + stable/friendica/2.0.0/questions.yaml | 2613 +++++++++++++++++ stable/friendica/2.0.0/security.md | 1248 ++++++++ stable/friendica/2.0.0/templates/common.yaml | 2 + stable/friendica/2.0.0/values.yaml | 0 15 files changed, 4199 insertions(+) create mode 100644 stable/friendica/2.0.0/CHANGELOG.md create mode 100644 stable/friendica/2.0.0/CONFIG.md create mode 100644 stable/friendica/2.0.0/Chart.lock create mode 100644 stable/friendica/2.0.0/Chart.yaml create mode 100644 stable/friendica/2.0.0/README.md create mode 100644 stable/friendica/2.0.0/app-readme.md create mode 100644 stable/friendica/2.0.0/charts/common-9.1.2.tgz create mode 100644 stable/friendica/2.0.0/charts/mariadb-2.0.2.tgz create mode 100644 stable/friendica/2.0.0/charts/redis-2.0.2.tgz create mode 100644 stable/friendica/2.0.0/helm-values.md create mode 100644 stable/friendica/2.0.0/ix_values.yaml create mode 100644 stable/friendica/2.0.0/questions.yaml create mode 100644 stable/friendica/2.0.0/security.md create mode 100644 stable/friendica/2.0.0/templates/common.yaml create mode 100644 stable/friendica/2.0.0/values.yaml diff --git a/stable/friendica/2.0.0/CHANGELOG.md b/stable/friendica/2.0.0/CHANGELOG.md new file mode 100644 index 00000000000..be804a52687 --- /dev/null +++ b/stable/friendica/2.0.0/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [friendica-2.0.0](https://github.com/truecharts/apps/compare/friendica-1.0.3...friendica-2.0.0) (2022-03-11) + +#### Fix + +* fix blank page issue (breaking change) ([#2131](https://github.com/truecharts/apps/issues/2131)) + + + + +### [friendica-1.0.3](https://github.com/truecharts/apps/compare/friendica-1.0.2...friendica-1.0.3) (2022-03-08) + +#### Chore + +* update helm general non-major helm releases ([#2116](https://github.com/truecharts/apps/issues/2116)) + + + + +### [friendica-1.0.2](https://github.com/truecharts/apps/compare/friendica-1.0.1...friendica-1.0.2) (2022-03-07) + +#### Chore + +* update helm general non-major helm releases ([#2111](https://github.com/truecharts/apps/issues/2111)) + + + + +### [friendica-1.0.1](https://github.com/truecharts/apps/compare/friendica-1.0.0...friendica-1.0.1) (2022-03-07) + +#### Chore + +* update docker general non-major ([#2046](https://github.com/truecharts/apps/issues/2046)) +* Remove `-icon` string from icon png's ([#2040](https://github.com/truecharts/apps/issues/2040)) + + + + +### [friendica-1.0.0](https://github.com/truecharts/apps/compare/friendica-0.0.44...friendica-1.0.0) (2022-03-03) + +#### Chore + +* remove fixed env from questions.yaml +* update helm general major helm releases ([#2021](https://github.com/truecharts/apps/issues/2021)) + +#### Fix + +* BREAKING CHANGE Move some env-vars outside of env section ([#2010](https://github.com/truecharts/apps/issues/2010)) + + + + +### [friendica-0.0.44](https://github.com/truecharts/apps/compare/friendica-0.0.43...friendica-0.0.44) (2022-03-03) + +#### Chore + +* update docker general non-major ([#2006](https://github.com/truecharts/apps/issues/2006)) + + + + +### [friendica-0.0.43](https://github.com/truecharts/apps/compare/friendica-0.0.42...friendica-0.0.43) (2022-03-02) + +#### Chore + +* rename `web_portal` to `open` ([#1957](https://github.com/truecharts/apps/issues/1957)) +* update helm general non-major helm releases ([#1999](https://github.com/truecharts/apps/issues/1999)) + + + + +### [friendica-0.0.42](https://github.com/truecharts/apps/compare/friendica-0.0.41...friendica-0.0.42) (2022-02-21) + +#### Chore + +* update helm general non-major helm releases ([#1927](https://github.com/truecharts/apps/issues/1927)) + + + + +### [friendica-0.0.41](https://github.com/truecharts/apps/compare/friendica-0.0.40...friendica-0.0.41) (2022-02-21) + +#### Chore + +* update docker general non-major ([#1924](https://github.com/truecharts/apps/issues/1924)) + + + + +### [friendica-0.0.40](https://github.com/truecharts/apps/compare/friendica-0.0.39...friendica-0.0.40) (2022-02-15) + +#### Chore + +* update helm general non-major helm releases ([#1901](https://github.com/truecharts/apps/issues/1901)) + + diff --git a/stable/friendica/2.0.0/CONFIG.md b/stable/friendica/2.0.0/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/friendica/2.0.0/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/friendica/2.0.0/Chart.lock b/stable/friendica/2.0.0/Chart.lock new file mode 100644 index 00000000000..20172856224 --- /dev/null +++ b/stable/friendica/2.0.0/Chart.lock @@ -0,0 +1,12 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 9.1.2 +- name: mariadb + repository: https://truecharts.org/ + version: 2.0.2 +- name: redis + repository: https://truecharts.org + version: 2.0.2 +digest: sha256:75201ba886d52e9573aa00c080f9a58dde9d161ceef211cb25db1cf47b0f3b59 +generated: "2022-03-11T09:50:58.74573789Z" diff --git a/stable/friendica/2.0.0/Chart.yaml b/stable/friendica/2.0.0/Chart.yaml new file mode 100644 index 00000000000..e1ca1b9c490 --- /dev/null +++ b/stable/friendica/2.0.0/Chart.yaml @@ -0,0 +1,35 @@ +apiVersion: v2 +appVersion: "2022.02" +dependencies: +- name: common + repository: https://truecharts.org + version: 9.1.2 +- condition: mariadb.enabled + name: mariadb + repository: https://truecharts.org/ + version: 2.0.2 +- condition: redis.enabled + name: redis + repository: https://truecharts.org + version: 2.0.2 +description: "Welcome to the free social web" +home: https://github.com/truecharts/apps/tree/master/charts/stable/friendica +icon: https://truecharts.org/_static/img/appicons/friendica.png +keywords: + - friend + - social +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: friendica +sources: + - https://friendi.ca/ + - https://hub.docker.com/_/friendica +version: 2.0.0 +annotations: + truecharts.org/catagories: | + - social + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/friendica/2.0.0/README.md b/stable/friendica/2.0.0/README.md new file mode 100644 index 00000000000..9a3eda13b18 --- /dev/null +++ b/stable/friendica/2.0.0/README.md @@ -0,0 +1,40 @@ +# Introduction + +Welcome to the free social web + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | mariadb | 2.0.2 | +| https://truecharts.org | common | 9.1.2 | +| https://truecharts.org | redis | 2.0.2 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/friendica/2.0.0/app-readme.md b/stable/friendica/2.0.0/app-readme.md new file mode 100644 index 00000000000..b6be41ac2e1 --- /dev/null +++ b/stable/friendica/2.0.0/app-readme.md @@ -0,0 +1,3 @@ +Welcome to the free social web + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/friendica/2.0.0/charts/common-9.1.2.tgz b/stable/friendica/2.0.0/charts/common-9.1.2.tgz new file mode 100644 index 0000000000000000000000000000000000000000..a1931401a3c72396c0ca878273c2cbac48a83d32 GIT binary patch literal 42696 zcmV*0KzY9(iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYccjGpaC_aDdQ{bw5ZtPs^X<2q_r{}khyOa2&A3kk&XLo1k zxFHgfFs4Wb0Oi&={oQ{DPXZ)JQGO+vF?T0zkwBqPC{z^+g+h=lmr2|^SwOwF+(vEP_y3Qc+~G79vrl;(E2(dA)T~3AaAVI(U^9`i&h7yX0Ea+GF|=V zuP+DP!MNM+^uK8>A&wcuF(LvOT0$I60FGzLf98O@37NM5h#~Ks63_5FBaqMa)-&**A)3J~V!ZGP0 zbuM760b3xT3V*7Uj(F!6I(v0S{+%dDO|uHpO6gBwdDFw zx`4xj@njn8!-Mg37z|zLGqZUOP@O#GOD)7iU(oe@NNhgt&K&zPVeGDyO0seX+K zn)8a)bkAWoB)Ngv0Gdtc)u7w&4*SDF|HWWr=zR#$Xm->e9PJ++9HDT$fB0fLo*m5& z$Fn0e8_fpO(cx%191f>P{ewf)e=(TC{&a*6X5->mbbG#ecrjHfRU>JRpZ zv!n26G~OS)I2z9&91iyn#zW|5=R(_CQ8z}6E|P?8OI=;Bnz{yZL+a}Cn_*Q8i-Z0_ zxIfzOqwp{ogrof#3I|8wG#m^L52uG?6immnVE=GD80=4j(IDI(g>bmv4@UhV9334T zG-$h;y2sHqTvJ8YAPEsgWQEAKl+9~a)0UU%DDVx*YgK6k(P7~c7ZjSvhrt014+s7I z{=q>oJsj;%2ebY0=x`QHhtuJ~;4mDc+4%5q2nU1kMR2e`8tudW!8jNqc+~F?n>D`` z7sDvUG1`{WvQ{;fk0sQG1eVY?!EwmC-yK+@Vbp(du>WENr&EYt^bgUC(R45y&cY!Y zhG-m&X2bpf9!y^x_D2VY`@_+G0FTggFb=0jK{!1OHa5MT*i9GVU6UhtZlHKI3% z-c`r{YV12jDtG-|#nsax|XnZhWi5n=$wAXyZV9F-o zZ-1BY)l!irOQZ<@3;-b3UGlB?)5hiQ7)-#;*NWanaEhXBz{(1D?b9urwL9`ITTT(- zj2t402?{})gj7!d2nUc(z@UbKvUE;hhyY~-GBjU{qTeS3yfVnpJ>CZ#%AQEx`hWt0 zAVXkBNvvG};}CpEq6o+Hk7)>*;!6(eT=nK0d4au;U!e#wR0ffQm%v^LQgAQ;&*Oyf zse>v1rt#-fi`XFe3#i?n?l00 zKmqwLBP~A25#>M#T49Ql7%VX55*|c&iJ2I6`Qb~#Ql4~jiFoJXqQXE|2cn%;4@oa`jzHkh2!1e%MrU_v% zW=3WUaSDF;cq%)iAx}VC{BE~Y!&(R{USBR@9PZFv14k=aJ`IFptECEwsqBFP$(+{I z=AW&q$6+XI;Mj;5z!D896LSji;h(NGv~KGeI3suo369pD4x=xOz+<-^&IczN32=dz z=$}c9S{MH_0Us|;tU^-Xao}qpXc`$m<-6l^*-A@(C~BrTijlNVw5n79q~)@NsjaM} zqEiqI1cv?? z*aVEnV~e2mYB5d1R+@yz9@Xbj5?&S2dS*4&qy?c7ya>7~M%8@dYOm&K`4yJ~)k5VJ zVu&npj3~HXAWrCf*2w9>s{)e66kKDr02dekt+}b&Vr*?}r`v&}EW~jRQ2ca3in$7Y zObGrbhZKRcBm~D9OK1QiL<%PPUqVa;tiQIPDuZJo7E4orK{7{d!Wk*o70N1D;`oD6 z&fuBQ&rA5leb?_BC?{thKQbKQe~Pg_LnJ^kz@=l~!zJ?UJ}^jD_xq3s1e>7O9*nWmt76e#iv*eVruylT(4q6`D=| zfdWP~BbRaLDn%1SS*V5+PLq|HEyWoM3`|SNo+uxJaI9S?4}I zT)u!16BMv$4IpDMSSU5drJ%9^am)~z!9a}QS%e_v0|($WBxnLIIE?8!g_I%+u8yc? z8_LZ_L}D17Y5>$)t#W(Ge3*bXis^n^En0C3mlO53@({GcMUb{D>P|_&t}0*i;6RrE z^5^NWc!_5Y8M=n+ zi38s(9L$KY1f)rtMN))QzSw2bq~QFjmagk0Q=YsvAD8dcfB?3D!se#PUgUCZgW`a! zQ$DeC%YRSmAE76ODLUiJTE2+mtI%hH4dV4Q3D*(<7zCWN)YP#ys=*9LsN0gr8V|wQ z@%j1B??1enfaSWwS>!q)q3Z5iD6FFuCP^%ovc@v+f(xbDa_i|CIA6yMe$hUrN$VLn z-UWKO@eF*oD_eUt0pHx*fbIt*IJNtZYs#-*ziB-KC#FbC4GD@@-;-o%egn|$c3UW3 zDGB!se9}nC{wtDl#XTd*(x_lQ%jFV*SNd6y3J{5cwhAU7M9XAPy7FXUj(~&-u5lEB zDUyXcFkIr8BXW^OhME_z-=4iWzIc84>G;jZ*Avk8^i$Ss*WfPj-mw-ny8@$E$#r}U zNeGV5PI+Z6o^{~FRW?N=Mhwv|PI_Sy&>n;IiuQ2K^+6|u40d2D3`jmYJ!@DydRRN? zOPWyBNt3XH<5@zMvMlfACytsJ3EkIs?_a&Xe0TizwVq@%jH2)Zn&p#Dyg3sKI6e`& zaS|dFhIiu$s)j{e|ZI!l;#)WV~qCS0kgd~J$#z=>S{r35Dgvo#1J zNaaF3cPTKgN(FaMrE8f63lwJDxYzYgc(r$;3GfWiHDzeo;eF`@1dD~DUM)x$hMM%w z8q`1)xVFqs0~TIi@xkqcFrFilWVDkbQUx7-;RA}95VwMdDPoKpFZzY{wfww5v0h^* zl)aN08Z6-z0+ibZLRcXN!kB7hnSjsAB>5f_%J`J|QP%z3vVauVV7cyY+tu3u&z!a~ zl@*12Yge@7tHmwwZp$DlsApH#9-36Ga9_PU*L0zKW=loe>T#Gbs$>>e!Zjd>CeaFk zm_|u*m8Aevnn}x!uXMprW~yYT4W#wAHdeZo_HS zOA#c&0@;>;G_-ok$P#F~ju)?x7L2Y{J(tga`x`;CzyE!wMrZ^{9H5lZp03wX#vG34 z{A0|8i6uv9M-}WnlZpq&^A1}e{d%`0^~1UR`3A>V)MXg$fI1_IP+T7=BH;8D*g5-n z`f8W=jLRoLQ7V>M(VAXBg9z&M&g5JELHAg!6l5I zJMZHUNy6S@x`ZrPY=`xd+XuOula{eh30~m{&27&IK`?wDM{C~h_c%gQo|>I3;RZg_ z^+ z#sJ5dnG$>4P{i?^&tJSm05X7M%3u_MB#zeImilEpw)CD`LwxCgLM*oUGP$FmI9;r* zx-GTW0OD+rC{cmRjQ!dax^G~0-{lIOTYfKkH38>LuCm9ig zq=BCq*iyvj@SQWqcnXeu{3-{6I?_m^8VQ_Vkyh-Ntef*k` zgna&u$e^Q~RO7Fdm;^Y^IZf_)ffymlcbXOm%n1z8EQ_M`BVjLa7p9f?g07IeGaT}wENT_LU^ zmNMWG#$ceq>{%{evG0_`(K`PuYC&>^LcZQrC`i!iM+s{uR!aJuv)K%Pk>Is%lS7B8 zLkKqj+5^&PA+?<=HGv7^ll$j|SXJEW(-pyDQUNUCTDW=8FBv9M z6nf)ZJORhIMC(>z$JJd@plW&(Iq?}KHEF?8PGk{+2doV$B^oxF6ueqaAgjmLxdNQ3 zE&r~~Me#gB=L`l{d*Don+E*Ej)QbA{CV8)ALAvmBN z5+yuDIU1*DtI;0+@7Qhvi;V*CcQ5Uv_qGAiESV~(bZddib(AGg8x4sz^K#L;QM{&l zmR88u4Kh~HVuOIS;M`KiN{Uws*a{)*aEAa9iwOR_PD0qEP?k$A-Vc@pNz}EzooA_l zVFem|=Btd)d-C6N{>R11nKGk3zB>DCSC@FIv&bhWVdle@W&IuN~<0RRgGtQ{-yrR$FF z=N$BBK4R+p6$;hj#u^5r;c#q@N=Of|wc^1sWeA2KnOW`d(w|e&gcyx3A7K^F!6_7~ zsi%WMs2n<5nTkbLj(d)EksqAnluE0qC7-;9s^BOtyf<5g!dG7{!Q^L4a4Fyg>+f%WZ&|HY8mp>I6KgdudN*@b!KpS^ zbtqYLb5)bT5vL|vuU3}oxcEETt0olBFH3bR4{om-;?^0g#~Di^9ADYAlks@AP~^!8DNOfm*U7?g?+S?bnN z9Ck9Q^zf`mTP4FfeD>qGGldifHpAp?|4UGPX|t8yV*hK?s=i6m*I+_B2=!4Xnm#^PSg&l5_zRw$n}i{&;-e~#XzYc zc=oKIix&xHxgNH4n)s4WQi=MH2^A-y1XAuUz1GkoX4q0C0!09t z*>!PsT7U?{GvQx1LI#L4X(xy(m)37~5in z_W{XpG_K|(_8iVK$zsNp?8o!(K#1gdgge>s7Pe(uUbawa$~WujLm^ja-HV}#kZ!Qj zu*%+csUbmp0}^qbsCuno&iQio3QQ2}hV_O)(6{0+wdKjJ!f`*hs*~>kY&t6F*7aEm z0)Qz7LdYP{859fh*c^P|^>{(Y+?XZF1WX~ROzPMK-QylJfndR)$iDLPGK~KBsbYv!0p}$ooUU`tL?UvHc z?1Xb-8lkgKCwuD8AJ6tcx(fCHTBdCM3X?sh>-O^5wkPzI$Ogc9O#~TOTQTX%UQx{w z5|{)IsmKn(`(ly)XBJdw(cx_Vp5aj`oD>)A5ojIFp;QuU~6fBW?N`_1%QMN>S zvF7e(YXaNHA3pc~!qK@*W|wS%E@kz)sX~V@|(^#N_$efrD?|8St8%RMJxQ^ix2izi)DNQ&r#c4@u31+97us%Bf^ZohfJtykLfI!6K zKT!QD!{c+BEyO{bh$0Dcj#nrKRQ5`Cs$4&dg|iriV8=pZSFol89cNLr2jawmB+O9} z&?7ch`P^9~##7<%6yQddzn| z@toC(wYQ`Top2bU@pY1sjsR)l@KHGrgCzck&Y3Kn7oQyfpSxCC0SIU|?a1(`m}<5( zYl1MJu-Y3hBD0B1c__|Go2kQxvO}|}SUxDU#d(*viJde|3rJRA z-M6_@Gf^hJu#@Fk&1DiIGlg=u|5OFDso|638Y1$46ws~Q@e)Qa$FL(Yr261ahhssd zGaj0*O~3~P!=DLe=sh=G^X^|P5P(uRCNqPh?gdvoh~}FYm9(MwpJ)PJym;{gHo&D* zArXrh$&p;h%7ZeWPC%9>G59P}#bmKMHSt*qE?%&h#o)xOOSJOQoWTcU0SUKP*fl~i zfRTL=pk+~c8zLLZiuOWGcIzV~ISS##HF?YePAWf*c~R>3WMz*-W{Ee6tdb48qDE|k zo#THZ`SCl^`X@=T&tQfi0Q_jDo00&fW)DYx6rV?F& zXJ8;X?GM2kD@dYbPH)K@D@c00`V)6NGIvO!hn8s~lKv~&)Q&VSeam5H%k+0Rz-n~= z^#=FxrasByN!3EQ!PF;N{KOZ{`J!cQ3kai95G75pG>gT#)ZA;yaqeZ5^rkolvm^=; zk&!5JpEgW_D?~bcZJMZ*cXwf#g~F+xWuAeH_pjaql`K;%!4lz6`7aUsK8+GVh!Sob zdMBf#GsQ)QGcqVn#Imy_mGqL`UOD4nAtT$BTZ5M=uR6PCXGZa?qGs(HTv_`KSK#KL z183IHx~b2_+0yRuPrCi~Z8+gyg$sUL4)`rc-x>MWD)~z?12FeWEme}O#~4L18X;P3 zPyqKx{1C0I#jOr85DtkHktL>7`1jsNMv&h3;ey6VL`6&_RyAP5#HxYCDy7+EXNoQtc*iVu{vYaJ$mNZP90;tA2tP?yFg zi&&L^PLN{@@0^b3DYL8$eE$tOS9*OLFtBzH-<5%7kMEz2HQXm={>_+KoxRL?xN^5i z6znW@8qylJvvwE$!0vvlzYpj1e)#%=s6m4BaU-O zK1`y%{P0e7E6<4b2j<_0W?%1!tMHo5!>uyOH5+SLc=JH3)*Fs;5$e+jR|%*v7f>c3 zTF_`|@6A~BbVSGD;h|U7snL=V80End@AHVlE3}?~j3Qz-pn-|YTdq5El4NObx$c-E ztqt2=)^#t6%kqGL&sMY*jzhe{VFn{UGFSTk1d(@%G8hM_+maL(8)!OhCsmmjMcj%= zqG)@M_*?PP-UwkvekGAn8P6b4sWT5835ZMNdr0-ejh zw`hO(1D3y>ea>KkVA@gdIwH_lQT-j~3%Lu&2_7UdWdvf8;(RM5CKEK`c-}!P8H&?` zl;U|Tk}btah<0J&c)vDaI#M_W5yyAw?$mO<8RyW(3Q(J;Z{ZjA`Z6N>eWO zPtSBPv@E1kh~7);NEn74g+PZTf(H=`Is%6dmw4jO4wRVpc3W0I%(&vz%F8_H4*Gp5 z1q`NAl662^hqVUDvaR1;Utf2f_ip}4oghJPT~pALm*&ulw1C}~$*C}DfoI@n1Tvb5 zOG5|>lI0S`p@=`SlGEh*gj7v=_#y!jf-B{$6In_)%Lh2gD2E&@5^O~aavjo@xlLe1 z6M$o`3&gpy1sC{K#uHLNvY0QSt>mC8&v1kpix3BG5ZMDX3l_Zbw>ZXpc)L0Q%+@L)x?En6Xbq-B z96y0Gh6wm3r|~ykktmLjh}645noYo{-|sKg2E$TZWq0%g7Fo9BC|X4ag@OnDw>ZzQ zsIHk-v6w0fg93_Hh`@+XjSgP~>r{*~+{I+k3q?$iihHV!w}fG6a+%k*Y@$3roxM}d zcfl!Z&@@ojYKil8IG!bY$|I0u4E!z02w&t=IhiLtF?+jLN3;W3XOS$$?C2#K>EwC$ z^=;!FeLJ`!NAH=r3b(ULW4~j_%0b=&V3pbj5^Y}z<< zJ$0&}eFCulx@K9f`i#12FkgGh&BGAI3_}@3sS@LAzYcHg+)3jhW?cvF8W`M=RX!-4 zbY1RkCD~k`U(mLqakBtZHV;<3!cla7jajg;9P{XlxG^GBNt5a2>Dg*zf>nKA$Hklo zN-FZMSV=B51q-QOD`@BrJSf&G##2R+mAlv+!Is%Lb$%lm1FijMX$&Y1Q2?!rek`w+ zSP?kxEVUBjy^>dn&E&;nCg4zDtd@H##|dGs&H5c9?8GDk@XQWMM)4|lk(6(40;R~} z{ECiHAYKmsR?8y6;Zrk*P)~VB$-9YhD=)CKk+Di+{=Y6qL47UnT|Iy+ zb$e%O$(_pS)oyuogOa-*?ObNK4Yfy#uh=kW zJ?(Gm2(O5|q9VjZ9;COzMWaMz?qCT>iEP9f3=Jp{nayR##GQ-AJ=5vH%*dAxh?Cfo z0!0L@FKrc4-|Ma@Z?RpGHb^aVfIxo%nHg7ZJaGNLK(UK5EAqoPe$HdWDHh4QU%i^4LhUR`Co208}tZXL59Hj`Hx&~Y&4(dm^r4?2Y4;&YB(AOP^VwS>f9JSqRMxWqVcGMVot%Z zSi37Pw-9+2@_ELMMiC+})^@7RE5ujnSBP>x3b+ZUlN4F4%hrlGyw<_)$}gxUB!A=Y zjm&2*ZF=-26&HPB?e*gV7>KW1e{DkIs5&qz&5EA z3a2v*=kS5LCrl1qx9(KE=d3)h?K}4_1nRcO-YXBj>l5AE*<>k6mJH&^GRSh9EK26m z?L!wh1vX!ajQ_ zH&d)rq>{ltet5%s{U*7>;sa+6H`wCBWR?)TGdD*_r3IjBxv*6)qC}q%G>IdWk;5zW zzU}e?-u1fbxOF8>f4g}RBSsgAJd&yB1xYf_0^)USE_o6+E?r}`5H`nI65iX~&^Xl1 z4TI-HEF%o?`z`kuyuiA2V@k!*cT?AUMYBG6XsoYr8W0rHw&wZ3y_i`i?ViMj~s&?E?xi-M(9dS8LWIQS@;;wd8yq zPPgxts@SY!s__ z{|@)Z2Y(ujhJ(TI;9$@n{;5Cg5BK|j0{wgLtM|z$gXB;BJGWKr+#lq*x#@k|5-QB( zfe|YzwQW0%GL#Y=%LGCT!x|#jKQzptLcLU?G)VI6@AEt4U1O@-`nLD=YwPC5ggdom zf$k!OZP5A3tq1-U&p`K+G!z166MP>wE0mpzGF@ z>+a^2zkY3XI-M3wv08^sfQ4OeHJl;_2dyg{hZ9gSqgqSEpo~}2A)Yrkc_##VYQbp` zEn+6WbBulkG3M%rff28&uNx6fU5MVPn`{AauufCjTMg9K8^`wMrlS9O1Q%adDk=bA z;qDtKNm=l#akAL7766tw{(wX}V_FHtDr12fC;;%wW&n8^3&6etfEdAnO=dsSNz6~q zK7M34!v7TN{S1+So1b%}$Tbe_ zcL~Lz{j;`*^4Q{ic5;~?lDtDd8{p-1RsZNHNu&S%t%dII=qc-e7)5u`^}c6={_h_Q z`>y^Uj0Oi!`u|ZLq5svr_>8ROnb6$9>i9q8t*YQu?FJDfd=-3QExZ)dcwAWhdB7kpuw#`t`U*cM8rLa7330kV1 z4{gTOLgTCKa~t9xS+tbrzd62fZ&F~x{2vSl`-S;`us_;=n*WdSi246P%;Z8QOEVdC z&OIFxqb^sjn!tvCs;05L8^TKI39UAqnMYteN8mZHum_&!=ZYpTjggSQbd8(5bZM!e zOny^9LgGNJCOTigwoK{Xw=#{HwN+@Re=B9@#2k_ z@NL@_+mcF7AB{|EdEtTfdojQgTpR3!IADAf&F~eQ+%1r>C>X_tnLQ?L@VwS8v&^zT zpy>RUc*^qMBt zMY{U5kr&N6B<(!G79Q1jT3Bl55(I{g4rohTgkS(EWUw!Pg8*(m5lh8AWPe#InJs$mUa(3UB0kA>;?~e`-iu(WH zaP*}AALF@={x=MAzXpH-+r$Deg`Z4-e*qJK__lAHnriFDpz)kC0vVdG`Fd6_%G)21 zWWcr$h^b-kEy6eiJ2A50-o@%&>N%Fh1%Y5iUfDjScIZzi9x)vmKUG`^gx6GDiQ6 zjM1|Fr^DaxZx3*z{kLE8|MU+Ip6tKJc!YD?_Wz%%Ll(8(e^6z_Ddwqn{pa@vH}w4L zgCCaPU%x7N{WbGe`25vp%j2)%`278$PBm5b30ooAz^Q!abRU5QfBs&$NFTka9iFY<_%lO(XH7Q!HgSZi+g56UZ!JLLZ zW~jq_^A->y>_?INxox%MC0mgZ5Mf<;pwQa;@ph@s2=ng`wUn%48Hr1|=!&;@tE6-r z6u`3RoqI_fI}i(fz^=gcF>mqrOw(yzHz-;s_)g6I?cV0{^eTvjc4Hrr0hvy zU~;d5U9cmqBu<{)Qb!Zwt=6@sz5r2GY;VCjw)SYmG**Q&yOch&Fr zYQZr(OrlNU|(xHvaNSw>{~$C*9UqGCk?GC*Af()@_ff+8jUQZ|!p| z`~S@Gw#SP9-yiQ6{eK6e!Qqqt?=c?X|2s!P5{Hni?L(kkq-sZgl)w;?;<-?<6XgeoCRfvvohvs!m#Gyy*TMAm8H+eJKAX)G?-aW`+g=&jPY z8D7Qoe_N1ES8Yx-U85Ol#SCm)pr)%fM@`q*fZBH%j>7yz;1Z_wY@HvM>sB*y4m3Yu zU4Kk@6}U&9%cr76#?Ip)NV1p}%FcXYgg!z!p3lN1PoP~0>b0zg0y1{N5*1`6pR2Xp zpmU604Z8iX*h5W&Q=_=S50H`Cz&OV*k z;WZ|iet-(fh+D0^w9!>N=oheK4hRTz#CIta#fx1P$|tI+#EYWSC1;S;t`$Sbk?Rz_ z0Rm#FeB;yp<(7(JUNUrS(~@^{w3pRV+tY5-*gr{GN1PRx+QrS`n}4ZD>ObaFmj7Ji z->(ALbpHQfI4sKl{lSy`f0Spd{Esk-EdB5)zlHT)4+2V)(-R^jII|ELWJdvs?=WK` zO{F;5VnqYV5F&LC#D^q8zoUbL0&(}q;LRNl3|6(U^?ARNv@XLGSETaK;t#zAR~?F^ z0CM~IZo~H-jzb*JpGI-JW=Iktl?W83_y>|?X$|FDIw`0|q4?hMe3M{eU6_DeAt{uS=#!6>&ALc^MB~hn1GhA1`vatpDZ8_&zOw z4f?--&>t7||M+n5r2ik|QTiW&bI)b|N{LsiYVAewC}ShDCE(viPRrBM?^F0ohRO;| zd5O4)5_e<2Qs~u9`+v3Ni*No5LHl^;KZm1!(f&W^kDliLqdX=5kG|*kmi`{&)~!1L zs_zeLdj3;iT4s5G^eflv2@ta z;P60a{Vdc=P1YUt)Aj75eg%^Lc1Qh851vl?-R7y(|4=Tp?!ye&Wd9$Q_J78s;Zy#v zM|mv!-(FvDy$*0g3Cg}Zw?tP$+^}wNTm;_rgVxR^)md6d>{ekC-~Fx?k29grNXcj8 z_4PDLymikD5YPP2;}q^`4X|PUkM@UyqWyn3dOH96D9E{zHZURB86Tc%D@_l6xtOIz?vJx#Sf2L!{P31;ZMi1673 zzk*+~#7+a6U)$z@7S|O!*V_xMSVG`D$GJ=KKb`hoym;{gZu?sCg<(o)(mm7$JHQu{ z#0RoHkCG{j+TeL9lJ#H375|$&CHr3n$M>wm61_|7?89wV1e@&t;h>QJaX1(bpU(e0 z$|LQ6ZThoB-|AL4ER)17eeIi`!aaavl@~xzl}^ogqJXN;<7i)B z?^|%3rd%G#F<)%g&CF`HiT5b9&uPa)nZ0+=3?T|L< zdI4sB!*1>kFT~{M@XJA?z8+X(s_IFVuE$dTa)(cq*s23EuI=39Q?3|A1-gC+?LcL9 z80HGC&1QC=)yYZo6OAaJQ=5Y8HFj-EK5=LW-uNQI$aQ#+%-D zBb+K?)~1^+jfR5I`xd-H43Q<5>EfiCy!+YNC;h+TOm)6pD%ofiXg`jXM%8YniHEmS z0C~n6YQmH9%(wkP;Aq2BYm3W0@O+U_X6Fu8(D`dxxyQF7R}`XhH-&6LL4VicPQ|UV zFNPj%jz`;cX18J^t?69YnBKQ;E?CKZ?=Tmt{{F4)pnun=q5ZGyi`#7oY>NLmJRBG8 z|Ni*N{(qFm?Eg6?0uE6C3+A#&`biO~-3Y9+i1{>ESKgcNExZ)Ygtp@_)L&2e$1Xu> zLNQCo8hrgasVT_d9DM!SmN3tVYzjd5AG&&2+Ta694IS~S&@)n^H@#tfi%g-H^N3v5=9U~Y-Dt2QcqCkMPV(RCCl zulB(6l^|rf?^m7sg0mwzV1rYAH!r5+uAemE} zPpU!ll4A2p=GyXisRP=bj<5{)pLasFty-!CpwjBT!o>FR_1eyfkdkp`xpL(qw|THdP}#$1GpQH7)lYq-Z>9TKe3?4CgFq)^&1IKri7Y zphuE~^}3WUdN{l!6iPpMHkF^%yPKLbHf3y#t5%%mu>H1MhAm60tC9Y{7$?_5Idn%^Zx>9~RvBO7#<3!|u4lr<3E8locoMiuT=q6rutjJXnEXsL8t2V9}G zu~(&gGxeFUPhP!0+EXR}b*j5NJO3KU|M93~{~z?9;{PAzG4kIeQoO74&!koKy8iT6 zpW{z|+u-(di#2ijxiwsu-_|}q00Nl8DULA1I$#Qhp^lR3fOoGiE{|WmJ$={O!aryw zqx>U!2Mzb!mv7Lf$HRLDIRnEulo={|Qyll`Lj2tc#6L7bCGL&dzO7`| z)f3p46ui=9dm0kF9RkpuUF7XaatfJ33kMfJKb?x&YGaMn=$sSv#J@Z{O>_0tLq;8a4VQmiu5k|4O@h2nE z#JSCPKxS%-fl(@Qf--NMlZ1{n@q_~M>H5inLb;1DGNj1~!H z=56uV3*e3U+TqXTWeVBi@=~oe_z$sQs5nCKZ|1^iB>x|F{XZO**Z-sOll*^_r!4>P zy8gFSL3#aeB(Z1xufJ_r|GUMStpD8_cU=E(v8cE7+#hjKZ&>2K7WFng9)3~3A?n5; z(>Ufvs;e&7%rAS01-X!Ptb%qautj%97gLZ*;Ud*A-N2FZCxT%3K91HCaZ}x$BXb(W z;?$1sAIJak@BVDo|7K7h%KtMs+&?V&f1dLHJ~3{9mPU?^4_)`QZ5<2mN8cnE!EjFnpT-kMUI5f9fjI$29%Kb)=Tnx6L)DH|8qJ zc9No4-fVj7i&1kBz;B?K#;!3z^9+(Z-NR}F@if?KWO1z0Slb#NOysBUailU`|GT=o zpPs@~C;!zn=v_)SeX#Za;BZv5|AzZd_kTUgQzifPaUePLKq~=gQdkt0)Dfl(Bs1^Q zx&`A<)P$bXMO>0f|MLuQ-dr$}*}vpZ^dY8)Sn;d2A92BNdb{;{pWZRCkM1kI?_@qt zy5{%wG?M=hoBv_|a9ouCgTemO`u|a$()rK3ZvT3uWWM{WKKeF))u#=6zfP$pTfa_) zyCr+rBJf+kIsfnT%eU`eeSGtJi(O+*y+7uLG3THA+ACI6c=&DNicJRI{uPd*^J~n4 zh1=TqrypMbeEjB(-CFzoyS7#2!~2gHuP+BqiNWEpI~aHS-F|N{Z2K>|mc*=JiZ3!4 z@149uo?f1wtwt_pve}y(VQ#4`wnHCXDu&z)iJu@o490o&=lZ+4<({s_@=6+0!n+f{ zp>Nf&UjndWB@FwIKd;)}a$T@n?Bl%KM%_t&by6@JP zOChD#2?-@-P`vt{Bug2qAniDHNhsKSGiSjkt7W`}d^sM%ih8i)baIDAmo6YdVb>JY zWR%Fruhj=d3qB8Ln2e{S6o0{u9bL0YyaO*A;T4JzrDr6WiiVsQO+y|!8(Mj=fQm-; z-^1qr=#K}(QvBaj{@=%W9w7fmaqZZ7sM|rG+v28aWcTx`$nH;P?=Fu&Ui>(b8PyAF zrHROGCT@QP)A0z!!S5r?sc!xozw{kFfE(xkxP1QiDgNhio+|&}&wA|d#RI5BM!npy zwn6;fy&R`I`uB{>t`r_wz{K(O?LL5q&+2pIGhO#O{tf5 zKOA4Y|KNBG{-gcmGAg@_{*XSSpHAPrIsf_e;^aqXghd!&rTb(g+$XNz=s|obqlUhe zk>8h6?&Rg`|2lc|@zv{B?_OX0{QkpF=a;8vpGGBiD#I_({$Jk@)sS}M0__@8WivBB zw0q`Wd^3mzmO*ko@Bce_X&&w=*?%hC|9zbM*UzT-kHh_gLj2!hfAF;adz7d4{#RJI z{S`(!2>&fi@Ad9ieaS>2eSi|Vvn-1A{UDot(4FF$hPN=)wR2EbsnQ*@UH1?}ZcnKj z@w@(eF6<-u_V;f2OoZF=%bL6XJ%NYL<@^eSdqvBxe&4lU`%YwN+Bg@l2>s=LuYqUD zuiGYZC^RO(-p|dt8t>wDx>XW+!+p9M+&x~RD~VBRfxphnvNQra8r-hq#H`XG%~VLW z{6}9HA~B3kV}{5K28ceG|8G=^{~I4Z#eYA_vz7dRtylsWo~Tv=8O8Bj-WPsy{N^?I z;p6FM@n7b-JR-cXSBpjSmdwUqUYBZ1v6B%oF@aA)wXcq7H;8dJh=W-dC%x66tz?!m zqmLPb!GbSNUm=nI4JWZjis3IEF35`4kc*e*Hd%e8s}y$=@QwH?dh+$_H@}4?SUvys zO=EXI08&5y2ZP~wSUmr6FnG%U`6$oU_TQvoSn>wP zSN9B7rMo`QFM+ROks{#>-7F1&`@Lo$JSddM!&9h13q@uswWcpdJR&XOh$u7erPxE+C|c z+;oN+iAK*EoJL+zXm3TBOG0%8b*@aqS%%>?;po#;*-&kTdK8JoOG9)FDtB!- zUlzMdThxF<_Qt=iov{&5`=Pnr!3hDj{w3zJ-?JK<$rhn zsFJs-%?Ly@d}aEaa}!_Gk|bl|mPJO^X@X-$+g2npwLaLl{9U7|*caEEu}zz?##uFE zk9=v_DrHYKQjbN}P2J_H0Ca%3 zQ##LcY5_5o)xFa>BLR`ej-{Mh&s}PJ#EC6abC@)M5jsKoHcJ3X*Uc2foBjWVbwry* z^2TW{u-o`cfW(#7zQ%Iz$p^H;e8PIAE}nsIj!q?tf&^AMLkz!Q^^B*&3&zrXSjBbVb~amUhgx10ZjGKfY-tumJ~Opbu8}IE-(#k_*PS~| zQM$I@i^WSLG|VfrQi#j=*ce$=#cyYY;lat_TuJj(Z&VAKiv+)3#MylT7KxDe#&}c`;#ebvR{h0t zXneIN7iwOXE5;f4S8=*In@$NaZ4<;Gj($W$MawQ-^mOP~Clvw4?FqO- zDD_>maQF33o!NTJyDl~^SGQh~!5~1CzD+`8Zj=;j2-9ox-ClowKrsB7V20ku0cwk* zQK@3ddm;`Y}{NJR^Vt^%>VwcPL`iJ>Jl ztjfK7(G`f&@Qyr>klPAq({Q;;PS-J7i%0fl(yecJL zBdetA^tV2g_j0_gou0Kfl=Lt}1zyF;WL4C3aNjw|`-<0jTC+se zSBJXwAnF>&>GyDnqqWVy?mKte%Tv6ba;gT_$mG9^!?%fS!Y(LmxNxPgXYFG+mWI<` z{>r{vQfv}9?&z-Vla{v*y8h~J{?bx<&+TKePHRRzyB|fmCN3b|LPBY`#r}N7$Meds z7bj;{bbx+80T(A{EuRZNFOhfNgKTjh%nQM3Bd?HKTORuC2vgTl67P~wY!7g?D!o=x zw+iH9^>KICbW*>vx}aZKI^XXD@l6OBFA<|keY#uqnJd6uC8Z)1u!Kx}vQ2)fm?iFK zB~7Z&cT`CgdxWa(Sku~@db74_(`ADtP-&FEjzbw}aNlNmi8M5uQlt;ALL)NGnR{hy zmZiI4Z!K%Kls0wpMmFt}Ik_-7>f3u?)pN+dLw!%1V;lWHmvV`A7cbDJ^Pl_0`#%SV zhx`2}|IcGQ!vFIDv5ds(vL&(P6s#+KKI#q!*YDHVms4EfTkZ=rVa~*in!J==)%?4E z9(J91*r}U{g{XUzm&a{bPPghv{EC|&`d}wQu?uV0o~9!C#g2B$yi25*5uP%QASbVO zL;Y|2&-8!W|EF!@AGl}769s}Q99}9C zZbLw>^mTp50cT)dp*1Za{wtVaLRoc?y9MxGeB=KPPg(x!v&yt5L_fU4#gFRQApb{) zhsE<>hyBr$|Nl`Qp9D9FALRJAbC z)o=ln*{&CTaMsWKP0^mcu>)A=q!@OpnSj5(NF&>_t7TT3zhLteumQ;2QDWN+3$8em%@P#0k>zB{o z_$%*v77)+X&Vii1izKk~p;OcH4Q4cHS>5qMUck4J9w|nJH=8 zhUVoAvOO7I*45FC=(7!F`q*=3M~Q%PF`3E1?vZ0B77)4xoEr90 zt9LOMiZj9bUJ#nhb<#N4Dm0y~Dc2WMv5Dkw#Jhh~*-+|l#MjK3&)??SujZ?gqV1|x zwv*J(AZCwSS$Z-zTBg((txRwS%>8V}Q&r$nF`U{vSR7l6DGE~81LS#06jV&6)TH=w zM4}I{ioY%a?sPh>?UTbupoLhbZT4(SAzUPhBIRl!Fb_6pyeU!&%|0BYjL-j;`!mFUGIKtGxS{CZr7?4 zr{t=v-1Suqky0z29JI-Fzw1UCZAaaHo%U(C&0PLep-2`M`7Mgjwh229yt{*&7#IsU^7!@5bh^h#IxS zBH9g<2JsU@>;eZrp|vE$uYe`zjNo{l-!I@O77pDuy|~@ z6C7>#^fD!gqL}5;{~deDsDDU$7UiU~G178}K?-+ph1MW(hM}JDmQMKHkrK2m>^Pel z-S1OIIYl>7N-C}GNo6U!-yN-PNt!LDvYDa)#{hph$-mNCy5$`2i_kYO-MIEVL8ILc z*fGJcMe=nmvRP)x?#6jz_i{#(rMXQ&n02*1+t8!u3MIiDw?{l*B5pGY$;qUqJ+kXql4M59v_K@*E{qeAr|9w1o z%K!T)kGNy&M4r>Kk5b5!8UO|)v66jOUi@Qm%5_4nq6CIrnj&?8yOGPa;CSAc&R3+- z;uWusXm>SmlKAR7H$;>FNN^0=d!T&_*cHChrZm{H`@eyhtegK%GOarZfQ|8g!+vT0 zA3ojx`6!RPV=s!5Yw%MxMaoB}Zv0B5A2dX9w{q%xGp=3bpzQE89r@Zlu`5~ac6IxD zrdogs=N1cwFR)@5VVaU8C72s8x!+HO+ZD4HZ`CV1k6hj0N3{fxke(l_3UYvc2_o69jkm0B(~1{j&e>VDOax=TRQp{!{0b zw=@0p9tWR%I{%5_pPD1S;=4NETe)rGIk{qsneGV((mhU7E#Jj1Pg*$fyt0yoma9~y z)+obS!Whm`*qN$JCG}p=d7cHWEN0L3NuN7VwnT=G7rzacW?KiU%XM)~8H@wu_RJ15 zdy=mIs!yH#m#p*P`Cmqdhei8;ygz=5|9F%~$f?&~QmF3O7DqXfnM~ip*`QK9*@DFi z6_ELl-q}$U#ZxL)sK=*5)+8sU!vpFi*fD2uJ)iZmL4I;#Id&`0jpVBmp&o?XGp%Td zPFRSiX|Z2UvN!rYL|JMSvztBo=T|s>@-VVHAb($Wersn4wT!myRjenXbhUzj}Ah z%i?%0F6iCuwoYe&NDUx?s5_jg;s)^!tGnQ*2xOGwNdXkdD{SjoCJz#_*e0%xEAm|L zB8T96bz{dp@mdL7ncqr93OuKKx0&zc@o-(eSg*1@2klsfD~U#8T6TPaTjFQV367)?)?nI)o}gR)w)nF!QOv{;eP8xn7x+U)-BkTNx_`a)4W=85|ly+cdMYrZc@n->zW)z<~&71K$Q*?=Y(vMA`-1Z z069}=Ceb=Gi5W?v2oaHLWfOy#(iiL0<4CdYBUR;8+r$GSA0E3TZ5$xGBnE~0oVumTov%a?$jKsWdMQ|jBp5wZSMS;?zXEi@=4`N z1OMylc!4`?~+|Au2gtq_c?00vIV3r~)PQ(m`c=l;4!( zrQq9M9*9ujbA7(D3#_J&GnULzj0m53X+qhYAo@!LQb_4_LP9Fek0TVKunu;JQWS?M z4zM_xqQP`={14$xscV&>5Ysy~C?GUyYY7R4;q*?eDHz4}8aZz2=D$t=`LO=q;eLOA zRPz5GJjH)L$|J0sJ56uD-dmM&uv$i<0_Ch^6vX^SoKS_{)z-==BAzNc$r7`C#V2bP z6QD17ufx3dGNVjTg0GIQ31+B>mED{J%ESbAK|4QMp|NpV@>w1&0jKvZ5CuV+gvWU> z!5d7OOd#dHm!!{+OWNOF;eeTxDtRe&r;ItTS8B!rn1?xfKug0}4zg7#Kar_%f^nP( z+KP_(TlTi#!^DiITizkHYIC=OuF{F_kW{`ZQB%HdL`ciFjB@x@w6p*>CSwGrWh$1M zErPG1p;Z~Q^%jmx#t2TmRLpC7nbiB)rLMQgwv>iVShu>RW~9&S`x)7fPhGoB#{^dJ zw~Nt+0V;BP@k`aPJPhx9;cq(*O=p6)v09iqOmTnJrD2Fxcr*Dn5Xl0vfj+Y2@0>z8%XrkMbyr4Bl z3R}t}qPZGWakbwP@qTy2NpqgIrlldan|wx-!qaB0kdm+(X^I-?%|sMirXtr`vB`=q zxcWrYuEW8Lv!H3ErYJOKjNdZuCh0^a6O_!R;-^O&`Ua{=g4t+^d12mStesl`is(A( zsx-6=$9*>=nJ`Z`;g0jdQbkS8nUR#BBxS`xCXQ0iT$yX!{l-)@o#X@v0|E zL9{xrAAD%6<=e7+WR6o*c6gytv&BB>c>YraxIUl_Pv zpxCx&vD!MeB&)MoDr=v}+Fc89X?M+I=T^&`B4m-%Re^37!>Ak77Pq&YX%Mez03$IS zO0X)-81xS-aSM{=6vr|$M0$r|6jkuHR{J(L(=5$7E=b}4GMB}jLAS_fVOle1%e(>F zW#rm69-We9sKO(1ZKU(EI&O@FFptV;prUN>&c=XGP5n--#=Q5N?MBy#q-0e#A~k_6 zxOHZvxgpQeWR$FSJ!2^V+MaI0=obDI_kO(UaoUC@hN_(*FQ$OyXqH zi7AG6<%(eyCpbn=;r<#4st3=hGKB}>R~0HbIvS~)pB zyL|Wh;_|!GcdstbUw`;?dh)ugu1{ck9EKi+8)TFv%gWC}_Emlj*D+k;pz^zJ`V~pi zy0$C6>&7cS=dJq-)L3-R!8aI&6+M1=3joC&tBoLpyaN>-Z-|5oq6!N`@~ZAT{P41I zy)D`+^wnj8+7`WCH1m_-l}^Q#nOT~UG-MWMQ#!AdhyzQRi8eKl8b=66x;f*o*$ z;$r;;_jeko1<3Mrx%D=zwJE#m6y?Qu?T zjqOHhm}?9Ju}UZ@q0lah$a0?FdV|uQYgMLXE(aYuQoVL0O94vYK(TceR#0taz0r`UU84SG-Ik zboS|_?L`%|nF#l7r>mgMAC>TaJlg0oZ zt-O-fFmE~5?mcs5n_P6QYOlIeG|**nwcIasNqHP3 z?$yUyzJ6_WRC?j}(y!=!+NmhQvfJqr}^)jRw1nZPDp#KDh;{{|2A~j^Dg#0YDHH7iF89goP(e zBX7RiKAnd56LYqOaVVSYfOc<+;~rhK_3ut#{zSnd0pA=u{*)jg1O<$bxGh_|-EaQm z=B9k_2Mk00d6nwRxxU8{GJGd4t4)}^55!YN9qhtX6mJ7@uWqnNu4B;o01n1SlY{XQ z=&jPYr(5_B5GXZ)n)`j`M&tLuF4UwiEKfhgdP7obszQmT=W1F_=%>(XH}zx^l8|pqw^~ zm)Sb4`l#M=uHzD)X*P8~suwwcQV9?CPsVN4v(f%jXTTA;{W+j|`)@Ef7#H$C4g34U zr~H49^4!QXX&2nCgE$6exb=~<5a76Yve`PAR&B>|a3>m?wBjtmu=)NNF@1Bpq*y_G z$+IK5HO{gqI!huPtR0(1eCwv>W3Jd8!$2u_kEU0WN&7LWFxpJhT=MbO9LeKcO?Y!t zV_i51S(sOV`{Bd;k7sohz6HqpfaVjt#VrPcVE8_c z)*q6DakHJSDML#~DwnG8C=2bw+SU(?Met3QS>hk@&H~)S4;r;u(Xx7fB~cc*Fh{^2VHuh=az?>yG3XotL3>J2kj#!OHI$8*J77X z5jE%q$koeVpUBYD1+Dk2DPYYl>oRY9U9T?vD5B)_qAW?bZ2OZQ%Vrqxl9S>+XN%dF%awdz-PEK(TXBQw8Xi#2# zs8m($Gnq?~rYOL(wP>&>LCg{Yd`iN154HIr{zmai^LlwZS$%Z3D}Z7^i-|hGyvq5< z;hwyXmuYNf1ztYwRB)-=%0}*ViR%?;6}jj*`px>=&>!J6F2c6-Ae2(x=bjK1nAufX zx%`VSVbhco=jTvtM{*8K=^me#*=nU~9ae`lNv6n;wTWx(ecJ*ud5qjEydW8RcYF@c zPmbTb20F)42t<5-JWFIJdCBq~4A(N;ikR4CR@K_O z;Q#*LjUe@X0QBX-VAv3%+H3s+dYsn1j1ti$Im8`3#06MU5?pauZm9~8w+H9dj~!+qMqPm%9D8|8nRgm=vVxMBaVKkN^R_kRrr{U`bV7?0fl zYh5fvdNe6nv5>;m`+wb5qYc0`3GMuUj?>QU(#b3Mg*8=tSG#RdK3i2zQC(x$`|??L zD;$iTla->m=DRml2f^HC2u=jR2vVvqUn#w8zO6!o1q!nW5e>_E(Hst!X7A+HT)c$! zb2}J%VXgnJt!gR4AMH zZdU&=Ru@Zl6M5mT=ZoM-ZgUaeSBfCv3SJ>0-+DK7%WVm2s2_LV1oUGp%33cb;BSAw z$ENJ=b9+nv+P)F%PZ?BouFoRJ>YC8pe^UJ1VBd01V1UjL!9rFfaVRQTC4MLssNjDt zeofefS$x*5)Jp-g6{4pOhGjQ5tzDgA8M8_#d`9Y2=BM;jt_{4?UacE)QrHXb=jE@? zsZ7Uhs82Xwsq4G1(3;jX^DD?={0sOM(1b8?SL<$Jrznq+(HC-8Lv!8K)%}= zL|$&lIE`qn1>NbE)BO8>ISB>5&1PNAX4L5cz48;NkR_O+BfoeWcA*toR z{{Vimf0w6$|BtXc-T|^{|L1U2y8r*6|8)Q7qda2&=S<`uF%Ca{&z<_ zC*b1btQ4)1f8~gm5h|z8sRrsO&w?7Q`g_y--z@({9LSv%z^3#6!buFGWR8PoQeTA$ne+B3!AnTi`d)msS}qFv(jr2A=&I`C(!(N5opr07 zH>XlF*)7@%$f~DS?QUVEH_A(z2vVA(D~sj0?Z{vx^;Pa3HR@4YUyD`1V|Uj(iJuGV zUaV7jud$Fi=2||b97K_KN*(gQo%98AU~Tay3zf8Mp*g!X{kh$?jQTz(RaE;-f|;D- za;iz0Xsvh!u>3|-6!@YZ(t~gJwK?OU~182tVyL&04j!)+SPjp7`rSPg9o49Qsdvc9{{jOro$3yV_z;z?`l~vgTHl%g^@&nwC%V zsxV8Bn<4ILM>PNWH1dC^{%1x`b<_fP=zjy>9aZZ;xg+nB{`WCHV4}W}4%#gq0P8)U z)&TXYxxfE)K&HoC7Uxa?Xi4KJ%7&bNSy-vZunD23!>U7p{9;xfe4gJC4<-C$N9N7o z4L#|K%^FInhawBX@SMu_1%xf2of@<<`k?2O%5Oi9i3y_D?;T2CK&8q`rNT;)@*=CJ zmrydWF4a{rtFAaZjxh`vIx|)_(BIlZkpyH(iWlH+mJO@F?tp4zu2sSQ>+Z|q_-;oxkXj{Y;kp)T(V%>RmpC`kpkYR+N+K2hv1dIRbp2r;9qK*MH$t%lyMp_ zfYF!P-0>IaEPBKnhSH48NrrHY%FXFKPo!al=eK`V(fo2-m;I{8q+dnid%h&uBV`0h zGLU z){7Iw)pMnqbKofuswkqizN-T~PcrFM+=kH3H=2~vB6U^2%-mA!>}WR>#G1-UFlmCNJrV zR!{XBJINb2^#fmZ+tUiU4Ia&5eI%2tzF*{M=Bd%WLt7J>)Z8mwar2jC_Ae6foTcSO zN%B=}G=Q@_BGda!Rt$EUSn7HimpU&1SbJ7AEsS6Of@&t&R-*F*K>1y+&w~9MkQ=?k za%kjR^6yu>-YsjM^>w3U%Xdkbzi0e(TCYg93!oU~+zfy(r^a$@h^86aRpYH2vvN0p z{wjM*wT@ntugQ&EwLU76G=IF6I^F6vuV#;sKxfN9?WRPYBa|474sA0VOKs#v9xOD) zA~lt3$T!HVgd>a|a705?L*Y4`UN>kK`+4r3+==%dpGN)P4DCPud4)5I!`Ws0FNlh3 zZwc(s|3@RQs{ebFPxaqF&Zi;&Ti0!12n!89Ojanxj6Eh<2wo@>vvnq{1+I4nLpaD1 z#?U$qVG)s#a;Ei42ph5552Z8`wbUG{)|z>)yb#Pph_hT1d+7i5p;u%O05k6?5Iv;N zNsX{_4c;^-`uzi((l>&TBtAtC-oZVM!&4-a5D!*_;}CN!_@ul=);QX%sDS#G*@jFc zDYR7oK}JF*sS0OlMjmLgmT^)^a=%Vd@4@S#oKnx*_DoLynY)Csx% zF-sC&{#lZv6;A_$;^16C`Vu`y(#A5HIpX~sg}z=IJ#>iPq1kvClEApkspx+nV50Fh zh}BL(jx-*?C0a<6VM_5W)|GFi|^Azj|9 zmbWf2$1}_b((_-Va-BtS!dN>j|8K^kRT7dfRY{4Dj&&Mg8mCFd1tY7V4!jI7wKKG> zaBVQ#gZo!F3o4M{C-zGuQ#@ge8`i+njFRZ9zuJhoY(PRj_y`Cn;7ur~M;{OgsUm-$ z;$PO};Mc}$&J?74KCg0y^xR+(5@ODxc7wTAOd zyDwwPI~@b<%KsRQYw;h0$*25}kMe1-|FnIVCLz;zhwJQqlrN19TH*(SFbYY8HzY)2 z9QQQyYSjW-TX_Y9o^fVWRBXxNH=G<5Py3?xq9jF_ZffluKB+|T`&E*i5AliJ1l|gS_Do;0Hd-&4~6UU&eqgSm7SZadGw^|EOE!}F>>FL(fzRtC$ z>CNV16KmoFc4>38eVA^W-EDt37TTIFiy!WTZuS2}kKD)o>|y_9B&6MqzdiE*J-2%Q zt2cB%#eaX4&mYVFgQfO9rXK)kwE86I-^<{G-rwKmE5Ph9`@-2J7%it?=Jio}Zm%*J z@NdpgpUgM}u-go{a)TX4RvlUwv#O!XZRXMrdk3JIa$5c{_9xSlh&G0KhhWYp?CCUq zwH2O5+20Cm5A_<}S716S)p9V~DZvKXt>N#h`o2#eHicKLq$lslrslTj?30r9pZ00g z|JIyF?D%I@v68-L`KMj_-*`Nz)&CoQs{izHK9K+aKv$a;EE>7Wal6G~BsiEF|$3a|D3AjM6>X^ic2X@4xRA^^u-K zjlAAhXV*RP?>~F0LXu63wDi!2D>TTQWElxB))|c#H}Vz?8ZRyvagzW1;w=f*kVbxh zP+ukJkvJgwWOjvluzc}0&4?_sZ=TrdYcrivnP%}xQlUyG*(th=jh`i%r?u)WsxqQ{ zT!xh2ci(t%XD!?0kCZElTW0S)CN7^dvDtg5CwI#SnZaK9Zcg$G(ur%(r z-ts(8d5?KAP{!vZOblY za%L@YSK98*sx-W66b}u1-g8kcV>!=uUZs3v4BBC}X|8hPG zW?L2mTiEj#irbey7b5Vn=%as2^u-o#0 z=nJA+%CV>0jU}n}`|QR-?0vl5*j~W)n|IyQ?YY_|;d^bk_up;}o2}zk+k2x`x~y-q zmRoF}4Yp-VJ=t#hII4#1=?OFqLl!=rqG4?5U3$jHw*R)-{}7w`p0@vId({6MdzJWa zZ#)_gKH2{to*{JdpR1m+Zk zN2MnKwAFGDgIA0iS~CG%{K%9H-7=86iMpwD$DkCgb28z{1(jv#jH=vfQi{_f`7Q~~ zDoxPDyeUVq*(GNGAe$Ui@ov4>a;LSHhQ-@3g$0}~Q)o2$kTa;3|AoB290LE*HCa%` zvyD1FL?D>a^N^$&2{0$&DOxjv%9A87g)r~Ir7`0Khlg9%L0UAgY^z*`T6dOrWPdg| zEcTslB){*o2}@W#;Rq6;9bmX}T)9$kaaPT?3{!1vpM0=P<$m`7HQ@7m3;!MRUuo$d zTK>Buzk2_}cr^MH|M5{iE#&_{aw7sUj^j`m-ExUom%ds-y18+0gEfGnk#i`!iYLHB zlNg00jgpNlw5=tbX--0*3VR63Eq38qvPZY0n!|i)!~FN2+5JA-_CMoE203l-$pCig z|NgM1|4+uB>VJQfPka5}l;1aUg&??|zDXAAB?K3$6av_&oYiawn1$#HV*qWHvz5N` zi&Flg9srW^wlK32p!qOYCzCZ#*XCt2c~n%beeQ60PJThXey`l5Tr5<>{Sx*5r}sa- zUW11Lpxm6Fy?oLC=hrtCXsA+bPeUt0I_TTJdZ7>F0L3bi(&Nf89*5Q58$sI$E;%ps zW&5%lWR8mNT3-NEhgR)z_Ztm;=4Q&<^Cix>O1k}!qgC%)QD3{suBlb?Kb_0kNcGE|55h78sts+Gonnh~{B`EI%pDKAc8jDW1^2*#Ykr*B3o{dq+3@ABCu z|9KicsGDEkO9R-Y|Bu~CHU7uzPvY2ZkD^;u884Hu#Ie5+Rf}A#K z1I2=p#&Dq!z|YO90Q|JKv0d+?!Vm>{rOPiRF_n`To<{nKK5{{gHD=4NJa_c@j;zIS z*!=b%D1dU?{(r<-Oyk9SdjNLqf6w)Y)&1}JlTZ8qV|-fd{~zRXKzNp{xpG}+Nfdz# z8!xtP{Cp*;_P2Pk#r=PsBz)T*Z-izl>2O3`^#H#^8Cj6GU(+~5y?*vT{}cZ2zr15h zJQ$5nW%=wM&aPiwzWU}AT^CfLkZ|dxe*WvP$aFocIxw=}%i$49LA4QmE7nM59e+0LNw}7Gagz9fW=XsvF?SCBH;v~BT5_JU)8peX z379jZJjN^P1j*_+zbls=FO$bUPmb5XvpJ5#zUrkfdg&W2P3QX`gDHLbe6)|^|IU&` zD++-gPv6IG|8Ld*GZ=q5|NS_hXXpxZPO=!ht8xXP$0do;Y)zw3aHSLn_i%!7@C-qw zpt|{+A+{t@goJG;V}5A7I6@hTFsBa$ipm?m<2XEchGL@b@OqwRWKQ3bP!_iOUxyBY zo5GS9-V`XIlw>HPF>wx@i<_Tsc#@HWXXqT3EP8W(gF>3I17|_`G5jmhKX7LM&W_<< z{lju`EdJ47*+YC>0Gi?8ew~8sV+UV2>@hv~!kOXwgD)Ju5`QNdT^xMz{~tUZx~_|zEs*)f9iP7p!fH`9pk?r zJbU&G{b>IF({rthEGS>DXP|}fY)v5PmmT9YWe{?QGjeRa=sAvK!Z}3G2kv0dcm2LQ zIXn;@3CzT9J@`VU6{Ap|7R&tP2*pXHu z(Cc-j*DcfQne>h|yocQYX<;C&q%L_1Dfkm@T97vY=jd=FW<%J~Q zpSC04pW4ZHE#$l1$akyL?QSK1wqB)hewPZ_p=P}gahi-ERemQQCbq;G2@y@zF!(Kp z!M6>AYZ(T&+c2Cs-o)|Ead6Ay;OFB&--==Q>iWgmKQ3Q=gCuW8-z5(Ov1CPrMbLl1 z8AHjMGa3?<%*AhrsoVQuAiVvs%m>1An+HPT-7pgJLFb_u6hk2)Z5xX@eT#1YiDpFT zBah0Ul2&0T3?>N(7EMN0VxTBzD9__XSh=GuW7Whf z<%7;+mx|Aj09XP3dtVe zexoYu0J_J+c65)2Tj*}$5b{Asy2rJ-c1^m6HC`Dd!F?mKVlM<45eq>)mb{e4l;@Ve z8jt;^s2C5=Iv!)&Iv96e2jj{*7?;<+%A|AfNCGU-9OWPw<}<>dSJ$sgM$ zf82TUN6xT9Y-#ennw}7b2(Nh((fD3aouq>M3o|ZWWP~wE^I$)|lhZsHSZN+P!)BUC z&VB>iM6+L_dE^WYn!RBs=5{h|#n46jEi_w%->9?j8&!ng$Pj*mzUOwMdD2S%745gs zY!PCk&O&TdVQiz45Occ;v6FEtrB}4yLbHW=jXE>0QH6PpO3bU9o#UO1TWPqW{o&!h zutzQT&1l=cvGB)HXZ|>JMwRh2`D0;7v>VT1%QZBFHB@KBF-TX6BShnb)A>f(FLGep z37(UYUGNN@QS-nKo&9F7X<*BOXXuQ~f%Ur$tlyF$`F4ghvchYqnC+M52*N8HN8KVnfq``=IEw`FyXV*iUh#GblQNxOe z8X6+XGj#7(yI^wCZWl~Ww(SCoh#GblQNxOe8X6+X>kq1SxU#d*iZYJx;l_B#Siw;Q z2FE&GWH=c#l zJF{fJ!jgT1C3}Y9({3@gG=3*rj9=fzlKsvs*{`rOU?O8I=JZfj)PDXYE*SE1@ zzcU;5D{R;=v0-o8jpkuXnuptHwlG@1Go$q@jMgtP+O9MY+6kA*z|i9)cLOyJ&5828 zGr~EI7p%Axd!A(aSF}#i>zl7oNFHcF?2N&}vHi{*+plnJzr?YGkR-O9Yh1Jk3yQo2$C`PClaPO+BLM5R zT!5}!yBXLv-JtWP8&o#kpuFj7V<l8tai$2a4`SHIZy5+)g?F(mM+bo05 zn`KbhEQ9i98B`cRm;~z;iMdR1NivQjp~cMUVuj_A6x?}6IZAQH2!wo!H747@fQ-F% z?zXXKcef2}J895)Cwa92ahnIk*h#my|9ymRZZ9rh!4Os$IbY}?znMn%B!yEzTU!Q;n^Tav0B-G$?J@jIgZ7Md**q;u@X)EP`FG%E=r#7BQHZ4#VXKnfKB zAEAuI$%7aNfX?YGB1ftij7}z(BQa>n*alX{CeUsi3GtxwNR(u$fMkwDHv?qswG?2U zRe%WuZ8Ucj+EZsRs?a<(Y3{ho-Inw0PWC>@8MQnC9obJn1@X4=?5Ge-ox!j&o+EQS zyD0>tmP*jbt^^4LZ8UdO2&T@!uh2X+Xzu9s7>(Plq0x97uV_{P#DmT>4=ObKCe0@e z4j3J^5zgd|AcA?y+an~s?G9B&W9y-cK+Z;QM{Qv047>`xgGPGyo#VQGB!?omyGAX; zcSiQ`9f7=UJUVI$Q)l2-#=|qmqnoBM@>|mEZ=<gJ5w!zhn7)>xe&lXp)1FPG^E#_^UPYzzOqI^9 zvT2@eRN^8=j6hX8f%(;58^kkAV=F;6ea-8vuXz=H%^NooWS=}SYr~Uv zn{IfrZPVG5s692`CL$|JlxHeY_VA(#k&||A>*2)ewiX!Ki0q^_mjAoSU+zd(Y!51haJfn*R$#ejIChNOcr(oR9 z#vhKyro~eM)-rHw2!UHxVD0qE;n3d#tfc`z989(WYl+#QgqfPF690x(7?PAh>Z4e8 zi)E0>)3W5zv95WWdgygh5A)4kF%djdMQqqZPq?z4WK?Vl;>-BZI&}_1ptTk9fmWge4Z5G+q&v%%)O!k~s=U z#`{c_iB4iYC~_#;9Xb!~IUZBXN!YaOLDh7~Dyg#8Dq04O1gZ&9482-#4=o5JSjHjA zNND8WN$T5a+Wt02tX1jgN`1v6<(br5oio+xZ5Qp}+mk1!mZPd^*ORJ~>h!ve1nP6D z%T*c?h&8vkrmKryg)QYjARcqFs@~=P|!SiCtWA6lInX>p1gVjV2*vTW;|IH=ZLaMwGb1E z66UDsYsr`ow@`t6+bTgmyIY@a?IiVn-xj7OKjSl{6kEpZ%1YC@GrfiY;AHRjv1 z#%vkDofCk^<>;V^WdY>u$+XAo2hio%HK{uwv$S$D`xgl~Q^V47XWIiU#uj~Q+*O|% zm-VS}S)Zyd4H_%0Db13Zu<0Vaff3+zMUu5Vkbfljo@9t^7$+-B{O;JI42`=gL*ueC zG%hJa_T!<7^cl63J|nC28C$fcaaZkWT-Kh(CGE+xX6RK29JW(u{h?Kz9b2@gaaZlB zlAu2>X;0ps-U`2EYMgIRjkD$4cTTylWZaKST-dW0USNdlvs-z5^N>XA6$v6tS9x_& zS=Qwt_*}7^mihR;Js;nej^8;Oe^fTY$0bf|jDx{$wY{Q`w<5f;nJpuWNj>UnQjf|e z^{8Z0H>A;n*B7l*1U0~&4PMD`JHMqV>4Pb0TjwoJbYGh2Ii|cO;+n^@`TS_qHAZ(- z7Q!QEY>s7PjI=zKKTA_dcgs`&-<}FEvWU`AS5aCiGBGNNQhQixWn$fytHj;1N(R$* z+;A|h`EF%ogsd$O&J)>IW}~W{J{m7HrZSjVH5FS)ip~`& zDg`MQ zLGN4|bEwm-{3hh;&AFU@@on?%Re4~{fsp0=X&VfySC9ugi1Dm|QyQjZ! zFmC4%9gM9GQQsEsB2P>r_dIYKv<%H0*h4dYTa1(6ImXGa#5nn8jFU;E z4pA%285D;JhoeXjcDGPA!k8tgbdee)3wh z*et&io8_CaS=)xXvZef%>&f4?o|?5>|9xY#+zO#XlTf#^t>hKB(sL`MW$7v_(AH&O zp`rbP^e{pRlNibCs9=OzrrQqe>9&43sH-$W9hGR`@dlOA@r}`Gi21*gCB^$Mf{3P! zpcH2u4UP~FaSCS>P}Wh{?&3?JOE<$29&FaSUnu$@mnGk6CwSsz6N%>YIN@%Nc)>JtszJy~Gh8FaJ#PTS~Yk7>~*^g0t zTNIVwF^WpOIjszjYYxw(GS~mlnsJn7$pZ}uQuoV9;)CTX3DF!=d7OsVJV{BmqKtv` zhmjbyvuM1L)uQn&0bG99050FDD6ms=80!9NVc9+4Oz;%7ETl!lGlEwUjR^{8Xq`n2 z;e|D%+qXnS`CTKTD#7@^5fP=RXhy@PMRryqD>~$)aWL~Or(FhyG+SqpO7YO?o?gqu zSI?gK>RUXaepgRurJR=UmB)Ql&f`HauLLUFUYT>)eW6 z=NfjMJCy;x7F3$|i`&_#aVtiRYZx^l}~ z{m^LEgF4q{s+4AO3q44nVY4P|^^rQ3N6Odfu#AhpA1*dN(w&Wz(HQK9Mzf^pTw177 zS;#FU&2}_wtn7VKu)OLjad+b~5hypUR{5X{Hj|3nlaLHlir^ld$cFC;f~ftfvw{)M zAh}cKXeW;`q;49q`_pMF`)oS3m}e84*qwA1yOWC8om9oH{j!jfi8gI_{yeoEKTmAp ze9~E*Pb%VkQWfW(B|YPjW@NF(SqS%l!QEgB!qxphjUgklD;xHmwlBQtR!MOgbwyld@7XsVX%! zip2X7;RNn`hSbJ&yk;cKsRRFgzT-#?msOQo%#%!vhmFD}Wogn?S(=m;lu1QTs*$H? zN+L^axq0K7Btx}3WN}INzB8%lI}MX24=NtgxEi@*!?#H>nsil+ zCS}EFQc;X7 zJc*Zs*)ASqD#J0Lx64(UB@Ync1b-0}#&TlC7I~1@_Cv@p+r%8drE2zCMf*){!G05q zsy*qdYKs>uibF|ns0X+JmxChk(t*8P&y4FV#6W-Z?fErY(JWI_J8G3YGaa2&PfHbR z4cBQz1F>{8Ckj*yA*A9}G&HmT1k2MN;-*KU8KcLrSg@^&?W0ksGgjuVXh#@ZO!IzD5s zlK47FU@i(CR1J6KIQsg$7g0&Z z1?_qI@cjwvW8PmTDqKPilOViZL651e%CW+-newh77V=fMM7m$LXIyK|PDLXpj2EFx zR7U(x+f^Q!+6s>-1g%tepYUmwXv>6`D+H`ll}U~xa4(eNxzsf&Py+@Be2t@MBNmCg z8Eo1v;cp80e!ut4`TrRoInT$}FU~H$d*Q6Y57CF~y6$*5g#TUFt^V(g27}MM;lT3- zqmkzhK6AZ+>kdCd?uS68`dKrMv(Mc3?yE}NpXBolU8*DoA*v1zzFx;NN-v_b3}+kA zGj6jrIal#*yBge3NPn+LgmE+@{E?7YYDE$}_>zR;q(m~$HV6kxN*)A?iv&jk zM|rLM#r1zXg0rD(dEJv>W$fVKAL|*(V!{bKMR$My(t~T6`|ceyy)bzD!NEIpP11x> zo@5*J4nZj0JM@NRLRUxc4&L>R&%4rp;xB-BnJ23O9WYD>2e)D{C_@;1OQIEesfI=7 zZXWz_cKzz|)iZqHu6d~ty; zF0Wsl-@g2B=>l{$HKlsAyray`6(^lSlGEvLp0J zRBo$mi=#;Ke})*xafq`}_9}aF&}A&yetr*^fIwGZEtywym2UQj3>?83*-a!I@Z$nYeO`(-#LMGXV+V}xFCPnX* zBUJ$T^*4Y3cbIMvjyH|AC__tsrDAZq^Tkb3^B2oa3tRECoywGQ@Dl? z;7doxIwK)k$05n&0s@4JPMshLCEw1f{hQ9r5*AwZ$ng-P0VS^mu)cyOkphQD5D>=D zoJK^fWWEQ2UniM#GSYaS9OYt{qaVfU43j_!TOs3;fH{UC4bm%FXMJGYN`xt!O<~?w z19tq(K=`nER2;b2?;VOLg9Y?suiwXOzU&?K;v^=$pY)0}22%6}dxXXW;cNlhlR0A1 zG8&TNrp$hS%}CY{F~|LoW-wSqGAu_?BCCzbtti2l23Z4=K0#(7LAnM*^bXCEL`>%0 z97l`@%wH(4;X01%Q&=o*8mo){LTeWfP5TT|_cw^d4>U_+;8G7bqoPly?guQogFR;j z|58psJ`XVPLj5QJs;h}fC_z2aC=%;T8q+*cPQiSdl=sabQ!8DXrOLrqy1MbE^u5C6 zMUlP-QM24;0v43p_V@Rx`3f%M>KLP{|ZBIyFVMfNo26*y8pTy$LunO8iKP*X%W(i*!6NlxUvPUq^ znL;FX9-f#)c=m%2#dOsO0j7ZiGT__L3L!Yv0LZ zlHJpIaY3{4ARqTk;VNLNmI#;|L@%g4nWQ8pp~@pN85#%8>T-_agv*>Nxhim)%9pi< zqxSPES;suZOTA0MfHF9Nj2-w+v@)rQ31`bBscp&*LN5nZNIae;Yq7B5XLZePUU-G_ zC2ZfTB-~RPHsIZgr{@^%V(13+ZtOhosmjYu$WO${^S)a0@%+6#xpXvwS66aWnw6DCU~Sf%0e}0NGoW`{b9qnI zHD^M8qBWQI)pE_{@3mZW4lIf)-eRq#m@k=JAPY#p6x~Q>X909i8$_Z2_4@jy0Q3@C z6t6y{@!m_mVwmI${>{~^T$cQy6#qOdu>X+8hZV9NiQv~XBIOm?Q#+t{Dx~RAPaiq= zPJ71>X?(2T?G=xNG2A=t30PnI}lP_J~bsq{-nNY6-;84=OY>3mLO$~O(W;DXF)EUYu#BuHWg z*OhUUt-+b|Sc;a_C7WzrTm=v(T}RPX649Vy8(+>}CHzX7 zdbKe>lU>LiAt0bsfv7;w%u_D|`eGSmVuZ|77I*+0ASB~pI3Ktk9?hl`cQ~5(gP|Yb6EgG0;p`*`XOmz% zHqg7ks7c5C{()qf5MyAxi5A+<)COF!D*(uvCoI5`q$Ho%zv(6Xcfsny5MlIflF@&Q zcOzj!p)>WOf>W5OTNjDx2C^@d3b1aA#WZi5S4_2=7OTbpzDLJRoz>US&~b|;GzmsH zoOrJ9jz+<3GW2KO+#e4o^I$fZ4MyH19FzHYG8tgc3#Y-z9}a!&j>f@&;1ky!?17bD zN7@qEx|CF-=j?FDf-2(tEKA^AYoSG5e8b}c3ayZ#j#zevvtPGVx~!C}vrVD%8b=2A zWRoA?D`E7x1o64T$tmNi)F-Ei9B(?lI5VCK`!O`Uo4Ue(BiImg+yJk53mQOJZOkj@ z7An9rv|zl`He{#>ZD;!+t1fD&qx(`m*g-kZk|-kCj-eD{8ktR$wp)}iJ=PVO7~#hu zCaWZ7gm3AkQA-0e)+h`5{yo|~d@2%Hjf!qxecw8~0@dP@j4r6jxAz%`_vt8%!D(O86}adXARk=g68;UO@5t6@ zDVw86wy(fUAU@?aggQDY&N!8_#Ne+njr2emM51f+Rb;%ntp~Qw7Q_a<7|jas6@H7< zo7;e|WBh<=1Z$~F7p3>h9SJRxlf}jcx4d-GI$dNqBq)FF>m)-LdEe|v=-xEc#)!~- zul4m{&y{pI1lL*#OX+R6QIl{(8UcMDUyz7!Qh&Vw?Vt--q5=e>ix_OxC1tfe*Pzzt zRP-#wTXlP*$a1kmlB~3`VJ2%Xj7n`We)IZLZ0m9qgg{5eyOx>5k3W^iHYB=PxEP3wnIxk!#KLZsIuDaW zt!A=!`lEc8QsD&VnUj`Ml`kLUi%!MxXz(qg;8_;c>Du ztLz4?@CIdsCD8*xF^iJqex2&`h$NN?DTe!m5x!2<>J4Mopz*4`dZ8mic!GN8(VB6R zeN8jQdx*}#pYtj|{6L@&z&0v1{ekl3x3Xo^TSBNwOr%&-hWtw!-!r?iajX;#nbIwb ziYa%7-H}|}2i3}~Rd4mxIS-8&$I1cG$Ei$N5>wq*4UeBmf4{JU`I6|L4;76~?x^oD zjhpdy&}~gUyMe?r%_~mP*&(|9=P7!9dyc+3L|11wH$PmQqR)T*6*<@HVgQK8{Oz~T z(RtATJ|uqlI!jjS8$ynw=K_AOiFf_*HjNtS&`%*?NWI_O<}D{#jHAn#lWdLyQnxQ( zGom7*sLB||oI_|1956s6h1~a4195Z|r`X$%I3uSBLZN1xRF)#YKVkVI(0F9{tjW9u zQ&c>l1>@1GXmN-lnC5Jw4HO4m<VclA%6Y;WQO!U0#XS8DZ*G@f>*U`|n*GhJDq2pC{m&B0T5=2K`6Mm+)sF zOT3Q{b4oSSY8dAqigXXNWl@e|ldNT3?VQ{41l?KKMV+qN9_y-pE-Fe zI1%N=YdUmDz@po{8wzH#>w<1`Sd`v0+vG1+oe!lqv|j+e-RS%KO6n6l0?kQ!d-7IT zj(}LC1hWlFX>hO2^Espi>+@e>t{)+~N|TJ^m|J$Hj>y>QOAxQB#$=~Ep=j9Eo3O$( z{#?UxOjI55XovNiA2l^wrjKw4B$S7lm_La951Tq!^F#>brlo(j=1C-;83QA^vyMN3 zi?5Q5AIYd7@Xfz}JsguRtVAwg{^{6pD46 za3qAG&bs;gm&kLxVc*@SBOO;}lQ>#)kSkwrZD^gBVNl$VGI_4tqE|?q-Md$4y?3wb zOHtx`i?U_5mGNvkfIjaeXHqIxikXHLBuP!{I9Ppg4Gdbf-Iq77n%Rt2Vl~u1F_Wp0 zyi1cUohL|LXgwD??2Z|&btIENHVty-JE7UZ+fqfA?X*CUhtM>Zx3ID!u{Fhiga?k} z96IO{lB6IulCRbnb zA^1v2Xc;~GO5emUb#uYHR2dtci>LWosq3wdAG6Ia)v2YYrYwvp-#b5~(s)N=NU60w zBjk2Tst`cEQxUG5WGfoW1)5|b$#&Y8VoZIQELM@uMer#NOQa`sLBPdVau9S->DEK%B4X8kd-tyN>K47xjtPUxueh@`Ys74ffo+_ISIX! za29&rWHOtKNiZAF1Aj91JbxApz0ei66$!N3-A#Fk``#vAa9Y$Qac@rn9 z0dVNe^pA^hFPD0bzuWsH~Nl4UX{#4da(jiGt9*Y!1q=dvox_ML-)z(eEM{t`7 zrdv#j4(AFYT6i+5+r89Hi`}l?>r3GK^azl3c-7f#PzwHpx26Z`4r<$JzgCx1HtN#|2h>RWnqdw)92+?9e(E z+v9D7byJSHxq5S+H){sjfsvcD2`Zrtw8~>Uk1$;|SvZ$-@F+jxSd|5V3TZLYFCw^m z{-`j3l=nV=F32l+BMh2To^x2x17lx6mExnLmMt65q3UJI{CRu|oRZXD@i6tu{ zFQ_9CBN7$Icg0GJr*Ojp7p`^M?8H(w^v6feF%;aS*3h)L9-*}YdI>y8;^=Q zmqOml{h7%Io#7EN)A+AnyognZGVN+y4`6= z(PA9cn9D3J&GvR<@S&M2ESkQWM} z>QA(Xf$gF&Yc0917(nZl5?rE#0Q10)8FLY^>wlXbM!L4Qsq72Vbz5?Z# zR{2bkr+tH77-W!KvzxM9Qrgz%Yg$8;@y;K(WSZ(@Hxczvw z>E};>`>CRst8OLS?KWQpmHz;n+evQ4j8Zy51a zI%nwl_1Sm*83rB+2TL2q$?DMbo59>E=cop`#2ksY)KPU3Huzl?o{avR=rqixBMkxI z?uP!GNF2WcT%;My?$DfIxNBq~rT}VqsL~gkWDRE-Ob7KKa4SPP7yv?wDm9{Y{5V>qXN-#f|p2{VJ!Bs|+$iK3w_gszrYe!pXl2?N;6{mVbp-fCaj z!2oe%ucCGLYj4iJ5sG&2bTmFW(%;UZy0r|F>Yet!hkMq(qiltFuxXKC0IF4*p0YTOL&D@|m^jp1GKea7@Zi^UEB|XZS z%yM7>u2Jj;;4!|)2>Yd0vs81vtD?o$K-vP*M~tN{I^7y*XHdB%)~*7qTezLkRdc9a zwU-vrcEzi^yKU;KUcbp3Is?be3ph=}@!0bRzI!q`2~YeHIXO8AXX9DuPRY=l487rr z=Xqg>XBbc2@n|?3dXuR;p3X*OHu833l}FiSG=ZJHEtTe6o?hv;D9D2-io{GVWHKbW ztD=@FTvJ7e%d838ve@GojAM2W(pm0&2>HwfyYYKOA4p6X>kEsJ!e3CIdY$$q4*J{- zzBszM4YQZ}IkazDt7SNjKHYCHWr4j=Y2r(-B2_V8lr2GZQ8TvDcZzDLSI~J=cROo_ z%NYI=5lwKaId8q=p40;{`u6trO1-Hgj&v0jSOenuvH0gEPsBeolDG6bO}(=9(2AuX=U5(r`ICqE3c2k`Ud=xjBXU6nE-QE(v{^L?P3#bUwaf*A=Ku zbX0>&dbj6SV*FShS^~od&7gdGoN(p6%}?rUbCWM%+X!8g5Yv4YXAbFUS7#2kwmgdt z_gbF?rS?JixGS{i_KBBhdCZ<{jaI=nlJY@Tsba3SA-YkIcdSqaIo@`B)fi@8Fz(#azM;L}j(RE@-)QNT+l}1sXz#a@=S26ZL-`px zmPI$2C3{$+nwyF?1GHWnDHi~RnVFZc(nra)Vb1H1@dTwwx{f5jQSI|O2TDkS43s@O z=qpuzO!`yeDhfYVB-4gi5Q50p_=(FVtxSrTq!=Xw^6 zV|`VdeoiALLv=mJ%B)_!zPwP5v)A99-Tb3>Iw;M|l}ht}%}9nWFVJ)G!XYB@L;nG1 zNEdL4Hla+T2s8j%Hg!2%q?GFQH|qn=q~QY@c(vC5-fs^1Uu*Yr8?b&~L} zbEmhycLV%`uM+Sh%HP`f0vnRnb?K44%0uNP=61N8^LFo797-2aF%kW+#i2@_?9zV6-WCry(P~>zPx%E9*KX))=oA}irNj-Lb%~L zxUXp`G*xPu(T~yo2wg$W$;BE+>IYRJCjX_5%hT3{DS>|CbTR9k$qRw@+7~xw{T>?6 zlWZkLUTtScpk24clJj)iwgBi|7q2W;v;}0GgyhOn&!`j-qua@lEX^xkCOG^GM>q~h z1_I%gZl|X}CEdSo9mKp`selI=@q&oMt+d(dG~McfiDhZ-tuR^^)d9FWD(YAZ>L?^^ z1$E>~v{uuxlaTNv0OSqkA&hfb`%6I8Z5(~eyr}}*iMDq~^8Xw0$L;ym9ZdJ#>x-*9 z2T4m`{Ge?96hFoYqucYVQenLX;l)mcN~mK0yuN-3Phnphhf3Rs;y7CnzH8+cW&Moy z73Yd{^p{vY48S}~R#Ja1%I3loa3kCm0Pi5lP~UW;Zcd#9-$oGQNeQ! zG|serx78!jU<{Vu?|k(~zU%FvRjqVuXrxe_9+yPSxmll60W7pBZP_+-VY#5|wie-8 zhApj6N8kI(AQmFj#objI@FRpJ5Xv;uBB65PakKVtUQp3Mu;m`ys-pu~9zqCwZ745v z^{!$pji4cUadQ%)Y#qz0mI_kob`=Q$rrB9!I3QOfqYyfg#G!fJg?pEucy1H)dA76h zu#Z!EEQEcO;IN-t_{V7y_8+|CXL+%%!=Gw6tq5ayL2MDr9~hy&w*@6@{o;>?R1zt1 z+Hmoz*6*-PiYQvXZ}B342$!Z6P}S))Ptqhx7Mq(?7{%v#!K6BR`ocHc8(nUF(_;ri zCdW;K?=yhkFKRgH19i?D1Grmnt=rrGE^jP#lgJ0Jl1Ff`L?oneA;(%?7oxMn1tXEz z$hb8qS#X7VZmD@txme`Xy!qqKxEq7UA$_3X8b`uZxz|;(p;{s1IKNgszZh`q zvBwWIBj3RFfm_Z!%AmR(d=woupL|sMXmRwBzqzx|hJG62Z5-DbxC76fdc(ZF)dZ8_ z{KWN6{FBiM3CI3qIvdYV=9BUKgv^I?Z#J9^XM@3DcH)jE#GQIG?9PT{G#?M9)9Fsk z$0CuH_9QA?ky;z0KC-9Oy+?St2I#;ImJk79V+a@Uiw^I;-&M`*2;? z9S?`_zw5fy|J~ul{mdHdG6pd*BeZ{$!ExYdQ|G4HRCw@%zf{^s>JH YpFW>H@B8^b0RRC1{|VH?N&xl)0O2yo`~Uy| literal 0 HcmV?d00001 diff --git a/stable/friendica/2.0.0/charts/mariadb-2.0.2.tgz b/stable/friendica/2.0.0/charts/mariadb-2.0.2.tgz new file mode 100644 index 0000000000000000000000000000000000000000..38bb8114a4010bd5f52031d40e92a490f5ddffb2 GIT binary patch literal 73711 zcmb5VWmM%*&o+z?t^*7XgS)#kgS)%CyX)ZY&fpx}-QC?exVyV^zPa!BdFAid)vlG* z?xf9?y^|(siK1Y?gZ*a%QG?MMN+>ZIOUQD_cyhBFv8pkdD6?B?DRXnktEq9ws@qr@ z+L?H&DBAN&nA+HaU3|W~t#i#YA`1GS)3he>d-L$iqJz!&@v!a#<@N?62y&fH%)1dK z0?|jlmr+RY=15*YZVr2UU#E0N?FfGtl_DeOrL?L#jUZRaho}1PM}=<{`3rl!xRtZd zkZfbG>{(wM1O^sBGjRa|2U`M#)x&%tjKhlH5W|&%pox`KPJ6g&eHBv$nPVJY^bPjg z%g235i7wuSgGo7WPN&273z#U>jNnyZ`|CWKTfAL*7d$u+`Ypn|<3BzO+R{Tv`H)4@ zW(ltD!}qyjk8SV`F_i0dyzq^(E*!8)`J5RgB{qAvcdO@MXUv9jQDMvTVr*DQyJdZ7 z4f*%DiR8zS&7l`8cjCAh$QlCL6;ZdY9FnLq=Li&aDs2WGSGeVW1wi1g25aT>Mgi63 znPdERMfTc&52K9uO|@xX2=5%?OkIZs0a4VufjGCGxP$qkiFcJlwd%`>Tl3*EA#-FB zCX+)r9dl$H(6s5PWEi(LVnbA9zyBKHCMXmsDpjS&3@2EV&mZ#1aNgZ6n#wQ%$OKkoWMlo4L~+%lm$Im9mC*ON9(G>R{?B57*uA!cs0tvNDCfs( zOhD)`OLOd++~Cv1lR91bPRP<6{dTQ|msZ`s^JEDwrtKRyD1qYl1TOjk12jHz^1 zhN{v+w5Ig|XlDJ7tEh-ywFc4@9bz$AW_)_2jO{z=YjQdpob(|pvP|BIo0uCHUzTU} z(3_V^IvRRFfSA75hTVC?38<^Lea(-+`a>{2ulWFk$@Btxf7u8La~%m5(ghrCB2ExqOA+l-DBMmrx$FM^0Oa1w)6c3C?f-ojRUIZV_ zJIp%(OoT7qBQN`x<+lO?Fen^wXvz8_e~+6@#0l^BgMARLH*>x_B-l!{ziLXwi#&t` z&M?T=XM>tBDSKRkNWN0RA&A9jtVBIFYbeJZ-J{yIV}O9CCg_BWEcrzd;^D?4tV6DD zeY;_|Mxx#rH_{fjT?${56>%NBIA5~9S~`}-P_s^DNs$}_Qg#5VUKJ6{$z(mC+48I~ z0rN%ihX)}X1~-ut-%NHwcoao&7HE*1wYk@?XE4Xw89c}%d4OcshUGqRo%*&=p9?R^ zaz`26QFwF?R(vpmUn>2@W?ugzR`r=DCzI>|BCG+<^_P)zLvOKVAvxHeD+h-Vi`!^n zy;!jbJiP7t0{Ni$b;g5&9)}f~3m1HrGWiHhbbPcc$}BFfrvh=rlpL6x{1 z{ooZ%iYJ^hQ@4w2jJV$>8AE@4$8B=i75YP+NBmIH88TbhUg^{P%@c&@kq>*^f$(`2 z(VqM2XW4u5Iv4xa7c7%grBePSwri{J<;QZuHcz=Trup#ED9q{wBt*&l<{6)mwP)+>i-j-5 zDY-H)98lm5a@r!l6{1=9B{4CrIyh`N;ujlae%`FxlQ@3e#^pNcBvkT=7o$GPnOr}Hw8&;czvIF(NyBcB#I$)@}EKEZ-Vd7 z7(}oWv;0#q5XYjnQ7Lv+B*Tv#J7G$du?23;bcEaq-HbG)=|s#RtCj?KqCflCJsna>;cx5;U#OpEeQ@Uw3!i8R-IlqT99Q?bFK66x`S|rmusm>)l`ZbxN zV?b|GiLC5NbsLU}mi2Dl*6#n67@51w49Aysgs+>6R6UrGx^D8vUHRTg=FX=wUjE+S z8L`@EJIBAzk&iO7nlUq74y*exqUnZH8`;SF>}^tVFnNEU3HE1fF8|9m$g|1YtF;4k zuzz}c`#O@e+0f83Qu6N4_hYInC}vY{S?PyWSKD{N?TD`L8`r%CSf2K)MrRrR7!*m* zYG(WQlXH_Ao863dz9ki=uQj>-)xZ(#2*rX<_-xh2G$pWMP9eHFjD=QZ*d+(og z5bB=-8Pl{M=)#22qm*f4)q(=js78$g{2olWXrMQi)7lb4CfUVl=qXc~tU#8?w1cN) zF3IeuPUL6eIK^p}D#BzaU5mLIskNdx>7SIcz5@5-F+PrN4($W{FEjq| zjx@T{pSR+gE1#S9o0J{q-Qi$ZfRjKBRxDoS*yCmn!q?E@+Ye>v_WUo-uO5c{6N=y^H%y`J?`k1{RmG|o*z$j5%Jv@OESu& z`^-TvGA-EQ&+&3aOwy0Ar}Qr(>E6fr;-@IoX`!Jp^!ifCPIV?z3&cbjb-~&cFi;p! zG2PSNFu!`{3YXAwqz@=P)*JS!vIdHPj`#J`QSCE_-}?T@H24VkYbkYtUo z7&w!##+A|A4{q1cvz#`5EOzB0Z$9Cmb^d zYK1~WX5t?$*3aGqkww-Sx7{tk#cwRL3jbz`wt){2^d;XZ2ZH>&-``gI=5ARHt?WBu zm-h9+SrjVv_0>Xe{TXw^HnyPNjrXAU^`~xX3g=GLCn?@XhVIe`JUnk!^hG~b<_5x0 z+P1O$(nqe<@m=c!PZ7h0UMa-jpoKMd9>U)(ySqRZ$%`oxY0<#B8J)jZD`X4bM>NdC zzN5FeP9YOI2!1}H3L7*gjsn;yRAj~lz1Xaj@Honlyep7stOnGqO2YoOK2QaZy#ASy zzwHT(KSeZYN}3i@Q$In>bb;w|357sq>ndQQqNS&&CP=h&kZpDGBK~4O4(>~S=ch={ z7ii|lz&1vW!0Z?%F~^t~uoPK-X~fTBB~=gLXd9guQW@rIAjLb*;18S8bJ+x2P=Rxi!10f|XsB7FHFeH0vQu&FjCNBUiK+s!_VV_ie>@k?n-<3o z&Rwp*H1k`m*iNgOgAkj%&M~`G3oAKKO57(Tn`gDP*@u_JK8l}4?5!|+%Dg1)XMGve z>)Ukfsa5hj%4_Dk(0a-~Z?m+9?8}#>o|k;L=KnoLO@EaYsh{%uK4(+p_9BZPq*a`N z{4tyEDezco{+NDU_4MRda*99^8eaKlUB1>(s1*(#1i-mtJTUQe%Z?@M9C^K^Vq;G4 zFy(12oPX&Hs9a?v-xSUNUe%Dt;QBB%FSWh#|DG3izo15NYJiD>Rl1BLUZM$9Ifg~Q zQ*wvO_(a`hmi0z+)#g66SQ?kK{hegx&sL^3R|GF@8}Q}awR%$F$ZSy69ARV`9^I z(Qc|gdrn9iR6mzD<<5u0rF^9;lo^SL(w=W_9!ssR$)AVEu$f{Ks^L23&l6$OsOprK zR=MbJ9@Fz0SGP1vU5jljqZ2Nl=?>XO)+2Rw7;?lIHit|>O8rD$Z_eswxj_?Glvrq3 z)Y)+c-gB)t{mfKdp>NEit`I?xB8^sl8{h)K?|*MwoSZ#bnRFU4OWmdE!ZZ9kPc%%e z`lCd`w5x-$jvSoBdKPv+`HM-ete*>jxNlJNDOH*ui;M<{5}hCg9(NM|3cx+Hc(DNN za{la19cXKQEr(U0CKUqu#>tE?uj5`=eAFHo!^S4IkCtc(!I|&kaOlp&=!kHy9Ovlb z7puCghf0svSZ#@Utj+r_vDfH?lt|&^^j|R{!7(j#k;*_;7-Vk1Dr#5v{#!>PDyu-1 z=gCGPUU%jdf~tSBs9^k)q+BPY)Cs4c|4IP~*6N=%4V14?I1Xum$rA<*=Chhh9hz0; zHH~Xxd8>D=l2u!({~*ww?KqV4%Wr9hw-}ER`Zu2KkY+Y{LI}fUTLVI~R`)XeYcb_S z-tM=*lm7#y`dqG#m_L7zhgA!!yyUB@7iWQBo8Vhg#fkj%to~k(H-0J;R8etzp&g-? zC@sGWsa^8>zF1o%o~g=m7m=Ncp*RRe{jEi;cg4w2vBDkmW~{c-y(b_8p687-uW1WP zfyZu^hL+RfP%N49S=>_z^KdM0qd42#`@&djws`D-T zZWW$AC{uE|cwDrcMWS6v)nLj~@-FM2FyiTA8;Ih|!L0kI(X0^|!NI(nzy9JFZD-#6 z*`J(={z?McC3mwV31kFVdWmlW5Yjd^on1F3)YYyIrDGhF&QK@;G=GyDm!_Kh!bdZ% zHg`e_ssgc)AvFvEzH3P}UdbvrS;=35T9pJ)l>Dd{icRP9 z?{)240rx!z0ZO&t5k<8vM$dP36`s(l6gTa+shGuZe!#z_S#BgR$-t>(zF`Yn$_+uu zULa8>7@1s7r9@LWdW1S}b)VWE68GIw^+Lt!cf6866tyZ^QLx(i)JOZdc3ngv@d5hq z#Vy{^(Q1RajS=w*S!WDIwV>T{2^vnbO|zD7`KSU7>A;bP?Cl2TNY0t|Ee8>+;?s*B zjJ-h%KPPncnsX9ve)b~KT0Tu<()et(H}ME+-mps=uL!RvdE>8`S>(qsw^I1a_&KR( z04Z8!4KD-Q_gbrNk(l^u(}QlcZJMHArV=YYM|N}0V_q$qlFRD0#RXzap>ILVD$vHI zh{IM_9?U(-tByO)92s*mD|WrgdY%dp?143@$8*-MRe_8})yqxY%G!DpRNt4>=p__z zZ0Wxg&~0BIkj_JW)<%g4j_!`J+HeSyd@}oT)SV_t93>=tqL{|-ySf%sDpJv|L}0|WT?)|!sQ5oNfQy{&)?=w>*nChX83( zA5n{YCVL&m#!hpk^O^EAebacQ=Q+@N0A9ut+6YX19dF=S~7 zj)qar>Z$6=Zq0fgkAp$R02BgO$sm(gr*(Z5aCjxWh-D~Zyw6#kXaG`0udGho>8B|h zDz6nJwoqwwOo4i@Ni=XxfjX`r8?y#iSwER5T9v%&v@q zEjB$UR$HbC{Ntp#JZ$O~v+blV!&Hm*r_qO}Q0<8Z;*XN%)3C;I!L77d3qQh`Mw2-> zUf;J16afQFAE8DqMUEz>_<)fy6?AC)uE(my!fMtAF}m41RKskTr8cyFEO@$~L&IMS z9YgfwzN#Dbj-eNV!fMCjg_S(zy&d?SQ_Asm7^&81I{OFpeNpt7ZI4=QD~Q#xD4Y_s zM0OV4`)i<4+s9!gO-YT@zn?Z)oW2a%B#Ct9;_a~sT3cTaX*o(CHu|3{w7gfE+tej@KPe{@imO&_4@o7*#*d|Y z`dxOYM{05jw}$p}ZMQ(7OV2%M_;;YqnPZX`^=aV&f)dO7`GjG=hX_pOR&)np zHj>k^NX68fA<98Hzq)y+Q=E1aIxK*@Icw(2%{>!Ejr$B&s?r;_-LTQV@%)GehL?eIG|R&frEeFSPXoldErj4vYWe}GFj-%~>6 zkdvtdvs?q%ZzjJTNL?LKAJ_Zvd0zF-<176gKJAq>Xm@v%Qgd%L%v^h1(e?m)r^KRa!zO9i5Q%7_;bApzoFf) z2|WHF#`)qJ^!r_Zn~v;zMFCr5(GN~(Fwx?90qy4|SIV~>JU1hli|sNdBWgF%X(SoKLKbZiRq|CLKqH{3j{V`xQbjT89DdJN=USWq2+FbFO$Ji zc|P3FL>TW)&lhhZ*uYfyRqZzMV7}?&m1ZX8Gb)(qpx3;qQ_NDo^1J=&pHGPuyZ<)j z-s(TSFbGP*+|-99@jH@>I;j7by|L$@U$LeEvUddH1nvPd#~~o;FZQ>Mc(2U&zyG3~ z<(cIbYsDwi<&96wl#M+b4~mm?`i#<&XG8U3VmfHX|)V2G0x3>@`!l*fNes2G-Cq8(L zf+8to=bk!6pmS%eM-I`Y7oq!EEG62Z931&BdtDn_m)_WCwuvWXcjE%1@7=55ZL&`) zl+QY`!Q%(Y9|!|>P)iZg3rJ4@CF;k?{UF4A5gUTD8-&*{&N_^14q5nqH=@1O$&RYl zB9jaF!s9-qHi})w4W!*#@u>QUW7AQ>1((F({Osk-Wikgu`;O!WNLn+`91P?uwz8U+ zavxsG35C-)8(^9eu%Q#L-{OI0)WPE~{qJ->wVeeIsd;vBo*+Jhz#?P~2`tXT2_dXv zGHF9@@^sUYK{VwO9aHL64sykx&Y3WOWfiDpsIWQho!NugDx_3>u7)4^Lj5Dz#nhlH zwkTE@VkLN3Rjkp)t~I~ZXWm1y4mJ(Z8K!<@?zOai+;_S2>gUphXB%V$|D}j+|BK6} zd33-Au#={Y*+>@nSHxzy%-x<&v=roQInZB(*KHP|5$e6Wm|+YEnmbl9awU=Pnf5)> z5j1?2f0=q+xqI51s67;|Lh@t41&f&x#L+rnA=uE{;WEju^-RYw+*5q zfG7WyPMt0C6(J)l9B(>ygl^6m$J@c4HhZKz`W}q1oB|tPOpjU4ErAWKnH|f9Ru#K4 zwAy#dBXFovYAPVQtd*ZxuSRw3k6A4-WOm2pn2^zgqAsW#O((TQ+i(F|G#`A=vIEgKGfZ%R$UE(M&mF1U^h2MB2uyttzKC|VRlokm@6A2a+Y!+r!_eL`ffyhiqvWc#`PAYH{k%018nv5S7 zxXtlZMqu%z>oAS7%DF4*1QrNQ_0h9S1pt{pDFt-9E=?ZfZ3ZF1hso86-wRzsm>PNo zCXg-vSK(6R$Nv;3Uz5R)pbQNXO`4HquvA|8W{#(PkNn>0$)*L5qG~IC_Q$)V6KJSJ zGj$ah<*;YpH1r-tkp=^<@A>w85}0ykoQm$t5cdibg+%l^CF=`6o-->iU44St-npMM zSc7_{*ND4JzS`vLze4_=G&PxyZCRJo9)>?-xt8t^p!adI^$kbtT~mnqXvP)PWVvvW zbGWTP824FL5NJB+o{f3>R<%1-pD5{1bKADDVux&N*{iLls*J(dBq5ux&RDmz?9W#l zoqWB_YnV z68~GyWy8?>rpHI_P3Tr~>?vo}H;kq?7h(;&+7*F;FN;Ol@Y6>R9BkW$u4aZZ4n%J@ zwr)pIvF|St8mSTkqK@Pk1YPal$Mee6z55TtSrz(6!%G8k9Pwv#DPj5v$0fy>pESB{ z)!f3oYt?nOxn!8`A)iR4FSEbW`uQJW}CA{Rb(@Y9M9n{{c&yCw8V zCHeKARNr8oo<<5xGR&#`vL@nrp1%R~FFY45!@Px#rUg~wSfxdZb43;L4y6U}-9yq5 zbYJL~SRD1B-Vu6CFht~3&b~7;)jf*?D328X0JbE0^e)2Nv18u^=R>g<;| zzE;UvcikGc+uB^}v1iUC=jtit03hx8f^hr=?C2Lt5C6(k7)JI_w2D z@^s&P=-M&3Y~C-7tg%m}`h^q8pF>GxO-GF(KN}FHl~)+GVLq=U=Q`_=ezKf5xI&Sa-NR~0=VwKx z$x@*x*Dx2Z)w&9A*zmqNlRPSa-vQ+9T6-zkpOnxHvkTark|o_*yVziIRYuAB zy0c~41l)(3TlqRt@I7I>vtb1Z5}2Fqh%gi0v-!wo)Eq^UtI)Wj4h2h4q#CY#{P^{#kGWjf9WI!+@wd1d8xjcZ$s zL0BJ5Li%jcxTm%V_eX}W2D%G3u8>LLYp?*(lLRNKvDo_# zE}nBw3VB6s#&|kms=E5CbE9Sv)00$h;CPW8vMMH_1>9L3s~&_lf(;lmi;jc(fh9c- ze=rhU)L%o>vBS=Vwx#&-8g*wq1yoqUXEcP!VL=uy|2&EE*CIQHHgFMV`>w>Z-?GXz z3aivIrZ_ik#f>&{dP$zmZl3v5<#GrR?VV~Dh_#-1+Me+F{be-@MS8g9Lvtnm)Eu)~ z^E(IL;lIuZyXngG@vHgNoyDtik3j)@MbV*r+Eb~vB)z{{WtCOAeal)oiB8>@))yVn z>c{Utm>$*|Yo_kpA z;0?uqOG=>hhPDSMsbklOyrA;R_AVlrP{;hs0&)pWWRc6+;H#c^m>r+_?~ON4j!(Km zR?ZI2#|4mABU8up@y5ko+p*TEnwT7J`! zXzw1rCNFk%_Wjv$bG=AXfLO)}VA&F&@;0XGO*k9Qm;$n7OfTk_z7W@rs$nob%M5XR znn;i?1c*9r9&LzV6TG3}gk9Wiz`>PClkSOcXnqeK>h3QnYat%ZVtr3+GF4nI*EO)W zO-P}0v~ITsjTMA@S~H5#1~Cnc{V`{Z{ui5Q8_!n(kHY)SqL)U7wm&*=G&LKm#hSFB zlQKeV+a`H~RBsSk&P(i_&C|pS;hx%(CithNuGK@J^c@X%JpbjBUn`rz!>cx~PHpPP z$m_o^)L1m^qJMYfDrJVAdQE$|*)|!E!%vHwm1XA|oM|nEI4rSd?^w(OS3Uo@c1?0@ z=)#~|9T8>5NTwCf;G%a(+q0nj<=Wi#^NxSG_-B!CaY>->{h#|pF=Fw_8T8hzsNaa2 z@#OKcb_{r;?4CE{y@$qaMV%6Fb;vyt?k}yIY@aPO_|GpMFf(8bWf!|*P4$|WweFi7 zqDE!?hK*%k%>1wpN>={N9IrRUNO-PuWcw}mm8wmQdzLU}n^+cUHu39z)!ttdRl&&> z_X>hQU*aF9oRc8$G!U4_ua{BKKBM3#%BS{W#SDn_>vFEJ=i^#1?u?fe66Ste#~&YE zDy@4)o|Zm8oG(2wmq!=IQ}l+6QEAnhfmrybcObM`O!1Nk!&U zooR8uA-SJ59>bxJUgg#DtX=NRTV2h|OzqB#noB!G6;axA5EPWhRYqsv(+WGLO>{et zw?fQ2`60TLc3L*1-3u5qzI*&A3NA`IeY4KBfdjB{$_IJ+pz-9!i z;sGK2309#}p8-Kg5>A7*M#7F?=Ysi5Q@EmhIq)~?db*wHu=Q^2N|U>zGe24ux%J^cO$$Wu3Q6OLG5X& z?`wC6_KNknLiXo{*F#Ouya&(F?xjA8z*Mb0Lf}nBy8qCnQv=hFFb}PsH9ciRh|zxF zG1Fl`ak$@DY>CX~E!p1im8;thZv_eO+MR=utLqll(VeS--mBg}3Ez#LPfD2%*T5B)Wh5TtqU=X@FrpkF=LQ#Lr&v`p zusAFMN;js|FTdfp9&PU;Msg?_GC$Nbp4h$0n&zZ~=4v?KY(1X(=6fKe!?;gYdD{#^ zrwGB$41wReF@jUi<8Ua4L!27obua`AHvAlhbvx20R#xy|+4`8f7?tUTB`c=c)g1=Pedq|f0CCD%gPqvPH-plT;rqm3UI+>sd0xsDre zA1T)zQ#i$?Jh52-acg>QcQC{2d*qCBj}*9LVjsaS%I1-5-x?Qp@H-E&>&8r+&96$U_CeS7ILDJpH^F6{ez?XAfD z<4)ar)X8o%0;w*IxZ#+)ex>|Zply!fM)j=m%JIf2n;9k8{H>yyzCrwaD6H&uS|{8l z-!~yP61!2)KOy|nZl|hGUVxC#3(4OrasBDsJNiJ6@Siri3Gv0(niTNKgay$zE@J(! z&TFQgf$>YyiHhPIb-90@f|L0>l9v5yte1~=RXRp|upukh59EGJRg#^Wm!L+-|2~b{ zQ?I+=Z9P~Hk|u;%Sz&Lzg0x54xB8(jxYpXPy~7z@YH$3T8sMQ!Xkw6>-kq@f1k2x* zjp|RR0@#4kPx34(D=jMBNqf+!U?*|AFkQD(_7UYu`i%z1ouzT1Xftle8eV9VHHC7q zxNJ_?Eb+GYYo`RxgrZOOE&1Ei{H^lhwAVB!(6L(QlVslYIe`K2sG!u$oV<8Z^HBMk z9b0S(h$Ql%157zGcKi^%%&@()+_W{1r?~5;sBY$Pbj72n#uR6Xgj~7bY&b|e4x7no z;ke{sNG`-^P6{mvo~~7$4opc`j153vXoTcwh8Qsnqq2)~zJ$B^*#hv5dGm#c<{Hwb?m)Asyw8kM8 z)O~W((x98x_GE81ay9bUgi#rEdkx^4cvYZ(tzJPg!qALs=h zSAu4^-t3Vfz=ZBtyODK{Y6xbU3L@RV{6QcP$`l7#V$+E_2ImwbS<#R*{N^(*+Y__w zTFG-{gTd^A6`F;06D*?IyC`SCw;%#UH(D6)XYJ0QGCw%wkf!3yt%G(vZF&!X%Jcx; zXgoyhCIO7lW=D#Pceai9KKbyq&h+6EBZxRP-|BU?~xCVHk?ES%&`4 zZA!&V*_sb!W`ovIt?_SBT^Z*|+18Q)^#OM-H7rcu$KvZOjf}uze$>Me900?Kvr1Dh zh{5WNaB<@?Wku>u471Y}nq)WYWvAZW&L)Rvrc>|NmbbTNs;`fIYn}aLdOwrz4wahY z>fOQpzPLZ%j&r5$q5c}2!^hFiKnv-UU&{3F-S@*_+0<% zgd_Mf`q#IBrwVBM(ixQ8xtCCaPo{5W_LU4R13UP3(1haC5{eGrZET#mU$MWFNe1{( zIp#+BSJ+af9PYEO{7!FIlmM=yF9Q!{SLC}NZ+dcdOoj%WdcMpg6 zC?$zLw`V)AS(Mk)SKX4!QnNs^p*E!4-yR&&=Em=90AUZ>H?*9(1W2?*4=^yAviX#H z#b99cCzaU)H2f{38;5Ksm-iH{0_)5C&uZOQis-JbV;ue58CH&a&*7bWm|V`6&c0*z zS3UwCR{{BNc>f4Q0s9-zpcyE_Y>)0||1bL+ z->IGN){YqrCu?g)hdXQbNY}@sA%Q1rB`J!Axr0a$25zlf;f!*(KyHc6(S7p&$O@XV ze(*e7Ilf<<^2y=(zqc@7ylb*`iz^*FAA9zavTazZ;;6LyR>SGh)pySB%@4?4Q4ZDk z+OdEUzsKaw93L%Ne7EpqxGmhJncoS65oCMGCxWv*1YAyL+a_7m9sfBYx2A6MY$Fkc~e!=_%B`xW{0{c)t z4Z_V^bJ<$E{v-1Go3r--CgA^(Zbyw2YwzF_wEupKzwMxCdBYx5^NQ>2L@AB?yD3!)D7|4`3`Z=JgWtN(*6(bzFk+Svct=u<+# zzEzT=HKT9J=ibh2)RA3>6z}isPB2U*>jugHmh{rO3-N#0r;d?YMqvIIZl4Bv_N_b| zT$z1yKHp;h%PxxhF}oAi-AMEXQ$2ywk^s}f`5)~*HSFwLoa7Kki zop#m%Y$J15<2vi?YE~77#-|;DJ)XSS9u>KQ!$m}0U1rpoqDh6s12ORF~8CkZ_#8l4K=J>>)(lo)i7?|c2FMk1(!oeKjW;V zT?UWfx@c=R-d1xJC#@OU-YAG?YT>Lzf_b!Em&(~NTONgr33JgGC;qk=d4$ExFBlDF z5a@I1r)1CG8O^*wy`#+czVtGYd4aStL=m^!Nvr%o{=w-cRRXZvisV-x=k_dQGUm)2 zG=pa>sU`|Gn$Io3lqsKqGRw-P+`NSO9r^=l!m%B>l`jH!W@`csQy77C1iT&!Uv&x728Uvn4e9e!em+OG zI;8A;AN^iX@|$X_r$2j5ScdVQxNxrtj`#N{NeqaPG^@YP&Z|?ibP{Y*Ol6ChQ>j#V zqOEOhXm&wdkyDF$cIcqHmh+L1sfLpU1pf5h`RLgKhr*U(H~cn2TMcIEOn9Lo<3g7R zM5tD{AGF+|wD{=P+b>cwWV@>hV+2r*h*Z)XwRy%Cq2#N;KLJA0^D;xhg8}6ssG(|A z1FI0*9DeoHxM}lT8RTTYEa|l(%m!Ssn840jrZbhFSbhvbil$r*>U9#6^<%>M?$zb% zShW@z1>_-;DEuLjDf8Z!H5I)d`D0zi>EDwdG2c&?j()4-^CJy^{VAQJDGf8YsID(> zoV2P{Gnq4;K_cL~Yrf2AFJK-jiPAs=(?6`BG7n`$?e8ym zEF8Rm-$haP@Ez!Ol3-;uVDqU8+G{hu!rD^&U_oXE3IwAKCNQ0F{S^=T1!fWo3qwZ< z+d{MUD%O09;EOH%l?%&+?~dHdl=aOF2WSgt30weUuz*TB2CKIQ3!4b82i#srkZ?_JKKhr)>K6bfjwprC&bt6C>2yY2&u~|XsoXLts+u~789_Rai^~8>WHh~~I{hYx>HUTG{`g$4Ju#GBpRvU zTmzCNIFkY|^YK|w()(1ekSVqTbmbQ!I z>)YqhS6B(|n!oeI!&I5i-JXH`rg!<~0QG4T`i6VbUwoo#N$j*WfEU?ymxA6^LDGH8 zaSbCw$}=uc+SZ0|Qe}z(q)o5^XI@6~c4fPq5G(aI7Q&KIIZzuVbQ#T$UZYld5k8+6 z!k89PQM$aEcGXo*Tp=*C-c3$E>JepmF_?Bu(T1r+IrHW1m^!vG(w@7ruj=1%TVwa((V0EEanuG3`tzAJO65$WSgY3^AiQk)s?!qzGd*f8`n&^jC&PGBH z=W6+IQ^g1FEW$rgW-BNk+K)BfQGAj6>U6!>H;4)B;+xxr*KFtq9_IkVxY}4X_Y}oN zPsJJ2zls=p3@Z>4!8}|G=S($+`0K3GHZ)e)Uge_ufjvf`dWdbuBuTT(kGR|r;qMBD zcP;Tc9g9dGBND3QQ!j!ZJnz@R1N+p-HG7(4nb+l!DRwM12{3XlLBINGjHc+cFfQWY zs%{hLBfOpp`hJNrPB+-?s3~=J^U&|@J z)~1UHarce_+h&2JZ zSRtAo(v_r_PlWVZ$wk=z;^kPR*TqN!^S&E{^a@bUN4W`XpZE*3agy^gDq3$dbw^MV>leKiqsc*gsQ^%UaA4zgYQ$K5y^uF@D0qoOW}i?GG+ax%GYcl|GB>fd-0IQ zu`A{;G4})44#IlF`Uk8B+5UX1r)q`9W}C)}SPd8`akyPX9yk`>gaZSgeXlg7B|@#j0$aB*~+9MzBd zZki-OP0jdd3zG+%>NTqeThqGLdz4$-Ev9Q*on{(dmOHo7xU&gmy?y=!I0`$o+OtT@ z?E0m+Ulr}T4!K+cX_630gV@C zc@-WXJbdHVS7o3&^ z>-S(X@sQLqZJJcfJiNqmp`Z43idPE3Ie&OYNoP3}(vmk_o|K3$Fj=S+?TnuSooZGQ zs?)pD)E|vG+es)$8EdX7<80TJFoh76>**oOp|V&O>5RBCg;it|*)XUKbSDjruLO5~ zBYH}TNRQ}p{tf5lm;Uxn#+HFmEnsOV+i!3-yzt-Yv0k`utn@GM#(CsrZlI zgLa2*hRX!ZA8k1HsCqk6WY-C41ymdKrW79IK=e7zdU8^5?%Nfu=N$*(wh&#kqKCCa zVX1Ta4AoohsbyE`5SDtCJq-nDEaKlJ^@X&lvSb9BLciL#@B`Oj?wcbgh|y()nNYR*qg{M3PrwJL$FOUhbS5&#hp|%iGb>(zyuSYG%2i^fwk} z83JSN)bB%Vu0smoYRt(lAqL6=vHMi@e=v-So}sV+z0cQH~@74H3j8l!kwR zI#EwPrj%C>hLD+A1+F@x!D6dP8XFQ*#Wp~&xXGCqMxdD*5S?dP9&2cU&SJ6@purko zlgXjIsg^IRaC4PI^Oa;5yAyiizN|G5u8J2 z;J1XL%4T10JUON`Zk+_R!_ze}kj%y19sR);JvyAkc%1}{^qYajMEEGoe7K!txCW5r z-=B>(3$-$;-$M6L2b!n$L^EX9_wCBBSATFMeqUv#oA}8>R!_o9(M-RfR9j^Yd&Z#{ z0gXR0S7%0351614k!Wf*CvvA0-gbCKNoakviya!jUb=U$cl&A0=$`wRpI<=aY@zUT zCC%G@`?6<4@WtWzoAZj4!?vuGUz_{w+eysB$7TcT>)pZL)I`fMV@~!}wsUatpJt4RZ&C?)Uq`u_3%tw#MvSI_)TkK2o# z$6M)3z=s^SZ%;?XU;MKA<`RKz@e{&&=<1XmJnk_{KpHVmkG^`r#;_)=?ztR6;NpsA+4y5vmGy7k7F2Li_n4UK_Zy5}eN+ zG$Ov!dE_SgO9E%=oz`FM9`!2mF;7!HK-mg=n{E7?`r^_F`x4t$+!ld0iU~6LLZIVd z9d*}7vEynl76 zm3@3soq*=;Ez;k09W3Nucy^BM4ZOk6_#iUteAyN*d`M>V;I%wX8x4#}*9J|};O>qC zs_L}wtqRG0wJjzRgfF+2{r!by{5_+BX`fl}$#{l+fieqRriF`G<7vJt!={lV6ed1z z{@BPqqh2%EV_0imalR~U`ZvB<^Vxe~diD&kEGSEirLw|QgnF)HBt$rvb+sASM> z|8#$$p&>C``)K2Slnx3t06;gUt#Re*aZw*{)CSq1V80vjO&8oZ$742Ss)S+GV&X>v%p!wjrLrrpih(f|f z7TinlG9d7m69-ADWRBRD4YwRcef!ly$X0v+K5T6>=bb-DN5S5d?ZK;CT>sXlpC${M zCSKLR;*yS!u}e{PoyfzN%bw+Cji0K^2GbWtPqsOnF~Bo9W_T#lJd^i_hx}xnQ6%p0 zklRSeyrmA6???#vT&nu?CS-WVkI(CA=DQsC;~%yyHr&udF!q}g?d?xf9w+OaART|X--|Z5k7Tia|I!-J=dx!U&*Lvgf z$lnjgvM5W!&caY;ik{E@n>2SXBdOqv0yAYIh%mJiBoeiH17P~;^H4D#BjzYgVp7C` z2&L!ZgZCTEw^iRA^+$5#MQqx0@HYKqS{6$^y1iX|QuSS_?J4Ygiv$^%zqeuhf1JH# zOeS5>hKak&;0}YkySux)yW8MCxVt+%xVt+H?mReyyAQs+-{i8a4lFmu` zoUXd=I#mqDhka$P&brpGh&YdY)RAoJy&=RZtI2V4F`v*BINr08yV&;Sn!86B+4!q3 zWp|v`l0*jiRgANSmzO>K-fvgC|JK*<{Z2pT-;fy@^Ll>OZhl-e{m+C%FW(U=B_oJt z;_~tNeVlLhmZLrICc0d|XY~R8@I-heR+nl7uXr+HlaCk?dO^!$Rm{-~%|jmh7L_}b zz~&%@%lU0{B#*LpZjzX8CNS6DC*ZM+BH|oeVd5d3?)R>`Iaj^=BHut8huIxr5vljXF`PxC z+DXJW6G$DTP&EazAI*unY;)?u-<@_2cs*OT_{k&il78_upqd?(2VFyZr37Y9RE?rVjMDtyyX^s0^I8JO^9KmPHgpCf>a*5_x++)i>1 zL~elOF!SrG`-#)oi>SR5UhOEl(k7t2lZ7OLM7me;R1vmUXK2G7ZpmCA8^yUv=rK@_7ux zq-b5}cxBmwsu$7iHS!Sb7qLa8YrX`Bw`Vn)?`GbP!Ddsp0jK+R8S#p_o@yo#fETrC z-&`98Q9B&QNifXpJI!aS|M-vBd&OUOAi8~^6`*H5%|wU|ya)$n`Z?69*O6;J%6A%d zbMVaH> z4ak3t??NJZO>RIM|JQoJ+Br{=nU>fJJ_I5gq1=1A%zOF__O*GT&ZLygoI>x;FehQgspngeaLk2uioH-(oC3s5;)!+9%xg_154 z&8Eg^5CdPsV2@LFY^uk!eo^oF7l^YK)m?iuGg6OzOd8{hrGa}GKJu|n* zD_j-7b`F2E$De`!I+t;9Rqc5X7h=4d=|zx^+Azr+j=v zNm(gMwQ6PK>*~$aDZ8*_{tX?~`Hu9L17Q?igj6qaj*{@+y)?}LX|Wx8u=jUYm0CZ6Op5}dgCaV2RX5pajSO$QW~VYbN;5W zdcR})|Au{K{y(rUBS&L$d_qNMFU(n)BVSGR>W5VCST?63JbW~b`L#wb{pO!*MCdvP zRJv%7ry?N{Q3g3~I~rI|b4>sNu|G%c?-%O$ud#60DY&JA{J(MYR9BP2&lR51AhNfk9E zf;pu*$V|;f6rcpF_A$O>B;Ut@VN7=eUK0D|TD+y{=%rqw5NyNJ`&ynd_lVSVd=1V7 zVB?RJMmFRAw}kop+rb72;-_$yiOw(w<`@`UgSq}fy+cM^4cLf^v8w$gH(S*I1;QH4 z&eeTk9`ueZBzy7h#{r{fiGuxhL9^Qn7TZSpRbRDmt3e zQc_C!>2Tb}^gU9d?Z7;zu>SDPl$e_Q9dTOJd&V5sshqbLXzX&OKWQWu5VJTfoV zGdPyT@5`HwpGXnjT%Pb;-Gf!qe>|`Z3rIwW!N`l^I4zDsf$QYch}D!*ejdJYd`Hc@?u9!Hh=$jWHB@fmBDYC@}O8CcqOm z?9&m9oVh&9^@&7kr`H&7RpbF>M~xpud}1nXlo{IpO)Jo2;d^&p-2*u2^mcSkf-h9l zYw$7Uer`t+=nOfC|7hvlU%>TP03e2^YRMd{6X2xMhto?~%DDbPbgug?*!pu=F<-c6 zA3Q%_k#QLBfcnYixIC@d-eNMXdKm9{a!c&Ts8MWHp5gs3LCiSg{QLARrhpQfp6NQQKKV~aSm2D!#^Gvjoms>z|G zAaHYlU3+u}dolP4I-_ni&`6SwADEaXLn3f2ZYs2+GEwvp1H>B`tn~L<<{$p}-f93( zU_v^1&si&lFlO`qCZKiT4l6?AuZ{=P4~O8nys*$R?^%>UDTvPB2=n9_5`4NOD)D2z z)8!HA!zQ<_u*qeqC8v<4#<(Tgi&#frCCX?eG0mIQ2h1LRxVMRt>lV}vq$c+oO!D=m zVgJ>~(%YzUH7EtcBsG!uO)B%{9HB<6Aw{-R&Zkk(r$w;Z74z*Sr==fhI)LI+anlb< z3Ov174Ce9Fki}ZIvRYj}RS`IKVMVC@J^Ni?=w=OJ-wOSsRaZSZ>7w8XBH&dmXJz#1 zacsB(RO~K!q(CNnP#$xAAodz^tqiOT6;}UO>dbWmciZ$<(>+_=TaoIS>=rp(2b=|0 zj6)MY2FysnNM7_uAo5ng7cYuMvbM5wbYtu?-Q^01HeH^#zH$M$sCsBpXA}wT+_2Ms z$$eVMOc_bO^)P>aSPG~3a8ij7mzjIv8ZVN)^y^#{*)!RqEtRGTH7G)wj1^t}%(%X| zIAJ`Nv<#5`bqUuuT`uIdZX8jE}4-r=dIZw`@); zS&bG;!kic%w+kGV>SGq#Vx!)qse7~q=1Ye`Q=Z=MEco+WW`Yi$s z=j_j+>FvM{_j$)pd*O%u^YjpKeZ`iMQVlG^feMVu%iHMo=G%EaQ`k_1(HBjsm4YG0 zalwqMED2z}L;71Da8cp-OXU}1fKp!k02sWcmukKoZ`Rq`_YqCLO zDOmNuHC!+wz!8s4z0MvViewBO&fBf%UiEs-xnyUFfTnr7siA&Vr@mFvNMTS1=vBzu<<-R#4GqF&lQ*&@81kSp2P%uciJr;xOFl4@#6QM*%@AtQxVS^9xd@LgxIY z;2gD^S=N6a?Q<~BCf5S#c^Ije5*v!7tnBfcM7D5f3m{EPKaFl|vRc4HF?B}TJrucL zkX^Bb_Ce7EQp0_qv$mHfg$_&OmS?PStEOG%X3|kL%l^IVal~|(8Yq{M=|Y0E$Jwit z(dtqKwb&Id*~uc3OBpiK+qAdT2a8$H!^j*1ugq9(D(+ue^lqIMa?tYdlJHvV={ zR+sE7JFEM6fQ`;_A{cLF|53iy3Q-j|x0lII;c-Mv^#l_e++V!E9(`QrefeFZEeI!HQB;m*(Y7qf}E}{9IH@#^rBD zn585O^Oi*%Sp5tAt{}-G$gqTzk)#I4RV{1Av(%!0)v%F9-uviKowGA>p(qj2>Kv&$ zBd?PfbZBK@24jSn`npT%+Nq_G+tVW&%=soeNL#jg=LC8pi-^yfZ|OKRJD`(Akl4MfqGM&-Zg6FQgNaO@xLi8hU8LdMka6;p=&w+svdQ-SLPu1b0*YLu0{5d zw;eNB)M=QVHKYu!r56cAunOG3J&X3J`|F58Ji^rcBlWNNn|hH5aZ5Eh^+ppK;JG(2@p*uol$m_l8h!2q@W+@%ViOiLgkby6 z_0saQ18`h6A#O$!pRC8_Gy=8Muo7yano19P`TGtnGzs5*$OcNKbh*fUoD)mTrQAH>Dbb8arX`7oY9e>FBbCQPmwkgB#;@SOqRGMOX+*T2r^Qm%$G?|ie{*Fj%jS%f9qYi3Hi6sj zl(Hi4d`=@(i@q^uh7e1epnb+ySu@GJ5_G}y$&VY*_3s-K$h4$1!mzfq0UG}31?@R?zujsyI zh_Wi1jtsCrK}^vPZoRC#ok@IW5UK==+LCSzJNt3EfajyWOK%_!I$sGcFxu^Z+hL7m zDX#|%?a#d#>QFG3Q*}HK3eq+VG(eBZk4MO-4# z;3S&VT}|W-^@7S~Srrj%c;25v;enEOgAB5s3$YqJLVKWM{6Bao2Cv{zVG^%$;!>0Y(QmB>4-wkv9{tBGE9l+%4V2t(m@9tEMIq!0s2lC^q9EvF@S(@ioYd4c>&-KS7THqzy7}Ed^5XR!`;IVMFE<4C z@$!R&$F+XxAi)YLdHpjd49eWO2Hv=*;u`4kHtJgRoF;CW8|dojTlN4~<<0(9y@y6D zCg$j9KLt<)EMiY2oG3H~CYwzs(4lj&Xvhg+5ZJ8Ex#=f?y8XykT}PVw6scm$#E&dS zTUP-M3J0^3mk=Xu1!p3TbNG(arNg@k()dI3lAPoO!v8*J%>9nSwIf?Wo5%g?c%+;v zi7r3RdNtq`@bS3YQ{nM)x$!mR=j-bBqPQfw%W#?85kY`8oZMl=00B4_0SOEEyFP4e@0sw{It!rm(KJbN#qF6AY=Y z&6|Dv|IcxYO`K*8a#mHGq0Rtf_p9Jz%8LBV{7P>8d+ZQ7clh?ziwKw%Jsj6lFH{fu5BZ1GoLy;eonv)cyO+2&Bxa63z46W=yDQ7{>q(Gv~L)K{Xi4GMt_xE zSxv0?np^au5-sJawDY+*T(3bh&Y*Q6qv`CG7ieH`)!Xs79P8BRkX(y1BRgc5H<(fF z(?8^#h$@o;PSvN~ZtU-Ma-UDnf@pZxbhzypVeJ<>LVgkXd~Fc4#gfMj-RtCo#q+%l z&tz;tTrbsnYNX|^MKa>bwkBV!n}(3DO=D)8!89H!Sor6E1UQkvHcs@)cG!8w6+57* zQ-Oqu6e_7_h)?{zj^UQ`6!q5$#><)H{IohMMuF!}IMU8426I&ln4NdcM!aNj=E#mugCMo|?K~2Pdxbs2&Iij?yR8eA& z`)iiH?$z-Jb)|;pCJ`}2L&$kTViKl}&zJ5;SG&e6S(-IFjU|Hn=v6oJl%YS)y{Itr zYmBb^YGAH(3&G7#N`+fSsJG+tCWJ#Tz6df;2+3m9x1z^9vYMdvG9BUe;=xpQ_K{ZM zyi{ktR(V^BGr-)_Z+ds|;g$M!ZEv&EOd2-%v0FP`L^@!-`s`CeY~miNK0El-$~1Ak zsQSqGkcSaqEdqOE;e}=L{=uXCzOk#)w=IqdQD3vApRM7C6)1}vjQ(nWZ8_8$yzf+N zw-Pe=@-T`u;R@oigcN*rh}-a%TCc9;T5YY!w97-krl=YB+@qZ#D?O&J|4AnRybum? zN6C-3ULM>AaQ@oqjUCsXJ?VK4!-=3S+X80gttFZlhHoW|CAu?`b#<=AT4=A6c4f4+ zU^ngQJJuvxLR3O_Rd%<f26<->(Quei!jKr%K0xO^)t*U3BO zZ7tX3;rp}n-wQ5aR9pBA+l-BfmtDYEonrb|=qoxpt+@*!3(cWqh+E&WIj zXI=sE23)?=ygZr}h2_?14jXG81klz{B_CI3gm-FF556&M7pHONJb71EYff^jDh)s5 z$K-KRx?VIlr4M;MLJM``BJeA8(k^WZk8py@zQ?_WJFY1`Pxs&0ufpT+H2IzYpy1?n zRgo7^Jyl-f2#kGtYpemdo#973dDou|oyM>4R<(bNXLY1`{xn78a)K{Zv?{Omf4}(0 z?kSxhGPPwgDpE`m_b4GhRbu+6x-HDZ@3I>^Fh4y-X0tF|l2Tk$VwrV|x?NP%84>Cg zQg3ZuDjYrOpotMVe*To-$!s>KJNN#08o!XV__}9(3)Lu~p2OxL4*@i#B%s8(*_N!t z_~(0gY}{)scW=Y5KM%G&4voks?jBMvm1M0=WUi> zzHH06igZP86r~huy@CW3h9RkmZow4bbz&Q<-y_gE*a}3}M_}GfjtYa|vxVd;8k^BgG`HbMaHvD*aIDH<~ zJ-=Gas43m;?fU!vF2XCgTGO_AZQvX5xYzRX6yoRiu~+GTyEx^TAK;3dxwWEFzaTLm zAYNY9NXvsb)v{3**)sAq{sYJ30NDAu+JC9aZ#(h?MS^qnY#TrMj{kh*U4XV7SVo=K z>;HLi__n&)?{pO7rWy2RhXeBz29}~YYK$``EcVVtVLs!Yd&_ze|F~kmpPfQ<$EO93 zG`3^ph!87ZRW*s+_334;9aBQr$sNZGSh{VniC14k$nvTb(hrK#_(&035}vE^@Jtwd zwYTcZ+PJmS`W2ADw}_d3iQT9hbPae=TDwfi!!@xig{BF2V7$)YfZ~CAMEXY3n`X7b zCud2=lanSuveg1#g3U=2S}ZV{=obm5_@Bzb`$u=H%D1IfvR~|Bo~SQ#8pNS#^Xyba zLfeZqm-J}q-&n_3LHX|SfFsouB@U1A&OWep_I|Ik%-$j4I3$%frn!p8YZU?#?41f! zBkZxx%u#l+>*YIHa@)-_5MHI^rCQ*n@Eu)(`KPHBAkH?Pk#U<}Gba%=wcH$gU$1h3 ztr<}iy1ykG7lNQx{1gu$?Ed0D^J#m`6si^!0`BLyTyo`La@0IU}X`{I$*TE zLrt#N?|_QVAc`N$*B3&+ zJwM(Qk{DsMqiCre5Jj!&Owcyw=u|>G>WC3uVI2{Dy{J*{zXjjoC&Y5uQh0|$V``pO z#(m5TfR6zW53l{4W(vr%4e!jcG4r|Ea%Xs!Yiphk&NL4UsbNYf_B1r2diaS%STt19 zn~Wdnv&E$$a?xI*Y}2MQZxfi?l+zAJP($C8BPCRoGAYr3Itn>cBsj#}yp<-?(fC*4 zS5*}*oEyiYuJ`(Y&5D6v8NjKkYC-Ge1F+ay?Z8FV?sJbz<}fmC_x_=A(#(F+yexo@ zhh3Gi8FGZ}p|H>vsMm31Vac}Um%yQI63$|_Ghms9z75_sjZ8c)3V=<@;yNw=c)BLyJ zlgZCbV@3_ot+wk8pSN_rFid`_!kSx9i$IKTqVgq}pO5 zB9eA9iatjY7;|=a=-m*wfn0t=h<~3VO7L#14}N%EYc2F8r{RYKAht9dv2zV{1ia&S z{LLXKn;4J!aKea$1~70rJ}?9J-En5Wi&5TPVFnIEE1zj0*sVN~#oNFIDo~oA(1Y;~ zA#~^~zt8$0NdRmCD3EDk_Nyb~fqCDB-J8DMorb!X86*)W)g@0V2>C6Zc9d$TD-wvd z@uiJmF1P`~2$Tz`vh6OE=8LViA&h?oB6Hh{Fi5h0V<}P{Dhi|cd6($30T$zug;9D_ z&mw|MU=<{y?D92&kekLzJEbUYe}>?NgItkGtQ_efH1YB9!*(5MAy&=jE3i-Y-(T=z zAp`@SKcZin3>lIcH77l1$OEoJH4AI`eKdT%U79j@Ms;0o@5_;!`sn8bKW)Q{yx5Gt z%E8_E31_OD=WH~j|KUu+3&u_`7fyd)qp-z>79>@^dQF+jkLCsPu;_1b@q#hIl@?p z@E<1}XPl|_2tDxBbdfaNmXO|G%n|5~C5#X0Yx9m1Zb}t4TCRwUN|$p^ zcGWLwsNua)Y^$zryf<>P>J7C%KU($1T*0SW_^9D?)5|zHu`RiFrh`tAq}P@+r*71z zTjj@8z-I%?EZfVhfk?qT59~m8c6ns_6Q4Lok|8w$%{IB;vEUw)1WEOdS5PN$>RpU& zlm1*ti7Fyh3&Ib_BkPc3ezaRFRnLwFdj8EZ={p8Fh973W&&Zd&_ivVh-7lxHm4a{o zZm&|WS}-;})4N*@{fqm4-S1y^*!Qvvd_LSBMqeBB_&&dG`aW*G9nU^=T_?3*T$DZw zYr3o1V)ZD7>z!-iWcg~!HZo5}kH_Es^Qkz`vKU7K%}&{_0`#SiT%b!&ZH_4po`u_{ ztww(qGg@-}o?K7%)YJqfwjdtmVhRAAx)g4F&V6`0SqEhTb>6xpJe+C}#@EEg)He8A zL((=zoVZF;i-4lmrMr0cjJJF;e1CW37L#^wQ%_!w4I8;);haO-4}5}-jb+>1&;f-6 z?E<5{hZ&tU&@eV@aDKq0V4X0zseM&k|GNbi*l|h#vo9R!ez|n;$Nr)cS%9Y5WswDI zNP*HKJ%J5FaGnKDIF?Sht;nh~`_>Yo{vy~EcJe0Hd^g$G0PWDa9Pdt3904awQw26O z*G&%yK;y(n6<%(!flpmkezuJsI2wM#89{0o!JvVjrW&zIlUp+vCn}v|I;}cI(&ES z+UK&ll`~#y#u^p;Lu3%(Q~Gr$&3_;QTT4cwYYXZ)_}Hv(EqD>A~^{vSS{9&l`ib?0`%uQ+P3nX%{HHJGU+t z{s1ZhhI)x$%QIW2Ygn9<>M=QuLj&ih&r``Sp2(;GNyYYIgd(Q*=Tr18c>CEE=ElOZ zs_;|pLR(uxINzz!pu;t!R^KfoU6Ge7fOgBAonaN`D+&q5832g@odg{(E>3+4UL>>- zllZTQrsPvzEU-Cihy$r>ZG}#?(iEy=|SsDZI{uIxm zrie_6OhPFUlg3Wxx^37m2aN_*oYI@PW25>InSfP+!ygm7l~pNW%}I9diR^j)TlIwy@f`Bm|7sl{1md8eIfO(lOig1d`MTU$9H!>Pl|_mik$_Qnb!2+ zkpgKfKau4Ul6Wm1H*e=A`lmUtBH90Ml@XC9@DA_@ERpo&&pl}_JN|5JUHeTofl zbQ69G#rn^az8Uo%XtZ+CW)YrTmx9sJNA2GfJSEgpSmhi1<7g8ZN+B@}l_Z2WarvVG zCWn0eu?2e9WIepck5s>XHGtN(i(MQo=>$mhO&R?)GjGS~(090>$+V8_B@QObE`dM(B5aq526Jf>9s{KVbCU_lZVa`F%g3QMu zmUdK;8>)TjSv7~DnsXp62FF1uaVXEaKboOL5-12uaJcyWcg`VWj5^%_0-QbBLR<+0 z_9Q!t8I7~vyfD031r=ns!&u^Ak{hho?;7r(>Z>fgQ2zzI>0WRBoKr41TJnErSq))b zkOVZ|)1SyiK7PDjMR|uhesCAgj*1)n!crv($T zQ_}o^J5~qPAMm3hCe7obwZlfVCXvgFfLm$k)f*1YEX`&4`>FH|(V?IZS7-J=wc+}c zdq5ly+u!^MU2_ese^!aXYqDnHRd%%tkmRhkDjhrPj+-omMm_`du3fIkoAA{LU}|Dr zq!)s#?#!5x642A#G7FcNG(ZMC3ZQvq?G_v0A0#>y|FvrdV5$%^j=tv%v-OK2zi?`2 zVG+x@GL?(Y$nu@dMmN&75?GShA8I7mL#V!P-RroIqs}bn3e15=oAbNAHhg#UzI}R>yoWwNR22Mh@^`~9Dt@|H z=6sDmo@Kc559mt^{xI28R}VQ;V7@~8`z606r(WP-b437qhM0=LrIFiU6VpPUJ_hB~ z_n3JQ^t8em&K~%N-e08YNfHQ7Nad5b8=>D~3fij*MF85hg;>izEP&(YX8Y3lFE;2( zHw$m$@%&n#`{i~kKJ8`c-`I%fcRJ_izo(ZeWI?~VzJRZTDW7&Ce*(z!(iay255(_% z*)FY1KV^%PIjS^M?I9aTDN#uREls7AlSD=BgfEGn^UrI-+~PL!nr-~w>-#d0c3^fc z;mOK}c-=2Vrp*p$r=i{<@F-&#|Du$4qbU``EcA(N52Ym-olw;_-Ejj}%1x z_a~TY3NJ!a^KhAZfa@|6N{b?0z;d!u4gi>Y)X6YOC}}>txx=W^H`r=!_3+npwj-UO zXcUM0{L*>c-Ppdw2mEB)lNfVq-VLH7VFzB=z*nMHH--;OnMKP@l9nZ>H@Q%F1D!|C z;jVvu*PrX&uaT4xlg@aGg0WEKd~~?evW57P7(;D5H2C-L+Lfe4kg{#9cz=cr^cjg9 z)Nfz0$k~IHq(jicSomO=(KUF2OEgTd=96aslyW6WQD8DE#UJk_VD|PM7GL%3e# zC|QL12adnWF5}3*=s{Zzv+}(iWPaPV*1Hl6+RcoHI86n>Ss4FPWyxM+YXff@cmh=E z`TFZYujf!>@ZuE6Y{XqRz8`gbZ;GVhWbxwI{ON(`?t}9~Dc|b={%5uM^j&~k2_KIN zApv!~?ODE?JU;`mXImhC57pOSgOnk_(0tgP;+aT?j4t1+BH;&R{AaS{*F^Ex-)l_@ zULHllT*~;FWXa=+;`_hz-gk<7d>y|kd4DMo@>9m=B}d%n&`nWsZMXdDwsk+~(ulx0 z@|w0W4Dibw(W&#E)+jhU+gPx^7$?99fEQs2it+;~A7X6EC?QGLhV7-WpVGbt8k12> zVGtJMWGz0$vt#nOT@Mmb)2OLe$e}9p#h_D+F-t%|=PsKelb_d=CzI#i#wx6$*kspQ zckz!dx)Vb;B1G+NFSAhfbD~P`^m@O&zG&4OP~79Mid*c4(;yXGaciw242c6m+~7^v z`<0qP`deNd_jlkABu4)r9C9+}mC`M{C2f}^Q^ng9S`B@|r>%q#Ag9DbPd>Z(RBvtK znA6$Lb?sx5(+*inEIX%^NdF~sFnJB|eO|`SIQb0RvyVc-3HnA}B+iCo`<`maV3jIXa=Zk4ob%5TIT*Q!HRX>PU8=W7AyyU0>qg{ctm#_ENagGyC%bX*+x zh&ET)0GhY47FGOeR0-R?XW}tt`*0ghleEG%Rh zmHJ8m{|X||YPlI_d{+!5JDBhLl-y!wc^gFhj()F7L9z5x*LUi19=?($g1lkplH<;V zu(fz^Jgjv`*n~{C;F$b}JbYUaPiVA%+h>h1a`U*y_iyJF`&Z94nJ%@<-<@5(ZRlvp zgP_7ST(>vv6Dp48&MQ{v%&=NetimVt+x|D{hV*zB=nQvZlWmHm*V*&S*6WAMB zx?QbT2>$hdp_^4bW_^VUIUC;^eo(PuP>3(%|1dq<_<-u$yW>60kF%ixbY*@{OkM3U zI5?P}>>joqTWSW?9=P$hAdk(d`BWfsB-g;Wm^XLH5mTZ^^;K^1{QTDJ}`SXp)<07`khOT0fx*|Fby%u_w zv`IB1_ep}GMaSZ}J-)9`1a6Pv%QkRd2O(Mg);OZGS}PI*$zZ77SMd@0r_q4fJT*m1 z<=g8MSVOR2Duge;SFvXiV3T`{UBxND_?N=TMpgvaPNTCCcWVf}VcSp|MqihWMhz!$ z)h0|p3?{4-AUY;CJ{(?bx_lRmVr&Ho(=oT4*kgIXQFBxuJH*h+KBY!4IF~>ORa+OX z1g~`RPXM8z3a^&{BB<@ZK^FEfw(7K9c-clokgmNmLen^yhEa!e%kC(=a$?IGbU;0p zI)bZFkCbGvw?*w74MVA! zmJzDo#SqE2%c(`wX|-JpUx4#0^DIQut1$E5Y!>BojVVs(PAODvCs2#E=o#L9wA_bK zYGT$R7<^+dMHvgQD5zm68My%OLzuhpKj4qOuxuf4tVW1EH?OYtY zVjS>^9N?qNjhW@78sNX=;Em1B)a8plZY_J;UR}ppV@ARTp?piAt;j^Y*BXV?Wn5#)zcK72VkWaKhGUrvNkIb8 z_&zH!Ti6|z+j+AFaN_&^sq#Qd8V<5O-%{OK_~)bzsDNmPPOLTCsWwj7BlEKLv5Jk` zJMnD@5?&I;Kec5Nj5U26tbg9xedWzOY03>9?0w!keZ_mW_XQWmm%oiIejJ>B_BRiB z^Z9;O(98vwEhBO>OJ=bKM^PZ4z1it~6R8B$(qN)SwC|`ixOnZr+n*S}n0TDo*h5E9 zG;(1*hMGH0IS9N|3Ns+;15agUym9ZgmPVW4nb%y_B{W(&DGtX3O&(1xgC(M@3`%MU;MJwMD$(t z!65D%Bl)Dim)IWf^t>B&``m7QJ70!9oL{$}%WXS-{vUTE@s5T&l2Cmu7ziE{2w1;a z2u0IN2fll;B}y7hAmn1DA3Kf?&lXn`#|UPp*}=9aTSX`_6JKN%AyKVy%H2(dUL#50 z;P!vG%q@Gx=)-Dxt7}t)F`R1Ym0MpZDyLBG6q&Jn{)}pHiM7w~Q%HP5jdqYs98sBYk?N@-pdAN`-jmP^xmnPPE|2S0fmIyRtN`KE3R=q?JWt z_71u;kgck;Dg#YNQgKTi(V-%m{@l@w%+C|XB{Vb^b>pPqM9 zXC-)gc#<9h0zBya62vOD*L+1|RqeGa?tFX*v~oozVsrQuuvsftDxc&uqmYx54|Pi1 zCu+C+%N__rOtJm9ew+_%*jYSx4fdU_IGrdwKZCP$T&Hr4h|tozHdU-)W*LFoU!zk< zwF6}T90KO#Z~k4ERqDzI->QdcT(@fKq{F4aFD8MjPX_|E$~x74h(-eJq&G}_OtBqG&cCDSLVie zCeW1Q;a+>K7e>y7lH(t^#@%w`jT~1SXPPD`l#eO&e*Q}Or5t=WvTB&0b3@4cLfQV; zqr`*KKVd6nc!-v7jQj0H5yaqUiI8&)_zmbWxeWS^;*I=6>7&ofJ&lZm)a-pg-uu1W zsc%|7)ui_M-uf%)!?R0f5b`07wT+Vaj$$&HIPA;>7bALr5EoA8CH53Ekt^4J&S>w+ z8^QF;B44ifVNCYI=wN^Od+>d8Ry{tqzEZP!uD|U+d2$6sEcM{&N5ml|d(5}iWA4uL ztf1qnIc9J(?krP?@$g>jC%h=6Ku^Uxa9wz{#ixWz+&LECt>*^Y43tWMrR}%}-}Erb zV>uKr$Tt53vb=hm9tLinwPA=N)i2knXM|!}GbMy4C+t zHal!zWh@jdC)4wDolF}!hua*VBoX6`-HTIfuF^glpvQ={C-|@_P^l%7-DdQ7Mm7oB z#8pIx!a;yF_>K!JJgCNCgUxcmsU|&=XByawpLck^7F6*{yRjeClkkK8_~b{i9#*Y_ zEN)58jOOFQ2R;FSjgKmw&Q~leD->KnS=EZ6n$=n7Emi?x(VcsK5(d>*bf>5O*64?@ z09AD8s0-B52JB?xD`h+qH!PE2vB_*NHTuyu^8Waga<38RuHi9-1-__41)2xcuM*Y7 zbgdigNfs6cmzXhDF}R#I?`!fqYw?!zBYaFMO0qZrITzM^FCWhFS}THji~RjxC`N}x zK4MEsI4c@nWf~dGr(H47qO9zNA$Qfj*V%6!yCxA(VVKKwjK&~N&GIeT_(FYa-CtG0 zaun;ZAZ}BBKRrP}%n3RFdV+X43kx@l-)M_(PjnZJ5DX-GI5rjpe9kKCnYd7a*1LR) zRsgcLa=*&_a=xDLyg@J^yQiJ*_U;ggah{5q?t;F#5F54YQIyLa$h&5swl6ZhZy589 zQ_gmtQmknn1*4@^@T>xeQF|?R93)j4_HVHMc(NP};vz^zka6dzILx^1it`vl@1lW0EbN6 zVS@ruS{QaS=(GcztkaI(J+IDAW=L(EF=E++al;&tr}Lx_E^x*nPHX2(QxQD3!Fs_( zVB2bDTbiB8?QA>Sg1|D%DjR9-(H%g1c8K*J+OCd+6!0s^n!wKefQp|>MgVxcan1r>5TAs=Ia%QCw*O31ebFX7<*~u z2MQrQ)5FJNop4?lz?zZ8(Es45D5&6Bf0D;oQ(9JEeBcMp@nfH*8AtS%duPF3_74`C z195|yocvTd5eO>F4sEfy0RVfA4-LJTeL9(&R{rV2aG#eP)2;dt?pAj%oh?9o0XZ(h zGQ0b#P+mlR)y5h-AGVEgfiZo5nqz1dT;gd*t4&60Ely`V{)I5@4Zh%wU4Z>EFmfve zBN;zAzYVLK{V&`+&}c{P-wI0ht}UbMs1#l$``bp4xv>7C`j`ipBxl0`SCFN5(3uJN z1{51Uj4=u^GKpr3+z@NQB_QoQbB%RRV%c$H`8!B@RN8z%WdM;8;u-TMgv_v?YyUlF z`~X=(@`jn_EXPS^0)MZO;$U2O=%gaXZDB4HI7Ah>)*pl$gn*M+6@9NcJ1g|tBv?`5 zM1fxM0Q;ETAmU1S!_2I0*T{;iV$8`e{_gn-+@}Je24 zIJN*RsZ&%l8T<_n{)=O|Sr#YoROoDy%5vp|AxZv@A>k=6 zp=3roJOvAL9!9JwSgAsw({(yJ-3MeciGRHa8(dqghwrKbxw6C|@!UW6Ap<_61O&ie zC#08jc-ochHGV(2%rh)YeOHzhPNe(6*Qymni*MQ|&%)s>dYfv1WG~`e#uW zi@Z~ChldJ%Dj4Xho&{Ah7H#hwEP^|-L6HfZmH-XY$SuMjWkO|;K^cpRjJ%+_QA7HH z`HeDaYC_k%mtYI+m|3fGXET_a6!qOhijY$CSrE4t)aIN-^Vn*GlnS|M92!!hky|i1 zl&MwJK&rx5DC0|0r~Lu*EG*0ZM!HH-O~z<#+#EA&r|qVPM>@0~+2INB%0_t`BU%y0 zpi2q~pb=E~;NWgKnD*Ex>h|8xhW)a6 zX=OT_Eo)A<5}2YA;c@>~<;D&;gA(rt_z{edDK?N}^F%bF5w7cszh9_gp?j~h=;V`P zu;|gUss%zX5LlKeiCHZoR*+3p-kOXvyP&%HmM5}rnSd2728NwJ#v-oQu-He68NVD1 zwXDTp1=a8NSEVl|=E~b=@Vy?3m&Sih|GrsgVuS#Zl`nFz&MyQ=t(la!rKp%qif4Wz0OBo+{ihXwfetlo-IDb@PZQP|OqteAy z0?`&Qe?r*bR3$fi2e=~OJ{q1(m?+jrE_}rw6j^d@jb;$r7A6oQXrI_dx0-xP{~Q4= zEd92vkY%oISiH4tAzXK4Wvw@qdRRadF*W*A$7|S~-az8X2E$?a{<~cH5f+Kkf;o`l zl78>sz8t~n7f5C_s`K=dw>a%(T;1Z~Far>qTqP!WBFhpvlvMuOB*Y62sb{i}(X38U z=tcQa^0q03>zV%;=pf1mmSz>8je7L-A!VNV5)D&9-jAoI;Md>9ZHPfIoODi|&tPo+ z4*-ckcE9RaGdjTU(z3v9kN}e+N)SJpKUGKUzi~|$`%F-QZ_(ncg}>f7)FV=)AWO3{ z<|3TX&2GU}3d*ly>$*rwVaZ$2ad|2R1Qb)mbZ&y>O)gz+aKds+;y}{;AM^Ext&>a@ z4e7R)ZsO=J^Z{doWZ|X3f)l`#H&s(dI++Gx6ywneC$_c_T%KQDeSG`w*%_EE6qZXQ z%>&Wg*NACH^C(Xfww0|l^AWffD_f&IJpfmWq(EOP8`Igz191KbRNIXQ;OQe?+p{z9 z)vv#T(K~)y_vj5>DgX7auTCC-i@L~(7!sV!zsb{C{TqPMXmo;;xsY%Vz=w(`-hR=g zbm0#3bXG6Hbe8ii0tNcWx(bL3!z-=e3$8|9UT=4y0mPaXbMfPJv_(r`kDHL=mW!&v? z(=zd=I4G%dU%_2aus5s<@BoknDez38ZBhI@VjIP3x4=ypV$!$vpfy%T>q-5yMvHE5 z=-?^=N+vi@OQJM{3}MG#=zvBA6Ss_q2`&n%yi^Y=Tg%5OPO3e2N{Tmpg$6Tpg8`ws z0TWiZ06{{k#WDq-g-Y^Gl#_x^nHL=P^NEC{y9aC5?o%236hvXG?uc+eCf`m6YU+cc z8u;j>CY1G_3|?7iGO@#b_U5YU7xK71QmJ(HBuEP)WEPmA1;{Z;<2eQiiPQ9^%mDXy zrkWky>4NX;sYbDu8DX^WrHZnCE&lkb!&#HnB0Lwxw)qsEifsWuhO3rdo`)67ngCa{ z#zM(rWVa13y+WEXdbQM3`TXDio#XI-{^#Keq2Z^AkF$b|D>y|cb5Sy(FB2+EBsoG9 zQE>c#FFa8)QHm+99zQza>%$fQ$vpbo3{x4PF7uQvT<;0a!OLgh;pO|6&mPg1QTYT2 z&e%39UYt~3y0nLBp)+7w&IthTU!Pxne+E=lt2AGfP&KF|m}yIty(`#@G%4_xV&tQ& zaYs$df%F7ZMmHBgoTC3?B+)Ghw5AGkcw=9f;~{9sH6TNUqw{ zFWm#*`IM%wANCCCXi}bg$Lid7HdT)8chRW~lI| z+fhBE`axsnB+Jxic{Gn=JdrIQIYz;qgbeHH3HfL zZ&F5h4d!=7q%|h1M@WNn4>hbVAnmHInf@l3mxOjese23%0Vn}c5*2lc$5c^_ zk_nx^(F_ArfQU!MfHa90qZ9F~w%C#b*M{lV0S6H~;w$-yg5Y$vw;G*@vz}fGs>4^5 zELcrVA+~j-Gz1azbw&9CLhWS9%^tbDYpkFP)eX`$h_s7iFeow0bgrw94hnt9Dt60$vGJAnT!xs+ zzL7TqH^Bv|yuUomcCO%-s#SF7);V!#2yM6d^!noR^rYGNUSC``6}$`q0xzzwFGURz z;Y(L#4`Jeoz8};7UDZqbBi`f;71Ii)uj=usI5wo}c=fBci_(7K`g+CGMBdAG54T#q zHWH{_hC+>uu}?R#pR1l^Bk`D%$?KS=aX>1J!cC%*M!mR)I0rDw&xC5lFroMvj?v-@ z`)Lx8GXPcbHp6+u7TL~oDk0Ods9%`kd5EI8%<=U!$Al70-!x~f0g86w^?I81Gkg8| zPPo0seq{G;*uC9t2j=&FJwb5L74%M8(O1+ z%?i>#qlPDrrJkH{jTN5cct_LM|K>VUEVHwAZd!nAv&T73}S}(f$WohqIiK(p) z5=mtT5}qY}`|&l1&wEG^dnyzJ{Op91DO|_uEgaoSl4usiD6dXOzM?GoRfT3P)o08P zBTAOmvgIRC0nxLhHL$PIO?8|kIbc;z2@lyC5hZ-lAdl&C#11hEe>56Bl7urm6{0J| zj5|D{1i%W-W68wJ&YjXEUNo;66v}UKK=-?X1ddw#SfaY+E5&WjWf(?ZIQnXB<3ksb zR!6iQpnFi(tB^R(dakJHDz_OX$KY-qz>4SJ5ns@xxas3Op2}#K-xg$AJEP zDth(fG@dwSGADWZ@Cqz*IRkOw|CIHS2W-LJTtgI4>leT^qWgw(Q zBPKYI>=MN+L=71)FXzT%`hQEVB4P&x;D37ij$3ax=rl>DvR>L*pwcx;5~v#uNu}mB zqIIo!&8k^CAYa$WSk@P71gwN-M;Xg|d{Dp+2-y~QFcb;%;BR2kyg2KWrBaKwqe%TU z9!c-6%8cQV91T9xUB>6f{O=Y0a(!_r)TsB*EfsbArzp_D+*(Gi@W`nG+*xYG?1qPjg$#0c$mP0GMJR zomjCqqxR^2Zcu-wBPQana3D4}(lFF3T$I$I65IkT?RcVu6c_~{4W)W$>CYLff{n(A zj<9g&pgk0bsaH9J5I%JBV#+pI4ebrpU4CeVQ;JnhcrjE;mAneFQL0wI){08xp4#{P zus$lJnArh3ZD2FgDoW3m)I#ALMTPfzt&rL3hb0()EeS4xyrcd7_y3$owGJw)qRb}R zYEyJSbyeUQR#z)mvdz`ista1;wD#6pDN8HA_&xR2+7+)~mR7agxxQL=?ka`#ye!f< zN^a!7`1avRGS`JTO#6&?pbKa*D==2Z1-8%3_t=fi*4rQ)#n~2s2)y9d)4pl6# zl*{)w62jU^?vxFb7=i~6I&1MXB}KCi%WE2Y(@auM`iqpXNGL{B`;@*~p_$LLq;c^O zGPc4i!Z&jir#^}sEvZXXhKgxJ6h+YJzw}kJ<7p_nM8$LjHX{ktw*PVK8Mnc*wIZPU zGF2(1BwpY@p8z<5hN3QE;@<9;EC9asQZj=r)l@B$E%O&&>1yL-!wR&T4i@gMxG`p? zl5d7t+Awt#xa(I}U3M9Pr*y&QuB6Okmx@QuS#$(4;iiV#qr=Ceh>0W(YDZPhzAdg% zikL_gRlz{Qlbr2a5OYAQPhHw;nve5>Uw+mI8Ng!FE^uD7PS4uxUwgy%F>zPH%_y&s zg7)wV)%(5huM;s+D3QeqZ3E`+Xmpw5)KfgOv`h-R$iBaN3IfdI5%$vKC2E&-d0xYy zD!*Av?~1ri?Y$J%9?~1^G^Db-ZZ$ZHuRzM;iH7$Yb(}9{FTZwzU9;b)3GCZ()X+R~ zs}t_m25sd#0P8{p+pv9_0z*(20|6=!s4^&a{BR*y{!eIW zuNxiL6RXqSAr)_Vkfh_5rIXn+%86NwFF#y77GGanJ_gy`e+=*}D;Ce9{IOW;9yhb? zF_eb|#CK zB$8lmfidkv`RSXh&yQPPFEt9B_t+0ayO#0MIbBRyAWlp$M>&b+I01yWiZ^N*zD$_0 z7zf~?M8+e=njCdf#_?m2q%BNL9c2zZ>|mA7ooQNID*9T(>y&ZuZImLjy72G0MLYyP z$0ZBO0r*Qq7>D{Xie`_SK^G1^^?N$;TDueJY^f@AL2=nF^Jj>B&4+bCw3UogAyCY+kbsBp&R;7Y@^9!k)uA|#su?4Y z*8Y2Zh%3Z&q$w<^PnpD;#NM-6#Vc-$8g>kJ75#$w%crdN54^`dgAlX3y;&SKQBtj)&Ea753!i^8h7O3`z+!a&e1m&`Q$H`0v!RXf22(#TlOtbj&KD=r zu>eylS*K)a#MNRJm)ck@Db3@O&bcQFKc@{+{|4s@-J7N&<=s9kGZi$g zW|;@z`t7r~KqSj#TdAPy>XRA4v!XXw?!kq&zu^wN4s@W*`njs=b9c6!j_Iqa{?lDJ;m^Va zzbyy+mZRSq`R5|}OBw>ySfyqn$<}?0A{&hW&(|yf2kiU+&!x?6ncSW$IVDR4dcDY)1(g5<{3-Tt zs-T}DUkJ-wo7RddI#AN7b&&cjX{#`cr+H-zZTE4VMQq4E$GT$+>s;l}v&^#G@%=aC zTyFKG^8uoPC8xq1DpG$_THV* z{~0q?bF(}ji4Ov0hJ9w~-NPPP$rf&RdyzXjYRE?GMbqcg?=N zBQD%))(^MHB)8dE^TO)~TGYPbD0i_QM|em;1&x5J9imwu&E&HgsXtqy!?x{SStmw| zdtfXN7JJ@!6yD&)87K+P>jP*|`{m6R$|O(AY&=^ib&-=b$6nHPFM`V&hk(zLw^ft` z(L4%D6w{HpsqRl;d6!6m5+9FFcn`A!v?^^U5t$d6-wI2jC|i%{Q}$3k2s&+@1f8M^M<>;{9wLi0OXGC1 zxXS31yx5b{DngwFrt|3Zsse?u8kD9psG=}bJ*kt4&d`^u8+>~P{v%2XJi+;YGWMtd zzo&EcKS+^B$%MbTo#NzuLQoNrkmXM7yk~AP&9MCkm(>5+NhnqzZXk+9oEtg7m@%Ae zd>Xv059&%f38SfgejZ1N;M)03Xl*zt@`yhjBJ*l2FY4G>s&0LAr*Fcy1FElN3Y=T?<%T*^~-= z!u<&e$jgLop{3-YBF}If6-A6G>Y9+pfRz4}R{lClB09XI$}uEJYu}Kn9THfX@V4?^ z4AVGHZ&~{M2Oy^6;xRzM|CXfS!8C|~1XG!g@&(UqEfS*h?L{6hfS0rI6BHIW2VXUP z{MCphilZaK*Ihp=&w!z->P#Fk%-B_S&bJZEvc*SHDhfLVP4#uuCWm`)9aZi1^+jNIL&&Y~AEpB~}&w9?-a1woz5d}YnGm*$$U0uvv+jk5Cs*=G@Y^8F;2@|Y4Yw@H(e{$?ckz2 z#t-VNaFuzM^c#kx9ONee%riM4QP!1dJK248eRtIfr>@8KRl;cwz}TSFJQ2Y}P60QH_Htvcd*cC0*xdTWL9| z;uk7iu{N`Sx@_aDcoW6()ooPxQ^_!ozpxu40+BSCe0q5~H)?0qzPDC4CxVcQv?)@O z%c=)Esa^;Aus!gg3)S_fieo8vaUFuqvvF4WjkphVWk1UjK%xNqNV@1pvTCs%LCc&a zc4D+u{3@}KUp!Vj95RZ?#3 z__Fi2*cLGk_v$&!cWb=#H&I*%^(>z#^&VpEWCd;=WX!XK{u@ye#M|Ywt2;2IZf{Io zGN;o1Iz8!G8-(2LSsmnye7RI+dLQ>Jv?U%&7AsPz%lK=v=Us>i`6}yOq=f{3r$VFEcT%O|wnV1?H8&bo7Ad-8izw?= z_9lf{MfepJL6q}AddXchPDSR9A_ZB_D`^czg~(@_&3VJvor|@3Mo~~%%NGSCX(CC1 zE&1K#9d>|b)36dqb#e^ zUh`>D1!FTu1T?MhC601ZNIWIk;}~v1*Rv?+sUc;hh=+~D3*pZoBnATCMul|OCl%~e z>tN3H>;}C&nxg`PtE(4OZmd;tCAE+we#A#G(4}I-GyCHOi22q zzcoCcIoIj&myBKX6;)>6j9*7x%U}#XN5Q9@pwE>oZjp2)?(C_QzD^*nEDoC#6iqBe zcYzqKU6I>q&zQiGxV;WE=%kdYlvFvX)3Wex3Y`I{=^B)t_E7{{nS!d!s)E`k1CCUW zRN%pbJIRH^5a&2NTXg}?4!Lkz705rD+&DnDplWkIkP^Kt@j+52CfR}!8q4}nA_cHb zDuqsTW+x6Gh{B~R?erQ4{OGM(cx4GuOp zDjHVJjhfE8*hbXI4>>t%q&rQH8v1T+3=bZhh@9M{IeOzM$yxjzRmymkl!B0%aFe1+ z>=fV(CsbvNFrlc#4Jj!p==$?>+!R=|DrX@Nyp_WO6QuEaIN(uzQb;Mr5kyk#Cs2X60h5RvVhl~b_ITEvRp zZ=+_EuLE!UW(mN}8YT+gSJVD-{QTee2)-J(>|5jda;Nd9=BoJ1G-xi09~D`=X&tJn zs+M7}zpAQs|7yBr{skHugodi=s`VFD(;?LV0@S;0I{%cUK>1(Pz3b{W?ho?$_1E#& zCu|9;^T4njl{mKb;u2?hl<)*X)0!7pu76Z>gK+f{iPBKsTz}u(A>US}Mkim7|Mjnv zUw^ILolbdy(KJJ+K=~Kd9_ZUB1fvgJ;i>A2lF3L&Oi_>*{p&PCETzENlj@G~8Y@5e zukNuw1*0}3-*;~g{I7qVD2j4|vPkU1&VWSSc&>T4K=9-yN`f;mFojNLxIo-rsdDlB z_1C5mj6AX7tO@N>#@|zl{t1$ZEoS1g*0)~x@ksj2PtAKI#ZT>tOo!`6RsFMg3PcuZ(xU~Sny_^qnor8o`BF|$?B zjWx4c#QZF|z8BO(bYCLOI3m|eP#G@#?je zbk;9+t+iONdhq6WCQd#oHD)C?y34+jG5(Q7%i8&0M|12h1=h@es6oA>|Erp29q0dj zeAxVd$7XUTlVv>_s+@b3ON_W&d1wOH3^O#1`P~pwN>3!!(VBTVN+uZml>$5le{JH5 z&YsjtLi4b#+%%<^whBV!uM2QY6sc5&@~?lL)TPH?^E77CQK6jvZ7CZkkCI^>)KnZc@<|-oPJi!tj!*ohiR>q|q^SqodB2uLJLgXKk zw(wGYePub~`aVQP#0(Yw^p!L;s|IIO!M^GlD~qGA_*$Ts7zTi)?jEYHuggcY8`@Pm z?Llw#eU=92%YDA0-#f@815TTF_vj+0OGcOCR~=T~gxDo=<*Sc-^@fH^vNY%!#G{gM zXP@=!f1Sd6X9Zx*`mY;y_xwjSO#8V0-^XW{^}ptb!zutZ+D$Zoy6{m2_!FoAdEfC( z3sM~2)MWgX6gevJWI^|{)u#OP9p(&p+J~fukk1xT5`c#Zmhd%59xc5|<2Xtt@3Vlv zmO3p&Q4Aiki4ua-H)#P7n6s$A8oXF!+!aZhKo9?oJUVTvc(l~dpoZsM%1>Q>{Z%4s z19r@1!a>(8!TJFIysD)S(;SRQnNKhnl?j@oC`Mk4>n>4Zp`3;9C7pUpoJ@4fUx1-N%O+ zw`KePOA%zT()tgElsLgHt4;sSy}=t={;R+b$?ji0>RA0NZXK}si`SCHzrxdJ?+>a} zQ_Gfot~R7a2W88cFVqKSmw(t5GZmrYmfutG*GG?5S^wLVueJRvyBYuM;cM5oso}o? z2kn~0a8fb)21;~C9MB^=tRh>qRf+}Ty)*ryG2sEHFBz%evRn)tB@TpYbix{7_?({ z5Kqc>@~Ih`B_jA7Z@Vp4b9`yWGh{g?bW?Qp1e~63Li=)^9qO6Tn;`v{`Yjr#`i`Z^*Y1n6xAVXLh=Vy92v_3HEi4yT$C|< zr}b=;yinVGR>?v4LJk< zeJWOf)Blm1yD4V80`c<-?=FZ1$;zq!B1-qzzvP zs3Mhl@2?5hAz1uc>qV4#OD`IVqwHy%`Zt3wMt&6JptFg~Jn)3yrB^$ni{es}hA7Cn zDR3B*To3-@E)(`%J{aYb_dpxSC5UDMgmx7m!+3&M(JW?tWrPhERr?(lBiGy3$^yg z)u0X0x+yme!SBIGD|=`w4qA!n(7dz6OD(;G=Rpv~r2II8dWbcshwQYdwakA~)|hq6 zS_@7AVV=&GRyO+ZxV9bFw&U8iv1B@~ZO66kkG!_s>(bV;Gyc{#$F=sqI@;~d{Qq@J z@7n)VUDb~Ezx((w``;Dz(ewh?F4_TIc=@fYIm~k2G6pVm0BUR7}^c3l^dJ+pq;lTN`93Ic|+mD)TjIwbO z47unqb7%uodmQ$Norc0DG5$)*XeU=`;ZM7C&a;GFu+u)g=_PNTC7aRJP5-w=w^g8< zcUlFp8EM@NY+I04fo@J(1+j*-r)3leO+?@fWvkh`36~oUGjW5oiLhQBrabrCAJ1ol+VofMX_^~~zwDa*7)6c19hd}!1@2wQ6Wed~kk^}o4)$N4{? zrrJySKg?tN|Gj*c;{Pw3JoVyQRCdqauGs+CD%9@`n9cpQ4uF-%*yV={*}bMtrtjm< zVnnr8TDo4V9^#+D!#Y5Kk;C3|p~xOQ60UpILHWZhYbF@N5J4v4O_?iElKNToa~BJ`kH;Ij^Kt}kpx1jAMZDO zPopG=lF4xtx2q;kV=NMZqAdD0Ps?mY&!1FDLFIX~wM$&dg~J&;a^?80TDAv9z-GZH9g>@$v#DtVC2q zvAeOK3G!A=`#;euPg-!9azZox6qZp$ZAuAS6?b^5>EJ^#_5t{(G$-OESP z|KI-XM<(P$We{A2_<*wLcbWvSmAh`AOn`5bXE?@pm|0+av2g>~g#8s`Y(*U=EXIN0)Ltb@LM7rYc^c_aQ$2=cWLT&8jw(B|5<7HW1~aqD_}MpcpKXwuL;BGE6c`drujHahLArOyqMW8>zbQ}7V< z`6SVSJe|a;hvHN4*CkKZKZ_~;H~Fm7|GBUHSc;t(f09BWHrf%a)BiQtz5m02@EHGd zFCVV|SE_%JR=2u!f@RX=q`LO4n!;lcB_b^lZmjqN*S}4oIZoE!{k9Y})8hp+9FJ4k z`o>>_^DLwCfNwvVmNeJj3llyH0;YnX_@a7Mr+fTW+!7@qdhUho(mSe4^VKWN(-~VL zTVW^?&X#?%wg*csT_*07RjSCHw1jZUusZ%4ycD$aLyas>7vJNBIP?`(S3Jv#MXUAV zgmjapcW^d0>^9c$j!%Arf7xlYuLaVW3OK%`S7XV4wTDlX*s1~CukEVNr#vu<0`=-4 zlpU2tFw6~J)Q2g8b5Fr(k(c-soX*lRDK1elJq4!iM-Oz1(d>v`3Nr&Y_fmPv2D+l@w*kYdx( z7)l`dYj1knwRna)b7i{OrO^-=#$SVHxWM_0%5)Z~#_xV^os<6mSxj|vT*}#K?pJmk zDUGUJ%_bIJrGxU4R)wI20Y48 zF(p8KByp$UR^FDnKTatfr*&f<4IHFxIv3Wa_gys?q~yMP%!Q%vzqKCp|FQS>-)-Ak zqUikWzXDfH@3A`(t#8?$$=q?BwDoK1_}NZ+=k%PFQY0kdm?BvMlA}rT{`R-5ZLAaGo2d#e}mz4{3QQB%9Ee}X(9p& zVc;9$G7I{NVODt%SS1nDZ7x#Y=im3xiWw6+n!!+hJ*OYN45kT2B+0hm^XHR_g2Z2d z&!0OS=H)tyc+e-q8mZSw^J2`P4TE)t$d=06@B<5wl&#}a{1(IP1oY%j;WpjdgYo8M zPhk%*-n>S52h)*-Oyjex%}q%8FQzo{!d=B&q!kwQm=)DO^V*s*=A#ydCO27kF4_4B zGdrRAmNj+AtIv~6nKJ<64a$<3C9v60`Z0@O$8}I?yE$ORiL4_~dHWnZ+b~3y$9`)W z@J1b^-83YExkyOLDg?z+r+ijhF-@fg*0nTCND?H`3Aj1C-1D;qR@aFeG%d*vuXwC2 z`;fYz)9o_Jfc|-}u69IAP5>gT?n{)ZHon7-b|a)DoGGSUuB7}#^%`MyCK*~WBcA$+ z``s$Oww`4kdDtd*XBUVRYFyoN-})F%Ms-VH=RU*5lFaowekdSSxD#-gB?&q7FkT*_ z@O_4TZU4gYU?C13~t@As!>{`cWvG<@R! zkMZRE|4jZCW&%@!p-IlPIv4U_s8H6jb%N~2rY>m8c2&A zM(%LZ0)no%8Sv^juxQLnb50PF{ZB~=5Kb$=I|3Au;)Bik>;(d*Od00iO=}&&O8UEzA9cDkhSRJFE zUPCweHMaQy5csJ-LlGiKI!yUtD7~b*;NsQI`_q>{onP!Vun#K1DF2Ms!F=^Rlx5T*dda}*=8-QDR2Hqv~-r!oD{$5{U|$PW77 zn~ux&pYhZEk4Jf2{$FZb-N$tPDnjhKUB60!d+m;2`4GN{*O!gWePN%k0ymW&UyX$E zn)_b{WoGi92z~ls^51A=-v1g7hfn#xALYsAzdXh_pWucz-#pB>63p7Yfo(y-ohI8e z2Jt69ZGTUzD;v~owv8;dvfaGvTYnXufKU8Hhbit-0$dW3zK@vK-}{uECLZ^Wdg9|E zO9TBQ|H5Ql^*+cPMUW5jkgU?f{5xydetXQsZj{_2DGvn^f^nYlXPreSS~ef^sz#9c zDHMCXbi=~k-U1hQ9sZHb-siLA8CM&KPf(!4XL$yh!jUu6Yl{XeI~ z7X4p-+oAvK#p>w)dX0PP{|%ISh0pyNmHK>1Jd{$e;^WIJ^*g+7^3K%ux#8@}qn!E0 zAtXUT6*Z}#Q*vyPgOSAqq>{Uc8>a3!QvQ@dKYSBM+Y^?l?%tj`HGFX@=l9QJ|M+Kr z8uR~rjvvha)1MB__&>wJQ~bZjd0h4%HRaP|+JB1dPYu*ZyZuMiXdmAGV-s_}u>GgN zP2(GXxmxbN>sJ)1HRd8^RcW9Cj5g5Xb>qu^re)&(xBl{RY`)Z0KZDbM@e6;gwb#b< zzp3+24g3FaVCsK^$@J;|$D=%z{y%*2K9J*&b<=g(;hQk<-NUZ;BrmpnYVQ9{8XvxA zsU;si{$sy4FylY;`@`|m{(p?eCI5+3q>m~3v2>)0)Yl}<>Bl@3WhY5t%rl#|PK;WB z0CoW-Z|n|baIyBYd*xwOfmj;ct0i%4(pbtGmY(oW-=RoEy8dT1cRxMG(}4bqU2*uH zuiA&x|NB!j|M#%pf6D*$D36Q&%j-aVu7P9%ejdWYP^lw?2}tHv)q2m5Lsrwb+%BS& zl-r-@X!qelPMPg0e`YF{LsOCo_Nh4>uE#(A2|NQ za5^#R|EM>3(*GajDc%3P@A0pNN*1TT;-l^GSA5!W_N$eubM&iKxL>e`29DqI&Gmm> zzyImY%eSvzH8?e<*!y!H7}NFhP-n#g3t#@2*m1}}+rLFobbW_Nu+&@o?)>W2&!?|n ztF3k3Ty&HoS8v|lyn5f)O7y1#uRrm6Uhl9!=-3lob7VRe#Ru+;cfoVWHIHo+G5<5a{J(v{LpULkc%RSyqcuJbQg!LqT$JpGkUjVSL1PuGP zuQwfQIS(9|V|)Q!%IJdp_dnwXyl#YU)>i)4V#BH zO}V9{8(FiCzXL5Bp$&{7#+O+#V-0C9>bg91ceL`w94gw#e-9l0qc`afO8$RO z@qZuZ`2z7jOx>~jrLu!QQ^`$T&+ca~&+d1Z7w=Es-u!UFBdQy0r4GrhM{YlX*<=Lc z;E&f$eFtB_!l#V6_MNT=o&R?GznKMSm;GllH2ME%IC%2^f0QTZ|HbCIuLa1u zdkPy+{@G>)%0KR~0~zJ&Sb~fyO>9Bq$&q0V;&1M44=R+B>sObjSEn~`t~86mzjdBW zMrD)HpVDUZ|DSJ%s)@UafxFsR*}a&*w0Y)1Y%`DqiUe}E z=>0QUX};XEOa2ql|6ASrm(MQ$kLhr1`u|O)Px{}ZJeB!heIxs;A4wcH5x4=ADM0{8ZL1Kq;k4Ic7cm51-J)ROZH5PFK11Nq)lU)yeENZe?NR~Y}&zgNIh=vUhy4n|`P?89W%mHjr; z>AEQLj(oZj+yf@j<;W>Ml zOEa|cv+cFW^>^|DER-`4nF6qM;F2e(;nj^}mS_H&B(G6?`@mpDxa;d83A}5Gn20xq zS(*U-d&NXpx=@}EOQ9Mqn2V{@noNvHQE9?snSv~FL-dT8BB4-@UU9v7Bld*>^x&Yy zTHd#>K=p%M9l*%_Xs#OjqS?J!taGGol8WLC$pXhlhXj)A?y#Jq;cMd0A}c9Wk0SCU zp|XOwS0>@C!tgGm-N&hrp*o`L9iZQP*T~ozT>^!E<^WX~LeYor*K{qopd6G`p`7NU z4>0@*g<%Bm{EQRmj=gXELj8AU1xZE?q0s=$llF5!r8YI1Oe0cp_uvgPP^<4$j!QxIB!l+l(^Lq8WAOONYkQhP4KkG^t&yhu=BRtY&8B zTMavI{-;qtg)0#`wInJ0%)P7RQdH6kE@9 zY+J~QN>dA%IPfEQ24yx&07~g*4DzP_XXp_f67h`FlwfzzhXAsa*0#n9>&X?|Ai80# zR2R*GS9HhOMTP>UT#gJoVYSR?{v%sQ#W|jsfsFR+4;>Diezt)v^$dWS zAKbz?Jkeh6?gWr2^UaDXgOZ3Y)deiWez__D@p?6b8LwXCsx6H}lWdG0UF>cj7Yl1= zQzpt>Td>)o#?w>#scrvFH$ki5KXvlI_ssZ@z472F|Hq>|jqSge(g}$0xL;?Hk5*sA z8k}yFbbuC9ts4GD2^&;xt94jvO<2HbtJQshG`FB<=_Y7qs(u*Lu7DCJ1nk4#>?J$h zj$tH|oh@4(<(JAPO(Ybf$t@~Lrb#14tM+0AG^*`!Ma{b8Og{s=7AKoi@swnF+ZiN2 ziW{ElD?=3ZrFOK0(aOWiL+Sd}O__sn=LFnBnA#F8++Y8x5?fp5y4b0%HrB}eAb=SE zl!P$PD9Ln)eAM}ORsXz#e)w~S2z(O|T}w?Z>I#kO5U$;^*B;F)S5QI-sMwk#H9@muSvQp|Qw z_`!~dYx938mOuFUZ*My7oBaRj{P(e*#{6HNseB2JFVE0ijpT9->Vp8NyPY=$CljJ@av^nLXsef^r<)iogZ#)F0XS7ZMA_`qMawK z!Z=t$il-$ZDR!7Nc~9iJFdKiJ_~EyHJf!XUAZqgCf#B|h*^2Uli1K#=yyiYZIwsy5X=UNc$s%8wWFRLu4D#6?Y9 z(40%Wt54Og$#4w=Lrf{|>6~Z3*t;pIg_sB*JC4MR$$<&toH)v#L)qN;I}e&?@Hv{l!y{!TykvJ|hz zoT!0hXNuqE^zA|$lM9Rk7s?c#E9V%Rq@j(MzEX2bvO@yR9POz#X`XdZw^w_`ONHq@ zQ?JEpt>x@l|H#5MQ39zKVobZk&gUH;ubp3S&Mp=20Qvp|+?-wR*-ZFFiDK}U&YI_7 zRtQ=fMTJ7zvfyW*iMkq-xJW{FJV4nhw_0)D$~qT|j|T_&AmuA%2=bM}^X)be+lJu& z5;1i0(*xIM$^Z`pm5N|MlI+Ar+xREPF3~>=YT~}%;i4+)47uglytUWWVy)}YWrrl- z6v|)4A$K%*XtBJ68oZuiC@-%1ImyiL+zVl|Ox^S4Eon_dYEwmTc+)nTQxKD*o_hA> z-b3~i>IXU;Yij>_&o#D2R-j$?KZm9KpMyz%_+Zxy?u9 zaM0~OwQV`3hOd|}#D=+KJL=>Gx2hK3?fcNv_F=bbBN|@!d0Za7VZPnmp7@T;4?VCS z!B~fNpl(wZ{9<1kWiAps-!rhB*38XY-V2f4Vw*Mxyk(T5iTg-sAhnZB&A8Q^l5w{VM%j(-Aklwsm_a#sL8 zh;96z;n_+5<<(_;$Vk86B=MtocF_OPbXvOqH61+J{~zVCQSdy{1E26tVe(djdGK$b z9HvFA5=9*P_`vsrs?5)icbny-yiUb!{~`QPx(DwQkj;G@CDc}+#+eAXHNG{R^AT7_-3j?Mrj?T4$m{$`I56`fzlUXpK~8x=zzN! zI$>6+RB8+<#yaiSaJ0#=xgeM8m+#)#D<4=Ch-c#DfN$SrlH5{=QIg!QQ_$J;JD`&X zapSlORRYx`=?>3b2 zqwbk~K?2Ifcq9jPM4Fsvbf^WKisdD=ceWSIouGU-h$hjEG+J*(H?^ZF-4^3GM6x$x zJwI|bl-e7yHFIgRx9Re0{#8)Xj!Vndg4*RBQ|GNrJ&EouQ)&!51Kfc;KU;38GFB;@ zPH7!9=T=!12Gz9yc~&9?j?I+jA-*({Xag+#uSS%>r zjTm0D^170bCxN4_P6+J{I|FRI^AxUaoWbo2cBs+ z%(@>xg7W1w_28lrTjHnix^E7NaL#r}guOs;5IZ8+DRA&3+;T*G0wlR68HyK0egTcK zP>8p1TLm#g8=t_sAU{4vbn>U?OFzx{f2;6MJLA9i$CFb2@2C8)kMqa?)j%r0^PddC z4Fr^&9?pHC^3oYca}@Xl0)$1-vULVS_u-F0qZNnO8obQn^}A0==W30~O9<1mB;6`j zvx2Kh|5@G(3hPbEBz}#-{Rp@GbYGt3?(9*~SneFHj`V$+K@4M3c>i}*l~MlS_%!LH zb}+K1PXj0J;1+H{qD@0J;uW6oheIXkD7~Z0Ea&|;W>jEw7p6GVYK|&}+5O>g)esuqP-4>u!_cZDG>Yb^Tly*JYzTBw_AmiSmA@~BthtW^dEJ-s&g_pwa z$K37A=*5jjrN)sf2F0((b_B^m@xr47iANIG?b{fxHZVI&Rw)bk_wRkLf84QH<91@y z(?dCk9?T%|wI;2qCMWny7~JN_z=XHAZHA5_x@gxp>#a8=EiB(bH3o&3e73d)NPUtp z+dmEHzqnA)+yc0Z{`boEzftcg{?DU4s{AMJD>oDUH7LXL#%$}(0|J0`e{pTy`;p4xIrc+b??+?aL z{vVI>Fgo?>L+Xnh+w3YwGUwr2=)610lS)_=R{wS1Op1OKG?avV7CjTBl5V-Jk(<*i7Fnp=paX?9+ot>XYphU`zYx?a!c=mY3< zJ9a62?~Fyv0e;?t`8tZW;J39Op*fus_?fDSmlzP0ONq!4mWyczfq_kZ}&cfruQ=SgZ#2 z4vAdwGYHn0_7el2bzbzgddU<{Ldvp0S5~d?zw?JkVMzfh(`KQW0a#$&|tZvqGwx@MF<}NwrYHbKiGw&<@wE5hNOLCfMVB7{1J+YT5HK1220>Lw{bsa|C z+hw_m$oC+xR&OT)u@jXgPU)eL9qICB%UtXkUW!R)JBXu@a}8U8GEjx$h`$TTG=pix z{OkX<13K?J&FPCAl}Xlx$a)$C$vP&KBv1-cJrb-y)Fu7~dsXh}r#d2tycF!46>x;}FIHVmDJH7!Sq&VAhnXRx=nPe6I!> zgj#Kh{dcd{1PrsiT85hj`(MU`d|>hapR5omG(KL_41m6(qYjJOt2HJJ6I468%MgKPuhix= zP`OW_2Rg;o3fUX2C7a~2$KV`(16VXv=>yqlXmna~4NR^_L z$SITG*DE!n04&@bEugvJ%qLl?RNTmvee&ZtVYp=jv$t$*!Pb*}KK1e%szsXz4!m+B zx`tBzs)SAcx)vf8*)l5NyKt!hu8qdXpOvv#YSsi_fkUM-=*S}+9gUGcvtqHRX)Bx3!pk(2ssTG^I4 zvi0CI5*3yWou^E*dVGS}&J5(aW5^Fi2DiSOTYqOYN4KjD0C~PIY)p6qkI zeOGSlp~$TR^23o@(SVK2I@)eQVwFaklUKP>4AQE-{^C>nVC1w6??FhZ0Ba$m2%E^ z=ep^Q37N%o6`(t&8+DD^EPKnP1n~+7e#Evz36`?f8OE@`fdH@5G=eJ_6F>SsOV%j{ zBmwN~YRMzJ$a|VP3t}nZMTL_WfU*lPo*XITW{Yc~mngo5aPz(E+ag_;zsX*wYeJ_j z>%y48j83yM0?{0bts`*Ebee?M#$;QtVjtLxwor`Kdzz;74NH_q2ertj!UCk(LM{s0 zurH?$^m|~?1A}td`Sx98m!`kJe7kF>$zrw@Ao@2Nfqrl5>|2nmW+>*KA>2CbN0DP~ zOSZ4BX1q>|6&ECN;1hj`Ym=^^Pw8pJo-MBp&?$GWqxPd)k_?4=M8S<@TvpADkz~Ze zGHS3W6})yZU}IB%P^qyP{cgEY7b0=CDGQMj!3x|eF*47Pr*JZyZ4NAR$pEUB?u_6D z_7puoo_n5}EQx_=XF!VyU`02}Ee+Z(i9wAuG1#>z2KQYR1J_E>gdQV*4F^?H8mm@^ z5OP=gMMUHaU@U`{uqISIo?HOa$7eQr<)*HzG6TNH=q%%)I8gVD>Vp!Q4mPG5k2Z!n_N zGN+MNC~7F#eAF+v$nT&cLRrzfpH_BUd~M(7v~_QHQp18{$HA{eQ~EF( zw&aIlCx=p2TW#C8WUiK!hnT4>;cq~?yP{PZ!OM4N9cx!XhcI{FPPz%o>%$4}hszz{ zmI)@8K3VD!zC8@dCCpZcWlF@?43-0sUbM5TZiyPp9#l3`bkkYB)jrkdjb~6li+r@Y zk?w4dIf1o1TH+Hs`o?j!qhpr9>a}|K@#(hbKh;yq|1)=kIDAj_g0vtAwY))h_uuQ;TPBnW|A zAv_<5rHZ)Ng)l4L0W7a>uuSe^(7giV$#@?AGx%S<{J+={PUGyWWhz>Dg=if7l>7DtSmWx&z-o2hWx% zGeMdQT*c4q$`h8B%VwI%ZMJv7~H)sL;3ukp&-=r~zD>g~q^Amk`UA9i0PC6$_Ytu|-tF>yw`kt1Ki+#rHnf_6{C;*g7 zSbF~?+`68o@}Ia84zmXLfU4!cet$eM<39}t{ipbUkMexvchYXCT<4=0is~TK@C?kO>u1W3I!kAjWiyGb-?-5^-8N*M32U)|gj&gJ(N zqp48L9pJvddh_KX;isXg{s3BNldGN zlCXX~d4Kil^yT|E7q9>8{neW{#$0v!9lN`t$gI9!c6%x{aq;f_<@xFRcjwpV-@bnJ z{^hH8=V!03jdnH(3X7%`;%Y#7d3FBo)z$m6)63Iu&tIS4oR=W^QDo_J4(H~t&Y8OT zYdK1z&Nt$XMNzqZ4xVjz4hKy!$h}9N-5MXbqbmKfDXAj*!KJR#=%$?v{k9IX5l%NoE}f_BN%QHzU;1$!Sq3IshX7gsvJVu^eCFuO+g z&BPQU`E^Gfrh%y!vX6F%@+jB__PZ=u8K4#JB#IU+YGNYW%=gUSDoML}134f8xC)|~ z4!ZP0?kx*84@_tlspXmK2W>+pN%N6EtL$B|MZ}~VklpI9jbzB}0=LhVEuiczC7HLX z*NdbdW|y>4lqqS$w%^IQtk(lt^2D47u}FC~zaQcD3eHvZs_##fxyjopMx?>uJJTGa zcx0kIS6$k5YgKjQh>C$sj%##WeZQ;YYT2e8*Xr)>xJeeBTky!e$V*FBEEE`Tn4_S+ zNR&GXnsHuy662M>w9TR}C#|?;Wg8F-9F(;W5vr$Kl?K)Pe-pbC^sUz1) z&>XSoX!q-lx28QpYn-`l$w?@Mye}*v!ZFhmQMv5O7n5nqf%6L}sv)@mCU}p{%B-~F z(!;7coh379?{)6idic#A;K5_~S>a8#h8L&T;QH+J^(!D_9EE`S=g0Ge50aKFpTSV> zy$3Wmr{beLwd=4rrp(c|B;tO`kJVUF)g7z=lzY_{uN=og_OqjB?GKIqn8xR(_TOcK zN$Qhe`C#_nUVl6`&;N&mr~IFf^E~qT|IM41Z%#l6BS;_!li(I+AV^kef+2s)LTSbU z1nB=#)d9#eEr3WJ=Yf2A>IUch_3wVvO|ms?bbh=K@D>Lo0^K_>#~z9kg63Oq<$rj; z#xQ$-M~4ORi}7GII6BIYIXf`Rk_=!-*eSE9);R$G`+x5QDf0o~7vuh*CPZ=8`T-nL zTpzA+#)ibFxGSgFfE6XdErq3*a)4|P&dMLV+7YPQ={;36pdY$xoOR^~OFe5H`tpxS z^0lWa{ZEsyaRk5}=YPFH&!qqT>2&x+{~zPw=YM-QOBNoDQ&z;Nu>1Va+pBc|m?ohb z|4%d8<)?H!1wWIf%y*T?7UjEDmS`UcwXZTE4IqNoB6g_7y`v zqYPejg1@yM>XzGL*bqPNe+X#rF)ORQI03)>{Q;X&hfn1#{;PQ-%Aee+>RR4KjzyZ# z!hT|Yu5oU;$ov3a!VEE5k;EaZq?Gu+RKT(RDf!LaCUWJoN>eX6%sNO<6%0jgu3Ot3 zVHpu86uKj2DD!iC&UFLpwikLsfeKaOepddf-OAL=hVq8v@`*n*USbb z=2gLW3@1Sc*U){}!jLH_zKb_l3%J*baB0>i*n9XHtUSrD>UlAd*3ZqS(*~yAcCC3v zVIEJ2w}k{+v{PGqIE|2xxfrPYyua2JCn3z!bbkK4r~bY_bbrp&X|{Le-}i?~k~E2u z#r8VQpdX$kF(#Rhgaf|w<3qF?!K?_ir~GUP`%hpO`)7HY+y64sGzZA8^PlOcl>dJ? zeaip&C=WaTxn%K2a)Y1DbEg^nYMA@jDYp_=Fpp#u>EWI1*WZoYgZbSjJ!PQIv{Mm> zMMO}kV92bb#*0gZISif$Lm z=E@6yQ@(b7xVgFPFn`_h`)k{Wn=@9Pdx40zC*bDnvgEB&e5D;Pcc>gb#|>0to(3Cr z{k?1dH>Us0Eu`}~|Nkftr~hnH0l!Oyk{CqE0tNM`zHk%D@7t#t zTKU;l=EWDItn~FD&>*S*3}5jEnB_ zVnyHfxigaZ%1@7Kji@8jVj2B7IIwQwXAHYH+mz=uW>hCn%O{uvD{>*&A^lqmU%)3; zC4an7iMtxjsjbP+osJ^Z_duzlIA>yuNxLp5n&g4j%oM=<8%|+h^Aa6sJl42NSNM7w zOF)}=mCu`9V)v%?0(lYmn^vlG`u65cr&QR2IkokI;@es=QX)GbGUi|1UCoqWyeto1 zazLdGgVmW|=m&d0J4-^+?;$zq*k;WvEv1Q+c~5-3>By0#{0@ETnw|>)4wjG#JOv2W zStkT1w%Hg+kX|RjZS^QBQL4?kBA!@U%W=TO88HBB<(;Ex4n5rs*S3@-ROTDtM=xRI zZ}Vd;Wg6)=_AG@!HCiQjDsrwfc(cqPUM5jkhHaLp37DW2OxDENW&L|ips9YEXTsDz z+acD}BkX@Z4F7K`|EZ2tb)~=^^50$gV|fAjt0@#dfGkP<1v5AEg67*DP+i2;Wb7YzC*RkS*}D%OH-UCl z$sLbUtcFcM^2@2()JPd)6Od9!a;=uFKzSvxjm3%<`>M2P=y&JBk!_l?IIHDcH|4Lp zrm140p3V>+=4r?On;C$1@c+?xYUckROb1W*KOW^__MhGSzm_d1Km9fA*ODNroZc+} ziNzO69ex8& zqdR|#L7Kri%zz&Qy*QfZ7ilmgdG;@}n=h)G?3xynuGxtNLLTexac1@lc5nPp+s8Y7eDC5f|y00-$>``M@ob4TygA>H&xl+kE z@DLp`1W{MpCW7Zl#;uA~9okvLCX^OeS7l}Lt`JMO(Jr8W<}TuSi~1pjw2v8k3v}Qr zCEJ%M)AyHrtA$_HB|R0?3WjK1vJ@7Fc{#WaFWIq3&($qp^xyC`S|RgP&)P^{*wzmF zDa)Q1!?jp6M`cVVS$V&3Z01*^I|r^J{8DpAOL6lonf(I>BqwQkP?CHVD+SnD9^}{i zR8q|JG`iH~GS(U|061F~F)frg&p=5fs~mKG0LXvy^;wXA1+vvj%u&N@@xL#2)zu}> z^12bc<)nX2J$`Q$S0i;;Y)d2S6L|Kj&Z<>i)G_Ks3Ms5K4led;i8NCQ!lPkGm zeHffH|6DmbS?VT_W)A@EP6eWNkA$BiXaq*OwyA}=G;+-k7Hqyqwr~yk2DwNG@WIB9 zPzXw0*k`BL7RjQX!|BuE`@!uck zvE2WbaT_r3sRSP;E0Fpa-z8bdtWYq<>x^m(MD7d>{2)s(2J19rs|JRMU@2F!rRCHg zv}+_{ZFxv6F7;e_L5T@vXSpP{>3+TG6gLPMG4BWv9U#w16}NH;UR5W$-90}=@9031 z_ylbFd$%YKPXND!xVM7D4}IcOI?1!hDo2}!2q?46T5ck7rX|`BG8ke$s&JNOaD$RH z_mfJJ+jR;$n|=p$cn6H};nWX`K{7xcNm8DLvr8XiaY8O%W=TTy*L*lq@KkzG9GnYC zFTg(FI+jw*qxJJHbmh|MfCKOe%qF7{21+ugqWwC+XyGb|W}}RcH0z@VM{BPpuu>l- zMb{$K6ey%yh+QeTSg*jiXGe{-kae^YFvARt13grZdtgOtwwf9XUT2ZOMSk4+TXb@G z`1R)G>&<_Dz3GZpPKLwYgqhsU4JQ75i($qC`iM^Jd(~0vrBD2sk0FrrUmE2)i{b?1 zX1)AB7)PrlgfB!$iAV2s8u=(rlZ;S8W^|p=GS*W!L92x8g4rD0Kf+mHKw_`(ZxO%Z z$#8600}q2G+E#b9rE_WN1pn{|9T326T@atXU?;eU{3i8(Tf@DN)--1VQa+!TIYHW2 zNCbzNlc?Qbt^|?DK`B(DE--JMMWDl0B?ZxFLAGdvuKdSnhwfZUJ2f_K%f=i7d+-K> zWR*scK)tQsk>oe)KHZdh*S{3GQu<|6=l+x@QO)%~dDZ(oMx@>`(60L*gNfiFM z$>Cd0j*72c+IkTZtfK`8mxau@V0u_Evm6f%)^WuK`y=MAvZt+D#{@+nUA#v)gMPRL z-M7FxZspIM_<#Nkx=Vh1z$f(c=YIoX0&oOj3I>4wh+)T;uH$@uk&w#_Vi=SEF;w=C z``m~A*EIm{vi}W7X8f;lZ}@co<58YJmi4}XWT>@+1-(!_@`B-VlGvLzZww=b24Ls$)a znxf(;BWr0@vjIz0Q2ADC0IH!`&77WgE!8!yJxpsZ6B}IW3As`=PSVMQ2WB!Ia69rUgYsnI=zm84EFz=pgx##$iP-9aC(6qN>&+K8@0;P zWR<$KL*HT0R6fmLOor2AjYTVH-ocpj341t+Uu=bk5%w#A)ex^)eF3JWP|cCqObAxG z-57pd(f2-WxCCChk{-Mvmzdk2u_qzxf7(+={#z3i;luYLfF)`g{%M!|H<=8|@&BIU zKRwRF?*DJl>V)3`K@p_X{Kbl*C0N1}ei@8KvfI0YWSzyp2RNA%5GNr#mGMoBydis* zoEyr@p|!9_0pwwnZsE2AI^Vr{(<$O3?Xwtpoo`RCI`sd4?T83TE-BK{LYJk`fOD8- zFnqbrP`tS2Sujw%IA6p`{`%Di7_8Yf@;v~$;({KG11L{sS3U`ruRf$1E<({;5=4d^I@KpqPK|1i2Sn-DbIIrP25?!ZE^?EVo6RwU!&8;JTCn# zyw^NZ0AF?*SexpFuzFO(QvfO#h2%9SwqBY*@mN<$w3YaFL#Q!1vJ0__4e56Te&_kBD zEQT@3=K_8png0`Aw6CS2DU+2LU)b$A0zZ)ao^p+OQo4{U+<7N76|w`o;zM4x)Cr{u z8`A+OceFieF0f8FwcL121=k~Y=VY5V$uDP?F79&O-CJqs6<9n_^!a`dlx{5Nx1Coh z*(yjoFpK6Qx1Xlo?Ro~Y7!rs*lpN-jPWWxh0>P!`tg*T5S+vWOV)jVn6cC{~Y)OqB z4ad?Rq0voB&ji*imWvW(8K(S4N^W(8$OKUh`PjqlMvbfeKD)7Cdylspn={z1eb+tQ zo+~8@ueIUszuhdGt>sp$z0r&&%bTp>7OS(tDz?;v?WV^OHF!%8AZaMP@ZkgvWlQgp zGag(2YoPx#SIwrn|G(6T|2OHI{@?x4X#AxAKgLr}|5s@PSwfIzR2kyVyFieV(gqOg zh5ge3`yzuo`+1clL^;X!$0P4%?bjbw~%wd!dF{H!0_@`)dbIZ z1>!G^QuNIyK$2?~B0n!#1c5nW%)@Aj0jks-DDn!dfi~&ek~ym2O`w<9)lW?yt?p_L^R=tz zzxT}6dm8M2Op=UUacfEdcFF(4QAz%%#h>>7BRtLJf0ch<^CbaTdU_i#mTQJ3R4Ev+ z5;@DR2B?AP3S|IP@>!#;JWKKu=I zx*ffU9xPPCeE~Xu>-??Lu~--wl{P5?bNXfj)Fag)YMb3swn) z9H;wu9GIr!za+NGZHv*D zGTGTm*%7e=6;)L~TH;>HTrYMo2C5F+1ulA@{drjN@A5R@|0InzA`xse31FA}Kk1d?e-HXk^8ceejrc!RU@;GixrRJawaCs` zsN~+>TkJ33iA@?PRuET)3xR;Wwu=JnRc&Rv+=M|8>F~7VmwYhBNeoFN`9&VN0Bej{ zy~@5P&v$q%h68);Kac}ugZ+Q!XEBNw%`E^s_J6-O9GUySHyAwa|HpV5?Ejzn`~!cM ztcfsPXGs(>6Slvo+W7g>5#?|EMTPnQDoIGy9=AeMg>-gAY+8UnfebF-hwo4vf=)O4 z+uy=}ef9}2{lR#0!oz3(e0p_pe)0VYxGF{kLP)rkdjI1`pqidV92g$(<={C;nP@}X z7NimJIQ}F{;zhIt8Km8(L@5L$0sbaIVHt}UAa?wkCE=Rq;)L-AWl6k(G4b~P6~*%e zED1^R$>Cv`1lXG)68kIU1b&}22px? z9__Kye{Tt+6=HrL575SL`>$dD>5s=x=f98hd<8CjLSPm%>nfjeaJPgpn5|J1QmT~t z!7V$%*!v2wn}QVF-0fMp6xVpfxO38XLs5sIO==e@jse@&7M?tKN$*ct`z&aOd-GQ8(45IJQ3 z=iT4)X8)ZXvj58$%f%u6pZtk8@nHdI<_EXyl<_{i_l<||(!FoInSZI@%y|2JKKV$dd&R@R5dtRC)|9}D6^H2!=LtZ>f{;}t6aFB%X@XtU%?fd`ihtrGi zU%h_wy|)VQ-$wQRpH2s6{_p;HFnWsr_bAU-;B4u~3m7Gff1hRlvA4JP?>_TQcp;>% z?y=YR2A%)-_e1|b_P+Y+EAWf@{_p!z7Fi&&T+f&kLb5d!>&Z`3wy07+gNI7RzUO%= zoCB~=W&Un&*zHXZ_Gm-2XLPsjeIu?FgOHyV^ZUsWh?BUx^8b-!VE>n|2EEawR%Z~# zYlshN`GbQ!$9VgW@%Gz}x2KP{ua0*j$NL@h2_3EecCw=NI1t zPK?1%$p!+PtRU40x*I>kAXyWPLI{#MeFw0}-p>%xuh+{Q5&fPW5xn0POz;n_Q86e` z!68-QVvat5o4zjaA7ddk`+f@23I~}dhBVM zVveicxEZc`;|g5aXeIy98drS-R|UBobO%Rm$YuZdsL}eMoNC?G56Im zkB#*aBv}RnLKg)m4=lftNjliLC!=QLo{TESZKDwUL(6ebN^{*)$2}_1$|wnLt%Id| zA;=(I2=p_jr6@)u*Zc)O>P=CBkG>Nh6W2PJv|a}jV;xNNbucjTaf+Ei<>s#}FfqUM zz)iAju)~IvKXgz2#5MVo){{T>M#f;Z$?uosgfImDnj{g5Z|SI$lv01H#>I;aV$8=p zs7H75F%JgLF^|2GeavI89%5}{9%^GAdn0Ac{ZT98c68i`pwsddV|FmVackx`HkjX7 zVSa;dzt?We(?;?yEnhKa2NN5&W@2N5u#Gh))@#SajwX$SURu6l%nsr;ZcV(#2Jsqe z#H*d2(?6Otl5lDHgM+%T#|`(*xN6@x=;OFGeH?jX1D`5=EEI`m_#8D{LnF3^%7i#( z+!gr|KygCQd@J-9j@V|5=VWpXPja9@B+aY$?kRT1+1Zm`A zJfqf(XJjy*k-~WT-C@7+n8gQnhQr1`Xt+@a4po$Q);0dNOlV{c4^$F-~5)^iR<)-5}0pDM~1qcHlW3-@38pBAx z;a2Or$@R#^qDHM*)W~2_BZWov71_JdE|?xQ+Xd63s$JkheOu?Ow-3so|MTUp1$?(u1!$XY>_mA6+dDL*sqpC4G2<@;np&c58cBm2B zwqqVNV=mKyBFAy+#>6-u*5_HzDi(}`st;RJ^+9Qqs8qdgrRv|mJ!kV3Lvoj7w>-TNA8a$z zI4#dKDENUH*3=YEl>gC&7}#FJ1=w>-Hv`wE8?@eZ17p(-^i5a7A-~}fZRvtvr+~${ z==#|rKmHekZn$uI?u9dOZI(gn%`z}H%Rt{O1A_pBNw8kQnD8quNk;sLN-=Y^So!=& zisd{*1f+h3A#?epYmAp+2$}SoncF6Px4CWL+DU`fJE>nnNY9QCWhdR-{MU1Eee?4C zf}!C2@;iTp=)%y}LBl=Oa~~(z&mZ}Rmc#CO6K&Z2^02L4>3I`-S9)GOvEJ4dT|(`7 z6SXVtjDM4(W`>)|k=t<7a|yG(*1~Mh5N3OtFxz&_(`mCYPp1`Qb_lb**1~Mh5N3Ot zFk5@f7TW@Qbs%uijQmcfZt~l63Aer0!fnss+dWOV?HyZAd81^(v@Y&WPlq^ZIK)ZS z5FKo_*P5;N47S?S*lMqx(O@!aIOb8+m>pcT*P5&L3?|akxN1vt;iQ@W4lQ3XW(Nmp z?YnX84W`DJ1qY$*qdPdZF;2-Ksfge|2N{f$4aEb4PS7lZ&qXj8d6}GJV$hJV4V;9H zcH4>x`k^%@G+s&}shDV|fK2)g8Cc)Rz-R|uV{XZ`kG;Xz81qCObIV=cYdFunY3-Ao zal;ePvHJv+4&H^&mIA@CHy9cC9IN?3(0EcsE9?RQ{m^>M17plXb<9T=1B~?A2xmMa2qm68djubEvqP2f#CfPfJLej2 zOKITP8}yCw4y@y?JI7`Dh@&FcyT%ROcgAk_9ol&pK3Yl&$KIf4;G?hNqn)HM9yT2F zuxiY9Nr8T7JLdkeF=ka#=(n@nkNeFe!g1dz5z-Di#$5A!&Nk*Fea!u1>zKttmVyy; z$PCe(xoHxXEfTD==r5S|MCm}7 zOAp*(>$eu^`i4l?S4Fy>Nv27*6&DwMfFX;D4-4sbktOStO<gs7U5uWgWq5Y<hj zvWFgUWjzR1TmodxQ$`n73`L@^3X#mjX77$mv}-Nd8G_xh*$sVinv4A3Q? zaA2N$_|cue#lpkVr;@b4g5olpxWbdnK>#z-#Ue~}5=*3TR5Uwu9=Y#$96L_Jj@urD z9eak^YowyWR4us6w2&sG0vMtA7CO~Gm(i-d%}Vd@Q0=eNVxh0i;ZZY3yWx@3(eBuB zW_8^5$m-Z+Ed%QS#e@igZU)=~3&<{5#v#mLsNBEfqi-f@533BZPNAdi=nachUmd;E zIAcz4GjE5X`|{+mrhFgytw8D- zAwKkmC(c9niSvyp;tn~}d3eY(6fXdZ0fyNI1xi{5#|Z3` zchq+BjH|v!`s9@_0Oq|9)|e!#;vA6&sitf~j0AgP`Wh0Zsgp3dZvD2t^lRMtomNku zbVX;&R`o~c&R9SBDOmb(7>NlLEQR5q;jOWu`_`E225{>Oz!Tj&XzEx1IeAj`@$vz* z?z_fi2cU*lPG}w6TpB1AQd62GGpf@?{+3~Y zpcPEk{6PK=`nNCxc#8>KIsA7g4q<50Rv4P-!q7w$hTO+P2KN~^e&a_tiMpo%_~T z?u{Gw6O9V@-GLV{B=YQ*AKz?}XuX0#)ZHa zT?wCPlvu%oLT;tLB9FHsf9q0P#txNw+*YL?>ninFQ>iW2=$X|QtW&^ZfO}hi#og_O z4OPh@Qzc#NyrGIdmIocrp+Xk!PF_KxI$92j!0nyq!??A+!9ORnrp_}{9+MLK}1#O z=bB6{L~V9>CUYw=WE?dk3WK8xqF`tGtwU89kt)U-)3+dl-INPMmIKz0fFB_rW61eF zGa=+bhn5;{I3AiYg~5^2ZtIFM(K^J$$izd>iU+xKQA}8zW??shm+#K_^wVG4A1-yo zsEFX<{5U!qQa|?vao2t7*4L?rhA-1-2R=^2P)@%vJFr~2J_bH`o%rFme&oji%)lwd zix_@05pdwPlnz~vO~clXO+&-6X{b6j^}D^A_QJuWnL%_gaT-L2E_bJ4OLr$$b7~Co zNF8L&1E)bl*UW+2HFN0laT>PvaT*#vPD9nlNgbqgQ7hCL5Qhn2N0EKDyQ#1d#yCm2 ziB!1)I+!#Qiv|;?;yQGBMGaefMGXzFsG;f=)$0zN+PR1@e^`hlCoFJ8PrA5;XaO;y z7@ACn)A?w^vC;4Za-jQERNs6W3>$8#Vbzwh%hulu*iyrW>uFfE zp6pWY@V>rTJ!7CFb)Y?CTk#aQ+;U5~rIyNyN$cFPP?3Ha_fT93lNj)HR18B6uiFmX z*KLQoQkka<3>EBHeEu(aNb&BgAVMjIAoVi>2G4;X`YAh`U|}7p?oNLM zGITS;MSt3CzxAgTK1}_F2L*k8P++sr^V#BgG*A+=LkZ#&IA2E*hQv7=c7dOMXgwQ! zV>SlrY?x=!XGyvRdXhA+bPh@q5G+v?0^YQ9Fm{1`*wS~3)igI=-#!>2n^A_Arxlc& ziu1S9ps2LUXHA52B1?9Rg24i9V9bw_`VEg!`tDGToJZf2iP*=YYjbB zRAaaC?cH#RMXjYGLns>7>xN4nXfF=v-5AvChLe-G?S{$6>vhA$FkAA=fjKF?I^A%^ zDQX?2$cR!j&?jZ&?1p_(S_cj?;sy=$NpW|>J}K?P^_bY`)#-*keaTVV^d(2088k@8 zhRYY-8OEnAHhNxP52>P~!_|+TORwv-*6VtPUe{Cfy52E&@O5;>zF&H+m71QR)btdk zW=B`-)6;7$a`$wRyQhfU)jhF`yuEfJudqw>b;+ey$i1{LN6x<31=n6%!L_FguDwEV zrQMh~yI~hxdu;_*BmPyd5L~OfVHYP`2fyl>lQOB-4Z9rFIyRFLnyFXFL9`n#ZNe2F zsbzSie4UQ;z6|U2#YIQjlM%fegL>VtbDGwng^b8Ty@JzJcf&=>?sEmJZ?2Nw?!HWE zmu;(+e`wR2sloR+B&92bbC0~p=HEiVy!K6F1%?E(%bom=c5)Z9tDB1N{_$}m{p|SI zp`J}$YWpJ_f zvykNhW4XZ=kcj+0R+kapl&klxwlAyMGkULX;8Gljczw(7{=K`r5dMOg=T5$ZAWY)F z5O!d&zlG!gBx?eaxk%dS9FmO^Oj`>zQ(dT;nnF!!M6`Yc31s=6+118%yv8uhN5|~< z`Hq7zOID?om?s& zkawnS<(;W6?@SGO$1-XBpkkB8rss~Uzc#^W+Ey@{>VnbK5R4q*Nm(sNH(FW1XvLA< zjd2y)1nu$TI3eu1&})PVU*YWf3IEBrF{MUnmIM%E5l34jY75mn2*=Y#k$sM*j=(-s zhs-!_D>F`YnQ>~!j5Upe$IaXWj=6V$9+erzm6xUYNjyhpGk=U@?vBA)J71+)vSA)h z>@Ntym`^O-A{(BzpScXR-XR&oA43BaXI3c+AM(QtnR@$uRR^ zLwuWIDi~lC!hjBf&qpKokYiUOtEofBnYPt&rn-(ZHFTUZGFilN%1EgsZCPp%xsiE-|(Tde&dId4b)&b!`FW6#dxo;?~R2*arR254(M3U<@ zyU%s(y3RFmWz?Cp&ZskC`6ZOiKT%TZ7--2^RFV-o_Wb(r?Gf(!q`ORny97rQ9eA^V z9>=aI$D)_^k+*fR;8lCt(1*G{({sk`6k{Y1lfrcgagX2QW|2pZU4chL2c4sCKjFvb zpdAygM+jJ_;wHHtG4q1v&n42Nuoy6YK-PW~ZRsN6nZb^mUHCg@_x*nF%=!N_9&u;w zP@tJl`{C8A)0aQJ@>b!4w9)JJdXv$J{oCvH%zyji!Qfx|qd~tv>J5gy$-ngaqse6Y zFQE4zt?zi&nE2Vh^zPl3Ik-Q`^A$K3ml!Ck+S~hX9dj?e2+cA-+cG)hCR@WZ;or8a zz%^o*U_g{Ga}58f)6lSp~%lb>JtL9_&Fd;g!4A;d<p#nU}eQik{Teq7IB7DEE@3HbFtUi4X7=5Fs-R`jJp+xPZ9fh(9M7?C8~f=__C z(tQH&U`Azi@M-T;S9v~Z|Ioh}#Pj^J8XE^g)85_h$6U+`Iwbz5?eL*EgrHU%z?@UY=jQI=gxO zU#!Jzep_{KuL~~O4LT4kVQ|aD^k05kqu{nnw+I1?H3}gv2z5c7y(C*4uKalIM~D9} zt8qt7#{3(yWPFhC<0e#u_TxZ zd@$R<5Ol$fzO;qw?w^b=+3EihMysyS^Y70DD(Qc}HyoDe|D-=2Khgikcqk3yUci*H zblN5&fA-_&adDTxP}DeiATW=TEYKLVn`t?ie-_R6nqkfR0`zd zX9j`gFx>(_-dc5043;osxAUkfNfCyY+54`e&rCou=%VZtpiO?{!OX^&|9@h{R9cJJq=_I37+|`X{D{`?CNcJCQI>{}!RLmK zbp}JQjzgI71;jd3H0lLO$mw=wwyzp9wO&ZkBku>r1`ByjfprBm-YI7A2m**Pn4<{N zl}u`M@Vg}AMn)9Rljk|xCEypjI>RIo%$D-FB*31cNHgx0tg|ko)Ee>bik^1`!VbSu zI(%TqipLWBeF71}Yyth!>301!S$3Xx;v|NhzsnV=AdWvjDDoP(*&u|4Mm|C&!g zJ`W7>RQxCaiqym~D%o4IxCeG(MWuG%VXQD&2 zBRq6jn!x~4T>?5tm)^B&e&Sm0+N%!;v+W|zWW~hOHzo#dq^1Pmhm;+{A*Nx?Am4~F z$!Qh@zX7!yO5~#OeTMyCD~PLy;zb5AuCW*W7>L4(CEKK{u4csLa!WH*pjTVT1Nk*? zQM`DGG9Af>9hJFKn4%S$s}@G?nCo3aJd%RvL!hAFL^^T$rt>)%Zr?s{GkN@+%2%XN#g@!*dFiTcPN7TitLCT&^e*p^m#`f zId@JvhnqA$lyy7BC#np0PC678QyCa1lJyDyn1f*}{!-}Nz6f25{u^@d5{Wjxve>yc zmq?@vPnW>E%L~sv94|j4*BQ6gdD@Aemnc}WMJCr4ttnO9nc%y+0_$o^*aMXI7&a7H zfiD)VydQ>C1m+812Iq85kc^ci32&Y6ET1erwm1uOw6O>2ZWAF%O5L>+o#uprImk7m z33PANBnP6W4@AVid|#<_XCWVj#sgytQFJyiR<<3OM^)vR9~_ue>@1_|0YQF*h5JQJ zTNUG_O=O{*GYuN=a;T*+OJCj9% zB*rXV83Eav8FPO5C4=+77Y7Kp`5yF8!YK4%ki-E@2|mQZ5{Byt#fvW7aI@MWRc9A* zH%-EBoP_Z3E7?}pkHfAX6V#P&1d)zX6vK126dkLJ7pYua1rRS?N6}>xp}^3M&*v8j zx#X%|3FoK03BDsJ1ds|42J}ol^-`cOmO(}_q@J>{YSm4d;EBJ`;ci%Xoxy+Nr9T)? zPDZ`s@$h)$&t^V6?oHwGXx5((=HUPiLO2OV^Fgogk7viz-e^1>4o1VkKZ3LVB%B=u z;cOaI_lC7jdt{R_-)vx(Q8vbuH(EmKnNoo(b_D~nCJ7Gwh>s+n*ngKx_&+GA3q#<8 zACe6HH?12{6$+e+iULldrdBQz)ePibCwHBjl5p5 zgr>pR52yX!us0qDv*~C!>(7Ui(R3cn2D8DqKMf~vKABDje!m|c2jk&rH1vDpNicx^ zQLi_s(JQ%*q$X0iltiI@e6V9d6@Gq>C2%IC&>}9rVsT*tE#;veU3QAGUzQZIEa$AV zZ6Wh2M+UcWn;+i`X7m>h;xD34p59j>K6!=bxb67jRQXEv$563u$_W2fu%S65?{@4Z4}$wEB8OREi{Uv30@Kmo8YRi_8xp$g6#qWZ-4qHhxZJ zZxl*pgi5|wGCkP7;0_1Ow5IivTN|#$BwRx)pf~YL7(oKd)eF!bc*&M11p&|^X1eMU z;nJS7i1qm>I*!3RWqT#aaA?ZayF*? zR`g3uvmdKug*FaF@+KsMBC^EU$vS2yKyR{}yUVSM& zLP!ESXVDrHn0<#bOgaF~nLXzsKl}hp9$?!@EBZ4c%O7}2TP@1ecuzQ66N>z66yIXE zuyH5^4SuDY2Ne_M47VY<$OqL(trfMp;+zM?i$h_6==v$YvP7r4D+(Td#qIr64<<_} zUmu7u+RRZu`6#yc+XFWx@$8yiJd?EI1e_j#o4=lbw>M|t+XHZUdVT%#%MMc`6=?7F09w~|zhbWY2&bCrP@xW#7Ehb4C?;@pFw7o@?%>2lkucL?( zgNM!bAdyAn2zcJw{PuAwankA ziBIeklbpD&ln>5;M1mO!hD z!f>ZKp(xnany~Uw{1*wwQ@iTXPdl{V{HV#UnclHOASyh}==?F?|IpURnk1AV+m`<6 znj{hZrXYq>XX$^!5?>`5dCt9pm~Eb=*{7?N=ljKKZA%9@@B0pYfZ;DK`{OlOdGX2q>Zehm5&z;i`%WPMKJXj^<{wfyWBhLm%P z#x30^QF%!eg3Qh9>s)-vQSdG0(A<0WLT2LUvN@$)B8-i^izn%t)^w%eM=i5UbZTg+ z(U~zKweN=*g?C&G(Mr2-gxoBl34w`s!o!uoY=vUJK$9$l+3q_eB9&j|u*CI{qKI@4 z$=306miU0jXvj-EXV*{T1(lc(oo*uAVM~s;9HBW3wt?v@_4(J5TwIitlS|j3ac(D5 zg*qf{`B_POQa-m8g}ilUGeZQrWs~hCKjwM@x6Lpak#0&sX5U`DzNSUj7%C2%bO0~E zU1k4SO)02K{g}oWrnx6wbnae>$B_Coq^z=D~0}>Gy}TVAKzXqtG7=d%>tT@JC1E z@vaU@6;kN;IVyK3ae8qZB`N{+pi~fbf=W4KlF1lGq7a)CBzTtrrn#PB46X#S&|UA> zHNKL{;%27|Od2t^Da4*IS>uy}e?jrDc+rIgagLKvRrbxzdy#}tB=bi+ev))adT?K) zn0ZR@o^Ugd@S>{Rn{2hSO7jH>vdWFI>}XoBVd+`zawidV(0|eT%blf^bQzV{12M zExQPF7wMMV#on(jJ!_*XV}&Voc{%C!9ACSd>5GM8SdpLRy0KiwJVhH}V6Jvfi8LqIv~u zgthHe2o$k2Af>~z+!)}QcHII5SfCDUKM4IZk)czdZ0pN}R3FJ444nsN(N(eW58B>K za3NfBh*!<{0hIlMySa+6P)FmU`r0bohfdnxi#mQ}(Z_5?KFSw=oHUH#J!9y*=6C7> zo7>c<%d9vstROaL9~}79t7o-?TS{;U&eIjcTQAErvMW^z9YBIcGe1XEaN+dNjUhD} zjb2j|xq@ZKu*j?*x-u#GV@Y^sYE-#mxwzVy7pts6ikB=n};-$ZbsBL+fq(m>%l z!E+kO^^H@OsH}0?y|wUyNk%tm6dWAQ%OtI^rK&EpDRDL@GC>`QIg!L5rm~n_(tdN9 zz%3#P(Q}LS2~0^zG+D-R10}4S98ah`u)LG3fdC~&dm~iTz}@`IscS;sD7#6(lK<0S zOJGu(6qdwEON~LH$6~~n(^=&!){@JLF*rF) zsWXP_7sfMKRAm4@qlpD>YuxOFylp`xVlf1IGIIqh;iH>EDP-J8zmM?8GbPIjx_)mRZ(Aj zZ7hl)!kv~x!-SJ;Y$fP%xR$_$BWR{}HXrF~70lS@M5YyiOvRO~q~^8r;JI1fHcEMCRQVg|^=OqnH552P6^dHPjq2dV{Jo0F>6 zA?BmzRI4cz`91hRmuJ#D9W52$R`m&@NUx=A1CbYOrzI1DbQ&IIXyC z;UkUr)}`2A-Y2s5&OHq@;5EF31oxP)n*iM2p0Atc>6hO(6m!K^(yc%9ZHV$OI5ut6 z$bE>G1#1t`sv&neJ#X-R-~$_<;S_B8)ptlH7D*d$G?R=Wc-0_r7cv#`d#!K4E2L>z zfsoR+<|L%c%6kIs*QQEj40-R!oTY0oA8#0C^F_qb^UD|Sno|sGBwQ@5c}C_Zw%rW+ zP8mlv$r;X&cuQSXv#`SMs^sMKPol#xtFANzfyov9lSmm~f-LeF%qJ)!7;=r=iY@>Q z4+VX(W=pus;M%DNfms>C!GI7_wNfowmMFeGaP?nJ<_G3sdb@#k;Bpbw@p+ zZUj-EY$vX8s=&0qin*)AefpDE3;L8hK3zJs)hF2R=`#6BX1o&isdoLngNzRt8N6WO zi>*i$6|fK*EwT9io){ArvA4U!Ka}3OJFwMpHTlbn_-mnPd*^5UVMBkr0Ca2V zB;}oZ?;+3HJId!c3ua!!gY;|md+@^zC#m{wXJCSIc{p{^Lsbihv~+q@j7&@C z=u4Y3t#!1sYFXoJw?S+_cRPz!wX5AGmpgdd<*#mMTg9r3-_+@~x-H)TI1R#nzjN9> z^@oFDI6OTg!{IQT_NSpgBE8O_*Xa#AolY3yDaIqef7YA!I)jnlA5G85^sKX8D&u9B zQU)`-E|lg%-d^dlC@@YGd0=KH_GAcjSD=>4T~m38%cu$0u-M@mEW`X0?9OuLgUhGc z*sb4Vx*`eTyeUqE6#fEy>gA#-WzhF#@TH}TyCi$7pF{bov09|l(zp8+M_E{2s666J zt0GlCUzE>4bx}RG);UEr)iE%yVz(7DT>9`ADp5seGv>`}dr}X;=$Gs3v3gT`9BC94 z7z5&YTl{ln0`X6*;4S@56<5A-ak`m81D;2e$OPS@uX%3qDx=dCnyaNf>ZDsE3DHFM z%{kyxOjJ%TNqxrRkZW2x9$zij8&s?6vFTjmU0;kv`*Gu10?h}-06slonX=xRoBC4U zm;vl+p-U2Cy361+lny&O4cXH0%o*-9KJ%Ko8{u(BXwLS)L$ugt2OFcCWGk!kAfr?* zuC6A!QjfQcP(|gi<5LkWjZV#Mr?JTk6{w){sN+&IJ@BZsTk2qAvPiU|5(giTfSO*f ze;O?K8tv02w5RS_gpMz1o&^qf(L2?P+ZdLalr_$7%L1M43_8RghCvv1!hYb7rcpHN zje^rbKzdPcaMquW2=P0o-DnsNd;QbSXxNW1?siYl`dwTR+OZ*!RyWfrc8*(Z)j1o7V6~~2Z6c$Oi4)V zR58lykLB?GBc8}p!r3wnO2~l#g2}z}zr0|v^v=DW@B4GF;YstHckT^eQ}0W|Q{MPi z$xgA{ng5P@Uka8J%~QMbbJUigo7@pSEJZa(Mb`nejE!VAfc%(gAguINa;cdO{#eG) zf-RP@TyIo)gL9xZN!SA=#}<02;K!tmHG`mR3vp8HOe6`?^+E+mshzbU{W9RT63_v_ zv1Ua%Rfsk?Sx;HGmdtf8TG#ptn?9nk+Cw#-<3_KJZ{EC8hO?V@FRuREJMR{HW~{>e zZ#YTOn^)+$c;N(*WYt{Z6lnmLcwJypZSMoGka0>^G$yy?Cm!G!hPkq(H9Q+*QVgFm zSY^Xo==VeOn!X3VWGwsH7`=7g4X_XX%D|2&f4hq|svP(k~({!yHCXvwGwKVPs zssnVlAnG^)b(9b;Kpi;}ooG7lDzJBnZ>st~hUFs?{Le_^SI28dENm-=%Kn+s3Cj4;UwP9VroXF5_w1bckxDE&$_QK%Lit)1oJ>t_7}6NYP46z@x`7eH$z-?9#tdE9Zv z@Io%6Jz%J|%o{}^GR7rSc9TjuCQ}{L-i!+#6ZR@;Z`AWeOrDFyb*dKE zlSW~!Z6HIhk*~Ry7%%ksuGS(^aTqMVzjx{nGwa=?6;`^_HBu-}pJzn$xsA`M2%S57DDoTayDv|?mO&AD$@_vA0YylfmQz)?(-~W^nBA_g7UEERVE~iL;^~BM zt~d6{`lj0snoPEvCg0>hznNn==?nENt90PL^VGV&{@>!nQkg^^93_w7V1`IYAtA?7 zrVG*0;bI|?(n!BGfGoH+$bJ<-=?=_;jl?47cIJ?0j-c{ z*rZiAi2-Y`JwDKsyoU6FHTNDxQu|$e+_cDvJ|e>Ncgs58a>v`5aO zes?q)ZIw*kf*iewV{}PxXBkJAGQ&uSny}qor%Q4H^+n^9iH%srN?{EI^_Xhs6POsbP^!)Cr-+$(J&ia1$8S)Rnd+TS(Gn_v2 z@6Btoa$m`(*=!!oXh_bF5Ne`~1xMnSqvPB#ERH8DNP&-nmeSR_6>#ps8RQ2qBmbYZ;d@HrA3UC|W5Q>IWFBh&cyx4p4A`$tn9Jhp z@$oUb3UDGO{4&n?(b3V--{@C{-cepyiN!*{OhTQzMJ#6L&268*fn&ZwYK~&>g&TbP iQKdBhbiaN3eEWR+eEZz@^Pd0!0RR7%x<8!&^audm`Uctn literal 0 HcmV?d00001 diff --git a/stable/friendica/2.0.0/charts/redis-2.0.2.tgz b/stable/friendica/2.0.0/charts/redis-2.0.2.tgz new file mode 100644 index 0000000000000000000000000000000000000000..8c7805448a5f6905e22ecca39fccd685f3dbda49 GIT binary patch literal 73842 zcmYhi19&Du(=ME3V;dXW))Q>9v2EM7ZES3AY}?7kcJjow?c~q^F zB`AnLh&7%Oni$!Kg@KhcCbbxG^C&~>`A%;eiNXH!CPS;hFFf%1TuZ`-#T*&1-Iaj` zbB14_?(TxF0S9sv-OE3S$N~tt>IgS40v+(6W-s;SCn}(NWrpUC`}s~+$m#_t!&fR2 z{oRRf6K6l>mTU0PMv6#ewBEH}hyC+t=+K8ZgXK4}GBLo&tDdc6 zr_ti*SApiy@%fjUsCcLOHu{5c(h>`C6h`^u`FSJ~&3^-&>7p{|PeKh4FwiVf`%*}R zN^wc>NZL3_2w)tf&vj~pgoD8qP=znRBs-8VNSYWcGRnn6%fIU9**}Vr?7k|;!)SgJiA+r4P?Th%W;sA^8*eJD~=-OZT3m{f+xO-K}S^To*9?TL;`;++PN4 zxhE5u(HGuYnxY#k9{ZU%+z>C(U{^F)Vp?A027mlghJ{%I`klB|Vn28QGQdu(bASpg z!WC4TL=%-M8ZJNWwRRR?>U9FCuTQ!9n7P%!@XmCkkdIVV++Mm@C==dccPJL*(c1p7 zqk8WT!w=lyvZ17951L0VY7^I8eB{&tG;0kpaNmNm}Z#KHG2KSXF z*07u9c%LpOp7zXQr1CqcC=zv;25f~ryLwxurNU9|7(EGIC2HXYbYtB)?`@Wpa`6f9 zvi*2@cz^M&Zgl{-J??HEM*E28!*F^TwvFQOMmKM6Mmu7|YUCLCym>cx`2E}*UE?T$ zZKSh^#5nvUaKR3oy7N$rSLmsa8+oY(G^7uy&a$v{KI1Eqp;yYMb z_U-C#M)iEZ@Oi-YwtJ%!pj~8|s+h4t+E3TEpGT?`J5M6WTIHv^OhyhUxhsj9wFdxu^Bl^m|}jkYP#_sL3?PIE5;)js;DeFTCCgON^lRPaf|uatZjccJ6g?`=-Tqcefiwf zgUY$hKQJL3eAB_p7-sw2 z76Y%^+_Ee}rC7+jWnOMlBe45 zVygOBUu~%+Pj6RnLPY27&g*x>ggR)i^Za)gxo@%ts|U9K&??Qp>I=i2F7%Sgo24G~yB(%UgX z4pRu^PqiosP48%6Q)mK)H-2#V*(ssrUOpgf1s66Jud47 zYzJf$MhcYRU&s3Se|_5h=7aFXz6)RYyqO*D8jr$~!$d8Kqk;8iB$4xVPcuvcrX%x5 z1R#ULyo2<86<>J-XjZfO{P1UjlwPPK9DG>@eKx?19{2fcSx<;3#U*r23w$9?G=O?P zLaTN1yghtDd>;OiXFD>v-u(HdZx)W93PexQ>^?%Fg_IC>uw+75nJfb=+G0(xq{m=q z0T4D3vnwGnMeny9Amo2x@)P8q*3ZsO)(-)XQ+(vPMV$;kGv0#zKB?mo22Jv>3DlPy}X|6tPHJ63w2yY zzGhnCSAO^n+v}1y?x(vk3>X#jP7 zjKh|OkES6`2|t??ylJ*jJ&Vtg+K>*aJu+VzoWcGq=vYhsY5bT2oLTuC-tgyYbZp)9 zkn|1S@Sk3P`S2D!=gK9g_D4I2&PUevxADVxiZaIw$~#s;G5+^&!EJ7W zlc!gxBf@DTezGno{ag=Z`zAj`YszTPk9agBV2}2@?$)~-K>y2>ai{?FgYpe$!#xOx z6isVc0wnbNbF~@!am;c20pz@Kxf=H6h4JM7%>8a%h|sVciM_Ku_QR{d@mHd{L(LTs z9Lc?X=F6F{OeX7uiJVAGpm ze61%?xNxGyuhjL;@AAL{iO}km1@}E^XWI)nH7^ZbZxPzEn*& zskW2KU_2ikP6WmZ<3LeIM8l@Af~q39J@TMElHNJQr>+L;LUe+bmYxbXA;M1xoTE;AA~jYyj=n`wH$mP~H9_7p$>L_>McBpN z)3x>K^mx*#_k-14M&!>sOkM&kCm`BCcOc#fZ5t{59;MFxY7D$oZH^UmV6J@Mq(?pV z-DhnqOM~I4p_3yurDZcrQ*W1>)A>pR3M|@mZI4t)oJIyKr42&Is+$+@l0B* z8g0EQ-T0K_3atCZ=(29{-=0z2rqu*LJxQ}IUM;g9V6)FW-chrg@~1rMvr`wD+3rPS zf{SaG)GB7wtSV|W7u42*yZ^jn%IHwDh14qQ!ZZV#EHmW4ODc;F>rzUaYb`dh&Lo90RqxyLz)NWn zeDW19&=z6oN}2~9Em6kHJm@HC{){VK(w0p1jh5AG*Zw!}W02FMZ&=yH#mG1xw)-it$y0ytYAa<43Ncft2LBeMrw)+7-qY|-<7FLcr52n6_WQcuw`wcb{0rNl@xSuUDH&o zu(f7V1~3<3;lCSaZ;8@h##F;-sjZ}Vn%k6t;9K6%UMN@IYj3FqUxLn@MYA;L;eo&G zjK=CyF`Od_5vsIm2q+5QK_{)Tb0VZEGLowzE}l)Y%&J!2Zq4}im-c`|r0#z}Tt{{? zhj&5`yh4cpZMJDnMC~ASzzaj!5{C9h(qD#XHX2mO&}qo)Dpp3iNQPA}X$*0ZL|LNN ztai_vt#&^M9i;8I^r6*Hox^mc76BHOdiZ1_xfJnLCUk=RUL1HPPrw3A%HJoq{HVE;R`|M6f@?j+Po ztlE!I1g1!1LtLa7oCK?>cC?T*;0ZSAEV{_8);pH*OE+RlM7?a^fZQ69YoJ^6+h2gn z6%PhU2CTlk1gJ3jpw{xu32v3HRqg{=dv#V*g?u{{ys;t3`zo$G&PBEP@`oyrP)99& zDy)FKET~Y!y9jJ%1kDPB*^GAZs!EyV5rv};+ab9px5OW9>SH}xc43xl#k>n2fP+Gm&(!P^HImXmJ2D5 zPpVsD<|r1PVpl2$JQp^H%h8bVN$6HH-p$9DkyFHcAj=n@W6K;iuaqrL%qHTZZr16f zs(30Bah1_0Bu0wMj*+&Vy3gFl{qBuXtKpT)#v$Qh%3h|jK2F<49aawLFKh-#)9f-) z$M$E4MMU#0q)j;r;ZZR587M*^R;@)+z2B}We9+h7 z#vc%_8(Ad?qjA9l4bTOhz%Bm0pX|{-qby>)15pWaNq57u_Px|X5rpIV~W2rB>(?TtoyoiLoDFV3&91oht z591HER2GX3?3s%JVS>@|J#C) z(}PMamJHZz+990M3&0PIVI1+YqPw9C-H;TFf~X8Hf5}F=7>2m@TGO?T#VXFgNKolX zOf5y_K~VTHBz?)^#8a0Zg!Xn=c3M$Nc1mW+1-cknd0%HmmZ-+A?mEG($aok_9u|SY zc$mQP2b&nv=Ga<}aAF$RF2gisC+c~_y#8;WVuVVthX!3J2(|^*8m57-AtvfOq=B3D zlTnE$-yu>vmc`W>ru|q$bo##i<3W?f7EDHkN*z>7UkeBpRSQwh1)*Rv;N?NC+#8+Y zR7%c*X#lBw%c2SiFNs&Jw1V~zb_QfE5K8m)<_@dK%#gb=`b+Z3rn>TMCJbDIRfah_+aL`F9go>%?LcOFPmj@` z3y~pNHp@KdsSbz972(J!hHhhBmZO4$ks-}!KL#IQ#~~PM{)FOk6_Mj|RZw)T#?VJ5 zf)bxGHTs5k>j8mlz8Bb{AD;;n*Kv@^7Nz&TDphE1TUt+%803@pIh5_h3GE8S{0nXDbuo+su8$egZgWl)pJ&oT#>qbz`ol^u zK%z##U6RFyo1z^c7C+dWtl4os4G zndgrzB^-CgKKytH6hNt39`|u*U{mi`$iPt&+0Wk^_8y2}PM+xrUYtOO6-id#3;gSO zLBK9n4`Lz!24?w>j12$<`^6%?@W#RamwzHKcRLN(>ynTC+#ik7JC8TlVT{ihS$9^? zLWsN;(RZNmCH1Vc`8kdFgs4mCoA(%NOh(`6N9K0%#g_xsm>trcUF#I&)%Cxuv>DY~ z#yZUTt|juIulQ>hfz1>=;~flHrts9rUUzR+24@{;OeB5oHxXn@0C@#nTMNaT+iZbn z$Vg#9x_5!I{<`BL%%#u$_ud+`qdT>ldV=$>@6|9NW3h9ii((Gi`E@!iZkk)=EV%%B z7`WVTPhbB2SzyNxypQV{hRk_mZ_{OpFknPDf-inz99w`AK^wlh(N^q80ij>vCS+Da z0>oSQB&0Nd@-<5~upf=`t)~|Y1-3HpGi&x75%77=^SNy{^b-9}>mbNNtc&;H*>DEw z+GoelA8=l%An^W&{1=t*7Jm>c>T^8W+YbIS{N^?cXs&=KHT?7X8{K}+bja6ik7uqx z8!com>)$t=Yo}HIhV@wYNs|^gX42CKhWAQIGoKOf8qiASx@rxz8>^|lABUS}4|9LT zkjV`wV*Gy@FhWDdzDiF?O_wFGZK$(gBxR#?+bFQ___vbjqTgrf4bPszY$rXHw@qMq zPL=9h%Kyy?FvUe62*^Vdb?6zc(Je8#JL5T8E!%xBrS$(u7l)EHe#!eKWpju1F>8*j zCsKmNxT!NhOl~*@9i*q>WVv$f8Ax>hsEw7yRp5XZz=|4w9SZcW7$kF}{<8{Wa8Uz-i z{N`>QwL@;S7bdvlL<{`&iaIQv?VVD_gpMFWR?Nbxxe4JY94}|PX<~W*QYCq}8>BVt zf}@-f!#qc){>ahhU@z^y#hR$*yhw|ynCu9&X>5t4 zS)3z3S;M#@NTVFQR^AUhx!k@GDNN8yC_prRH9`1p+-~^vHs`bhwcQw7CPm((V+th% z*PIELumpfaW!(m~^%LKUP2>>m9i}j8JdJYG8mLLPoxBcLILMn17+}WPz$o0Lt_6;{k_K7%3-vjYNj;@6=IZX~Z=%(S^Avwcp?Qx!E${#rN|fkB0rs1JpeYeg5i3aKwM)3 z>HI8Zebs9jXh3dk8Nga{J9^rQ{$2IRUGWw|kJgFjBIdnXCj|VzrnKy#s)sgDhesWRSZu6nq~(8U@?_%NtnhqO-!k&&fQ@Cq#@(;3 zv|GP%#>V$8{28d&!^IDkcQJ`2?U{!D`MrXVuBd`UPC~t0JUj;E+W_Z)ge?m#X_)bP zAP*m($J5RA!^vRSipcbxF*(k9JXLC?I!Q=ygR=FRA-}lx(}EkmRrTTjW_or#GMM;t zCT5jwg0f0tZ%V~Sp2R=J-j+Lnl>+!@c$@WF29x-CLKHyZ@S$~$gFbhyz5@>B z?ee4;>XWjM&bq`k2>H&Mc#MBxYH>8NQfIs5MlCDxX1oe+Htz7IAvbn7=8O9-{O6#6 z{~bGaR802y&MuZ3eKfzt59JfAl{5Nwee%EjuwJ&`SBB)QUbTvN?IeTEJG}IkTbZQL zxoEIQt-t!zH6ozj+q5AKc0K{hpt>d%|eXL zRwQJ~l?GXO0cZ$>yD+4-Jh!Cj>+_>WJDu;=li@A(WmrTD)-R+FvNV^9-3bbzEi#2< zh$UpIp;>mcD3ON<)-LE+2UnU-@2co=|+pZF>VFY4> zMl2?Yr}9IT8LYkDDB96VYdGJzg@$6y-xDjU5tU!m(3?;vm6G3Sh1sDST*kut?F47| ze{Hco%Q-oEyY6^&ul<1p)XP}}^X=7hJJCR3nNqBhEN;~Z^>Ro?)`40Djaeka!a?+W zC~X7P`;etmj*V<`W1s4YeU7iLLNax#Cj>5rdy4&wsuuJau_KnxQTs`nFf&9M>pt@2 z+kGP?@7>39`d-2@L*!^-rJnTYI4FnK4%-E~vIMJY!akD+7x7i>qt3ZBL%r4K8%NAd z!mF-;dWdO#Srl0LSzwLcUH@Ls;F}C*_VDd9V}h{-@n_Tm!>8AO$kPF+-kw-0l0Tov zGByS+Q2rpc_Q%)#^QH5Bwn!i#>Z>}n4g4E;?!scWJm&>bGP}32c$R@mqA)oW4(DFH z3dVm%!LRCjK%;EV>z&Hyu-^A+E*Iz3-a$U^#T4on;$?a!jkocaWiO+CMR8vS;RVY-{?{{^6aF6xu;H)Q9Ooc&n<|@?747Kki=I2|!(Wp+A!-Uxe z5+Vmm=uY&fVkT*CymrDTl~$0Z8qU*%^#^d(u`A9nNOKo-Ok zB1=aV(2j~`C<_^aYUIz_tkU#CUax;&Y4J2hm=jMk!9^2>&? z_5L)n6L!jdXm9v@xK{f8?>TmJT`bfC(EU=doN0H_=3t!Xw+R=xYq@5~=`*ByX_mCe zRHmQF>NOE*GIf4fC>0hD(Y6_v*34>&)@VBAkx&XdS+qqc8ruv@cYNFouG~2klNura z=j{0SHmORpbzB*;8_IS#W-#^nMx05H3WGxT{yW%AyZ-$~&&(LBYLHmuscNn@<6){$ z=6^(2yc6c9+#D2{Kgw@1IB@Njen8K+=v&vk#4h=_kgc4L5m6w8EW1pOy?QR5|L$>D z*xL`Mr;ajXs{3{a;cegRgqag=sO7nmM*NfR%s1*^ag}y5n~}(B@`mhV(f`9j_?kgweaV`%vVpDqCbn4JWJf4fSxi!-r4<8ErG7*)++_o?El6~ZqKU<-77 z4Ymh{UyU(r<1-VxtQQM<+S*x5h3R(nNsT$i9>@Y^Q)dauCK{RU8ApS@S{PQTKDzzm zL94=dFN-9TYpq9X`_9R7hjONScHTS}aRj$rqCg*Iu}vDkUnCAm+%`N~&SHb7L5a>M z+WWxZm{?ot-HBchTzvqFd!pqvb{0=!FL^IgUtR1)39#sreqB~d`{L$>)uB^IKRjQZ zk^Qp~PFW;ANi-RdDPS)D2P+!7^3v?3A$%&!*=xD~%Uk(a$IOS}qY0~)nLe{Uj|o9p zDD}Oe>nHW&z`=G#t$>hI_~fe!->&$q<^$1RpjgUd2<=@>s_`XnT8o~ zB*ouKAfi+w5Qky*nvi^OVvRGQ3Z=mj;~?QO8-EHKWaiABhvEA2!CDuA+0{R0W*X4s083x`2u>= z8OA+$(^_BO0A694E@Q?6PnUErbh673i9Hu$C1aWBVR-88_u&$@bUtNNdl&r4ig8K! zRmujIL7~1-i;P6noG48bwQY|&;07fNt=r&?8=qCkn<}B(@4cpJvq24!GEKwdBSYb< zj!MR0lwL&Nv}7%cJZg~6pfE+_MOJ^rzSkp`Xul&+OKruFvOI-xk5I*E1x) zlVmj$SR~UeJUjFRDoyv?DsatSR1I-*tBhx~BEX2w5= zN0#V772{u(19~;4%#d<5e_o_jPqpryKD5Ox)ndvq=HliSAyz8jFU-nO=xQ^ zJef$JN$QQ3AM8p(+_5#%uBK~}d}C4lsUgzhz0>REI=hblT+P;3CUNDO(|*%AdiRVL za2YPla1~C6SQ(tx#0?x4vEb6Qq6!a|_(0E38gk&UBz-ArWkw95qZy&K4t||-xM)&#_;Un>!VW!yRHV(?Q$Bxprc0^!huNWV zvlG}%{X?$2Fskx?+e5B+e39+Pkq__poM`C$H~lG;;g;c%$vweDd%%B~Nx**d^4q9O zrxg?8==G@VAPxy(0rqeVd$`ciVYQveETYwnoU8d7UhNjKL+-ioO}11%Gw}_gI8tqT zHh5h2xQnd;QdT^b!=Ab40u`c>{l7=dLMeL46-h)_w!MKT;7`-TU!G-1Cq*684M(gW zM@?uLZo+u@g}KifYWdLfdL?;w@l=Lk0F>1A?KBX|n6%;C{EP4+ zA0Kyn=a-+}ko+rTLov7??@CG16oAgRmun^eUmaUlUu+|~0l$!gKdA;1Z~M+7;i><@ zpdoET2X_{g1GU&ZN zub>ic_$`8mem3aw)&n-ArxLU92?#H<31RIXbqQ|^vfNi26Qk>$@7^TKiP%eGd}1v6 z1FaL2`wwLz zl50s9RMXs(KbmV@XnuOtxq0)l?Dw-|c5IyILZ|@H08=+t2TxiYj?EwxSE_ z!UjkZ19D{eV1O=AB2HV-7Cw=kId*M@&C>-bzv@Dp%_G=_g)i za9{I8#BP$%_D}Sm= zb@1PQ#7jLhr&ja-1b^S34Mdsr7eW+*rid^khOWcl!Hfu&RwgE+6UT=EHb5{uPW--P zo=-W1x7tH*g~*0^i114XHBO}ZnfmXm0tLtB{K4AqLBhhT;t*hVlta~*}(FYUJ zWe|0Vg!A*Hb3v6Qlw|CX_+A9|6p6ty`FBh4X8asxp}+abrxFQam_~q}F+Nw8>g1`LeCL<8p0x zb!d}M)?!n6wTh2jm1U-Xjg{P%sF$K6N-qm{ro)7;f-{0u7RR6vcN1xo9$pBRn7qxy6<0(sG_~UleF>$1g_!2+!j}+HIy{VJy z$q9u1dGwH;*uHhM{rj1wv%zk7Ym68NI>$J$$p%jIqWP~)KK-$XSxN z&DNsTT1GdhmXM)uPQZ)Ma?e5CXF(8$6T-B&rHB(x{j)ciQEuJmmBKqeNMt_M-1PI1 zTUrf4dkn_3$Klu4*T+}B^J_rN@1972MYC@%PPG zW!SSVY-d)T-DW$W-SR7W4d*nKNm<>p)O&v3mCj}CP0k+z_*pk)u5iJwXO3po{h1}| z#c%(&0r;(nAw08kidDC0O)Bh~B*v%_?y zY?Pa=!9_xhU3Ygrf49kTVDu$SYaXxA;emZHS@5(iFh$jXumeSQ*wTH#FOvxuUKR3Y zQils5Sm}y?mA@=Fht$wuLm!Q+voJIa|H*8OhB!MT3ce!Tv`>smtST*pW+IXpN2j4q zNug|`)MBmF(A~|eakjE?{;Ta^?RwtlSp(vHQxC>JEQ@j5ny^Ug-S0iV=ksQG-Stb! zT4!%|J?5)o;6Z%Et#G4=v4rRSq=xiABrz(kc0AKARtvuqABHa@-wDT8h*`ngr`wS) z=jw(X#ccM8A5F^8=VG3}FgOH`geFJ!kZIhBUM-`94^=SgGw+91)mkoHbzB?qM+90} zFg~imAG|(i-q)pmw7C}1sjXu|xk!?OrS?YRntPouywFecW@CyQ>954SKf#Sj;8bt~ zZ5XzWOS^I6;=JQM#Kd(Fce1tGc&|73T4ept2iKRb&uZm++zNOPVFQmsc-LC!8q7O0 zKY2LG3}GNa?U2D9dHHYXZl7rCVIoL)Nq#(l>1gNt`ncXXxGSmI($(%1fI6b|60^(A zwY++i%hfwT|5QX>cZ=8V_W63>f9WU@Bizi!)9Lc_aCtl(WHd|getEqfTr0VnZqXy7 zB`>8*IN61d9RNVPt66UW;t4kqIJX3z~fV zmHppp+eGPc*NSn&%R6(tYbq9&a5pSBj+^g1vzO00b(@xzPCb4VMIE@s6g#o$)fJ>$ zy(sMaHfo2tJG5Yw-3etAp1#kxfx26^b=h(%9zAlmEVp%CjbFInCj3{Ny6~~HtyxQ4 zXzQA~aIwAOaq`+|F8q&JKcz>i@Ogk;FZ`%+)=0ktA{3faoKwMzcAQJY5WK9Z$PdVk6hkH|Bq*UQ9 zp5DGAL(};($0Ax?PqhxcKK}} zEnbqR1vG?3sBEm_t_6%H*K47D2Zho4|D7A{z)QSi8+@sZe>ZC5ZQ(7Y}~CmDDZa^LEhAKtXI#o=8 zgGB=ecqyq&w$-wv9{PTBRmLg_{UIRo!=B|rtaL_bn0yw5Cer#is08p6j;%xqPs<2Y zaEHy=7B4kA+#Xv4I9Rvm#YMXXwl^ke!8SE1S$Dw1MOuSyx<9Ztun%9O1GU+-?!xPO+B2j5k%d2H!&tn2_Ro_(0ZLAbdeP zbdD^adZ}(le`p{x2sh#d@bYc#8NruY4wY+HM5yY^;^|vWoN*I`fv-iIBP0GHPGPq$ zFSn*jDb6g0k2jCZAX#h96QB8K4nQ}Nz$-7W)*ojQk(r;_`jT308I|$dbq5T;_Z0Sf zRC@Sv)eNPP?hbZO8{@R05X_LEV+hbVOf6b02i21-hJz`VQ726*s7Bg*d9C%_B?6e+ zy4DrHZd)=b|6SZY&r59}*;k8|#<$LCiMgWk*eWw?r?9D@AMtYR?itk~ErS|y4cq?_ z+Wo}ULn~U}9#*vb^2JpsdNcA9gv1Jhl9;NqiLp@e(C`(ffrBpxn=4+6tOuKa zOQ32bIGHdq@Wk zCBNm|a9H%~Ho^O^UGJDD&9uK+EM%fNS!8}CIu!ebhH{E9YCFa@D6x>Px>nwUN;=}p zrzIL%B#dT>++U9;QkL59|M}4yvir9x6m5&s&FI#q4Ong^4Tk6nx4rNVZmy9a;1l2t zrrPLamQ1Ns6iQvFm#`&A^XI&&*vU0_n4M;SewJ(x&9W&^4Z-}F70(0}gmY{>aM)^q z^(vwCs@Z?aaDKiuyt?0gKNaNR?%;O!dAU6O$aI@VYUZz~RSbM%NN8{y4tqNdtLR@o z9_$z|xl*}!-+noHf%5peP(sMYv+WUAm8`uKjtY-fEttnU@FXEZArZ$pkr5eDXwFr` z#GRsz3h_8lUC9ewQLz&;VRAX#Ee{B6^{GoXJivdHqusU|O+ z!7RDDf>Jhb5(sJbkk6}vqG`nZE2vb&{e7wslVFhLwZhZSYors*^d*NAi*=6EpsKqdYB zLB5fO^xFoOd=ar=Zc`AK2oQ%mq-Peqh+PimeG;mRR%}Ae2|e#@^hc-!$0HktvRwWZ zDR(jfK5AqYS)d;sL26D!DNJYs8&zZ|CBGuYHnZF!ajvX%X+48Pvb3zeom+Y^u?f;O z>On8n5MRHf_XTs)ztlv3YwmBMcs&$45`058pD7kR13AZHxQ@?0qd!A5C3N&Vfc-_|?W^owL@<)wS&lQAfAy#opt3 zoD~7T^Ox`Aqcoq7M{CU`|NNyv#JwcUWrw(|oa|%KIPHbxuaqY}nwrO%lkWvHoT+MK zPzXBWcK?l#)PLX-1L4i*?$1n?p}#LKb@J53lIx55<`_H6fe^SNRmiKT*jhisHRWAY z#)^Ho15p=}l6|=4miW|_P^(MD>O^xHs9(pvhbzs;6PiYuZ1ZLlnsS?n{BR73<=Sc_ zb~>ws2zo>6;P4r?P$7#_s)SM_YmJqp7j^>OmaM8R!6m)F$O+-Wv#B(pV-s4K!CXo7 z`J=_={lpy3RI3Au!e~-JlKc>uzVhOoJX2x>+@HZSs4C+uO$h4!nDw7vA+^oy*5r4H zB1>ZNlPUBZNJvvuJ%iY>0f$&xn@E*$mi@40?3FWWVX*G??D~V91TNIws_L_CF;gxJ zuK0I6bXUVJ6IbNg$&QJM$L4?LMX)`L_(RD=s+f5VN0+XR?m{$EcdZ_bHm*x?30(RM zY~2?IKY5N9Q9U=DDnB}O!)K(@#5#QP1`}@ zyWRb(Hd9~o|5h)y(^<94oevSWEXfFOA?z~URIlizTp{4Ej!GZ<2_nDN5k3t2!Hxbw z7vWzp|hTYI3!iF8$s;OCkIhCjj zvofA4TyjWLPi_KLck!20wNCoz@m9>)t^nJk9e>7XcnAmHTLkEVcW@J*%vytbX$U7z zl!@dlw=^-VyqX%MSa}4^niErdndNAGH5Hr=_NfqAFI#=Hs#uDO?9T7{HcuK@C4f{V z@x>t`J&ojCWTzrFcRqoK1e4)9gE4)s%IL79C>b<9<0TIeR>RT~;RnjtNAFa&MI+r} zq{6OrTrZ3`pf83;|09cn+KR)i3I=!WbkKg0t_i%Z=ujoZuQ1F3O!nk#gubZ>kKeVQT+Q=)VgeF{dsgc2U z(Qd1G(BYhXXzMAdK_8eKjM+ALV&1^g8NjwNlD)AIZq1s`U#ma|UK9!Xq4 z@3B!FWt~QMv3$&Qn=)>WZPUP@FM0Fe0?NJ?6VsSdWh>d%y>mulZS;^-X?sXYN$^hZ z&XO;a$M3lN)h7pd{m8vRgIMEG-H{h5E|zGo6xc|jpIsuC8044@8%dIpsG|{C2ftg5 zoRNlXnQCGM$kCqm#JN9@k_enX>nhXl!~T1`J4Qvvoh)d$ukyw~jSDUwrt#I#OCFnB zQY+fWHRsJJZ?WLbSha5a5UE&yjx1kSuNnLEP=QDN!dH*7(jtG555f*HH63F6xA|<^ zw~(bV9UvjW*=XsZ8^f_sb&X7E0}|#4ZZ)wqTEFhyY%957SxOpNPPEj?;a{SIq#zP6o=}Fm zI3v@qim*75U1|9G`M^#L3bR&qv6&A|4`)K9MKZ@Gq9(GIlxH{=ns1&FlLt;;hyyD) zCm)hhrbUy2p}OypkO(Voq8CMQsp%>F^WZbwECj ztg&|8WiqC9w$8bBGK7Nl-vKRsrNgmYmhnHVC-^!4o@+bQ*Oe@)<(PEVi7mF77+<3f zT8pMil-6YVCaMaGUHJwtm}2lVVVk0%G$OJ4KhmS(`O+UvOW)CI(Ryzsw4$cWC{fX4 z(nS4pmFZb~ksyu+4UVQf27Nqo$cT_moi)kH2r7Hw*&=bP3{y?Th&4OWT^8=lt)Y?5qhQ-JZs8d+0gr_0BX6jxRDv)NgJBDBoN zdORUNt+*PyJX{5yT!$FAaBUAzHvU07Fr%V^H|Ma!pN(A80ON)0(Lx8Qv1HLbQ}3LQ zYGE!eG%DC$^u3-&S^`a_kYsR)IIx~#yq>~HierSrb>EKotU2Uw6io^|)z7$aZWf!s zyijEo)wmE95%OXP_GGFVHgX}s46<}oOy<>KdTY|F=0SaIVS=CK^ck?|2rTF>7U7`- z_0|&g=%qCI5HgcX!Yae+EH)aXLU6da)S>kI8ypE?VfAzoEP=&khzLT7al{pn0~y3) z#TKM0Y-E41gW(Yth4b@Eg*1NJ4zPY#kTUp}nuHkqG%{LRO1QX6Dzda6#N`W=|CpQO&GuM>CF~WtYr+QZ!tD4809DW`y(bI;# zAWpTnt4+dAZos?A8=RAxr2UqNqeGM5%i(j?{qDz|)641o?L~zf7GrMiMVC+wL(VTh zzwQqb4eGvj6k0NxK&nW`yYR&%$B*!2YjYdZCF&Il64hXH^}u>-97w_TQX%}vd;`m3 zVf6T8*q<5o2H5`}XKxu4NznCsGJ{LwE`z%c?#|%uKDfKX;Ly0+;O^dd1I+|@LwR~anD~5W|r(pJP^K|#h)9VzTWG+UbzId3bEOnU7{YLca z?0$JZ&OCD;W%}QanrWkBX_F`$SsgP5BNr(RC_X-;NA+|zFUL`kA?I7oJt^qF$myRb zy5I}0p4@mw<*P!cnlx-kZzKey`Q|iS)#tFfoa~>NjPES5;37nnU$#vN3Z;#r+R3NK&Zn@JcG-xzKH(0ri z5>eZkRaHPpgzVR98Eoiiwy>4~#3MM_X%s43(bQ9vr+?%qBl*%t;Bw8@!vZTvitF~> zq``n}yx-W4D^2vYUX`B*yWl2zugF>yQTH3UhvtX^cw{?xL%!EnfE=^1zHouL?YD6? zK0_L7B`h0HtDHIzs+}=t9BRp_XMUKLr%5?6KZ||@Mx1_CZICqPJM!;JmZSuhYxITh zPYL5>yQ+jrdbcyx=~Wz@Kp>4s@%Z36zgZKUbdQX4*<}qi0?cP5;TUDGrc{cl`uF~B z%Bx*+2Ps9Mj7;yukJ69nI1FRHk=>D{CohG5fQx;bDR!h1CXT)IdXHmmuTh#REjE1} z{2ffJ=M+}`I2sBVD5b-F}1 zFWK>^MsiGm6I|W)@(t(2AG(HLmUQ<#4Sl_?w_bPq8fF{D40m0$z1*t4Wy@HUmOj)E z`=tD5j&<|;sy0@EDfc2*(8tT|$@oPAq!I+E@)R|$oHd*R zVHrv=CAFX8`R%e%qU(zhvjL2!o_xF*bnd zK2~v}p_=JwWS8T2;}9i~jO!02!`nh5lRddaH&tOOJ!L}4s4g5ChyKxUzh$>lVnPc) zRO~b-FSPxS`U&T3hvRpuv&S?poa4%M&LEJl92^PCO|8_54oBR_}@^HjD6CPIP z9*eP2nSK)Tj49?NGF!pJO7Fi~ZSk_wD;_(uk3O-FwprZ;6YPBI9E-qxVc<=>HcD4x zV@==5zpH(F^rXF=rsjX^9I?t-YdapSyZtH7ga0%#YL^b}BToLS7i9a0${h6Ln(&kV zx5jG6pFv@3>i3#!Z;t+hF6T0p?d^m$|6c;KukAUmP4u5Tx7s26(??#=M}8nOK-T1m z+gL+d_}_Xkqinq(JF*9!{8ult)!~OVp(p=KO^>R7ll=kqRqYt(e*2^Ch+AO9t&FCnXYwgAAIujrgNOyRkPRaznar0T3Lf!Sc7a?^4Uz))$xGW^MGIV zaDiXFE}2?`Son`zo1O?ZQ(M62&n=&FC|0(;d~O;2F}?OS|Nqc^sh00Q{nz`LflaXP zMpqPV-T8dW3ti&p@&AakrAwVL=NR8g!M?5KW)>ZkPdK)vswV|D{ z=ywqtuRj#7FKBp+U08s~r3sD?by_ZWKPrr=c;JXI`r&)D9cVR51Ry(wjI>ELKS0Bd<0rs3rawvOG;e7kR2mM34Ljw7zD`}4|Gh<@gm z%TC}9L|DW?+BS6Rn6pO0OvRgpi(j%(6vm4u?D+J^{fKimXc3&o4>#}PJW+8CFA-xW zDtKZe%@E?sD*L2S@F&L4cOcz*cZW|Zm8ui?Nu@Tfz_dmG4wo_Q0)94s?}Rquh^>J5 z3I5(aYpFg85asaA4u-|`DrWg~)u^dpsihA~KI&%OU=oecv@Zd{3jPO7>HP;xdHfHUaxCpB8M|>7XVetc!cWGO=FI12x0Qnv z5obq2lO9AJEBJvL!kh4&GrYz`KAH3%`_k0)(0VMo?N-D^qB}iVGj%W3WlfH;dTaRo z%5|%QQ!~16IdNa)epV!mp_4F+L*YmZb;hKMmz8&%E|Gc-`T~kAF$4t#X z6R(frYipEjgN}Aj7q8-9Q&XY0?*Cn@IWEzH#(SvbyA9l9K2L@?C@I?&{rZ4#4KzPS z&pM}DYondh&X5}HfBGpPtM1r5C=N5T?un!(l;z|Q#$)BG=~~&yF4hI>g48!Kf}JXL zhFyB3wQd28vBV5V)rlBjEW^||N(+IMj6G&c37;;K;uu$V9;U{4>HjZ{;&S>v`TwL* z(({su94M9S;{TZBxC>u3Oauo1NW(usGVU`+=%#=Gjh{dY=@UrhNd%9bA0OR>=1Uw1 z@;*!t`~J;kauPZ>d57ryoL4;MIYMH2SY9TE|0Pm#{~=Ol^oo>Kd5=22+FWwSK zasn#18wjFTYxwSSp7Zz4T3Os>1y?|&J^YlKvfd&g_2*u1xNj@+#NTl%!=3onkHLjt z3U|FgqXb)b0v(uSO5MiIsVO8`&=qPVlun{K9Tf$P8e<4cqs+l5S5M0Xl)pCTuP#>z zO0jZAomg|R@rI-Ha<5T$>|iKmWt_>t)sWuS&rG8Qiret9U-~t>i^i@{W^fYf?9ZPO z4Q|w+0x$B7`hP3k8$Z-e-WPM@dj~c}5^uUQO~6GxKT_3o^ptQ&X6{1QG`$Uvqk_O1 zH=wE`r%o>9wkCVBXM5DJ2#@i1&@YF>sT_0B4~(FxxVJK)cU>v_tl_IpYAJQf@t+n( z{|Auq{0ESA{ojDh(o{Q0ux@aXAfc>Zd7i>rH53SeDKwe zDC?P`F$%6~0z|e!oiuf9sg7u!oNQq84po8;M>r}**NS11Z=B|z+3n(#3$fQvahqrd z@Q2Do^zFQ@#9}S2Opq^va3j?7BvsU$x&g+FW32rHDzU@QV9t^?mm@JM zlQvh$;?DzIEGr9)%j@V`o(btB$V3i3oi=(khP6Of6$wIVt#lG&xa5_uKfVv*4e-h` znAH!wr$<|2I6-l&yntH&H894##FF#--W_l69zHdA9KJpg9Bo4BcX>M9McqH|J%w>y zudmOZ4WVhsI9|M1G$wV??-oW?M(y}43N^?Cactvz zH>eV8eJ*4+jXCip7k_9NS)ifC6C-7s`|RP=8~Y|^-vUFw8MAe8M)VnBPpm;8=kBOe zns>%9PvHtXkraHfZZ$Fg(V8wj^S4JQs6V=ci6Ti|zaqr+)+D=bi3S%?a%PT-p0*h- z9*lcnfY|7pEIDJ=pn66Uw{V-u~u%Uscz%2oT-MJlz18ZpKRRuWg?`_U+R7je?)ZvW}mYFW8Dtc|c9Vu@yD|5C6nKW&Ekr`fP zL|uN)YK7P{yvSUVrQttR9OCTqKc}CSOp1otYpY*osu)rUS;o7$jKehQbe*Ggw4JS> z`K*?p`cxQ-5i4S&+h~D+9~REOe;J)>BDg?<{X0W>28dnMf5AB0v6oQo#c!(e%e(?+ z@*2Uq2g}-$*n>YqD|6g#12N(qgNQuho$E&cPOw$L95gn$Pdb7sq0Kt_l5n3j|1J10 zta!#WBipJpL}fuFs7TaTup-=jPVls_d%4e&V)*1YV>>nL0zEE};Xur5Z-cA(N1WAy z;E$2v%9TG9jzmfI1uvr2b>E5c!AbXD2#Ar1Ln;%KnEXU19QaB=`lBX5KzB1L4Q94?g;%cPM`FoI z+%rb*Mux%RhgH5(QFP;9+8s3a4jOD@F5{%){>TVMt@jXPS;V2(3kfzWt_iPn1Z5$r z`9<>AQ4bfE2vHkvlv8#gHx{R=skm1o22(N6suI7xJqd}#0v64k6Xq|vvW6zTj56#{ zckLVniYYp-&j3izKm8~X0rEl-3)2n_+Um3;*w%4ZrHZq2%Zpu4pB_+%l%Eb##Xo7i zl!UVl@0z%?vbe(EAquYJFAx1$OZ)3j(A^82hsnz-nh~NkZxCTu`n+LZw>EPlPJT|} zh#qWw+`sg4|2Eenw=?5JY~U#1|NZR-Od$dZJcf`tW(6{cVD%+j#OWEwi1~|x24^gq zaUY%b*ES&{A#;9&8{2{@Y_taGmZ2KxM6!pEB^RTf`xRiC#lCMmJzW_x$4-98*c{Z( z7{a1fB(h?aF!f$5Q6L9l-pgP0cxi`YAj42==*{Qahs<$?h-YFrOS@X(9nAdvj?YhS zKG@2B-2qc7AMwcQlsWIFuaJp;#nH7AAC8#CNx97f&pLSRO~&N7938H*KD>ZlA2K_b zDwn_1A+a^zIDWYd{4G;1Q8QqZWNcnp-w#OMC#u1w=S42@5@1LM;%f_Dy>ODL8fg>BaUZ9Pf8)J zo@ZHxN*lQ@7p^knE@~--BcUxq$Bv&WPWyS;v}hPyQ9&je`R_lM=S6WNOCqE~%i2&8 zi&8{ar!{b}!&VBX6u)wIWX5dWittl?MZuoRCnWM{xO-#EpEp;hEFxZ8hUDLO^s#73xCkji+_;P#2|`cYP3KHORwRbG{aFpt&UNt1vD=zz`sTN7K4(yHGYdAUtj+0&a zrv6JoqFTfkF6-%ityoe&S{PBl$}}sDWNeV-KTsvVGl#M<(=zPE6KO|sAey{)DEuLV zZ8<;Q+*JXc;k{I%&v!QEKU^$dynKEawr2jwUj zCUwHlys}u4%vXlXTDhiVHwqRc&T9u4?AYI`QckA>-!ik%AFx+s>?%f^e19b<`7v5= z%Xgw&y)*mxudi{&G9c&OvJ-af!5|J}lGp+-(RHm(t!aJ29=W@a=KFqdn^in+@Od0s)LNBU zQBQ&z+|ZuHcD^3BkVhm-zZa^RExo|lp$Zwy%LRfN^R%kOJiyM?#icO1gn<^FAj=7R z*OOnK)gud20k>6r=*IYgeK-+y?Y%E*jqL(Hr#P3Kq77tS-b`tL*=^GQ2Ix6LYMBV~ zDs$!p(*5J8bc&jd-_F!5u`#}#%G>Ttfo4i8DNw_T{%b*<<`73|DGjoh1}U9o1Q3M6 zg4*hSxaL9BSviu--f2*|9Ks$~bLSK~?!u(BwcpB52JtI64B`DK=Ogl2L@6La*$)5u zsxA;aD@`l32#NCIuO63ge*DLC75Y8~vOyf$$n(ie;X)gjC=6C0(pLfVZw3 zF^H(DwC%KmLw9@@GUhX(;3|N0WrhSjOsW|ns^}tpmRY}t@slYfY_dRADBw8-$$3gV zIs#i)sGd76GE}-$fuH1}V~k?Cr4p&IhE|$R&t;1B3@77u!=RwfSy+Fw!K7(TAq9PY zgsgOe!BEK~oANLd%VT50$LBhFQN4T3qqY3#RF0JnK0Nt42Xgj&%A=AF+`Tr${I;(B zvG64|2lFYhuL4Qj??UWRLBC${OOX|Ju<$N@JsR&OOi zepYSt?@9y7GRxB4xsAb}l|UR?6$gA=iFzEBF949o4|eJL#gGdVdhQbc zR=}rB+so7E8FA+&#zDc%Nf@NYZ0SyTABD+0F<1cOF=_&CbvC;>H&a6~FuBQE5EV#% zOoapQdEAw*U8Id?8ipc@{2ox%28_NU!G*LOod`#AmUbFqFcjXQ2Aoixb7w@4!v>QGnQAT;dg zd?~V`r)|Ap@_Oq#Iw2Mk_^|9yHRyWveEQ3hDhF(QL--Y&b| z?UUc->E?8G+*y&^A>@B`HHRXk_kOz{d@u8%tQuQ;-X*J{;<%yj?BrFVpG{j^)Ae!N z`MlGBB6KKJHW*bI$86BO(B=P@#B2vsc7r$c{(#wf)7g3Q=S@q+BrEgsl8 zZ-t$zwWix}KVQ|!VdF5qtlNA(6&{A~TZS_$dnwuw@K9P&+u!mQ|y+wLf_ z;`iX6v+iXnHf`WdVs}d$j+@spvA)Vrz8(jbe&lUHIiEXTXwNp3oAmd5JIm)mqcHje zd(5^H>&UNR5;fBWx}n>`5=|9)TsB|rcJn7aod77lUw)dPyg{GqVp!gkTgWH{d;2Ia z-L29)w2<{HDP!&~afkE2rXZ&iiyLeT)c@5W++vBZ#&^hA-WIrPw|nJmDL6Vlx7XTf zbwAY8EL>lQt&6ddnDRw2jGiRp%7LEVB~IpX^&t^r?736ev+-beNr-DB44#i` z@Tag0%58N@-k~X#{sMV1vZqQ@3EUKH`5qa=qn|)omU&rI`b704F=nLMvU`iH*S_tF z*3?x@U%g0MS>X`1&zhN1uP!oaLLA1Vd?|H_S&&lqdA}Zgr~oe zS-;QN7L9@}epj4(l`xOt@+{uE;XTwyGe@~j;AS<<%5YPU+dy$hh|94@ zbYN1GzB@bJW|HLmeQS`7cS((iM6;ddoJSv;hw76#kz!% zrL2!d&&%%Cr^Hx=A6ed-YQs|!_b=PEe@(4RTk;W9rBky{F4?O!jW(ESZUXz#wN+M8 zNM^dE#i_sGVcIvXKjx|?7TTVU|9Jx-QT`Zkr-JI1oq`~>)F*X6z2Xa&?i^r@i-cWH zQDREH9^kvw*R`FVqx0>;VH&Z$)=TUFVaWq?K* z)pbmn5!xozo`6-O|EiU#!1HpOKnz@ajY-4#u|7; zHm+P3#DDk#+|q8Y&x~zN8uj5TF#Et}$~BEJ8~e8;vyua*+En_=JEf%BKBFMl`fW8) zew%@*pu;7tOjw!&;5D67UO`SXQW(P(&e-{YU(EdqtsfV~4@YTT#*`Ezya3EN9$~t* zn{`)5c~TmjQkR$XAZgCuqC*I>FBR;B>=1K(sj+@+hOB57{LTKw+%4KS#3i||zjO|Z zLpc_m*A~P$TeUUXO1|w!vTIIQCK&`bK(7?6#A)io zJ{FYeSaM{}9s#+~`m~W5-RR98W8wLW!%qpWz|uo1%~fj`+X~25=#aPswr+m@i`&~x z%i5TSq%OUMjc0}!70owkUneHz&KlP|H^P72pAEIM>z!E4)NXA4x15NY#-nu4Fhb}p z3pRn+-(5LzXm@4!O)~O8aT89Z0h3Ev`pGURclXgo@SUzcqZm)7HtJd9aRXj}USn8V zEnJ#o&^5w2Qd(Ppt4GIduyUZVYrOt6fL$x|H>R7(40e6h{#~X(!$tbrN#DB!!c;hj%N-10NeB>HB4^q%2fV}k>;ghUu31_`ybG@CD0MKhBtgQu$9v(i?(#aaWWmIzodpOlHsT% zzxIHa{A)F;$sd8R(@M;JZ4-rFCrZD~0>sG@?sLAF^!xX>xFH8a-(NTTyW=ROn#@Aw z#CIq{9WR&rrKO67HWxANiYCp8K`-ZtJ3APAk6Ik-hWZ`9e4nnW-`@+p-0rT*y{~7N zqAVsaNE=pU5K@m=x?Vg8`D;6fL8#nvcaBrO^u?nV#Yp9YTLvQ`!lv`WC+; z*XoyB<$p;%2~GxMZ92XZ@|lzYs%scFE}nP#B?Qqyhb7$oWoko1Af8ks0n687D0O%l znI~0LWj>LX)in{g6RvzKdgrl1qpdglYq>PNW}{(y_^$F9v7Za7-gMzHDc@+UD%x62 z@R1r(j?aV)58Foc0;e>fCsT?C<|S){uXtOF2U3}!#IYMWXTQ(k%Ub?;p_^$56Oh?~`RyB2#KLJ`f1$!F4S<`EQX z^Q6)y2goQQZVZ*Hl~`Hg1Kk5`*f`*H&F1nQ>tNZ{yY2{eEFi+Z|EN zAbH-jn}_6+*te_qcQ4B|35F*%NU9*X;FtT(?!Ai!w{{N9bco;^e{b6^!b{mptxuCp zud$4urKq;bEwV+>IwSH)De={&&dV;8%8V`f-2cDZEb8*-Pj z6nB_DIh9_>B7v75tZqkVf(0bGB2b?zhjNX!#CD|l6uG-MfzGO18MmO|l&MQmJLlPr z{@*_G2)ib5l)4PASevjkdMKQU<(>u~^t{mb>Q!TTZCsIX*UPogc1k{{1cYXbg5c9N zf|GRU>OnmuMgG>&7t)167{Ry3ohoYET7+i3pfgPu5Yv#gh>lmy(U1ivJeEAFQ@=F` zJy;;r_nrL=DAU%s`@_4E(FVN{cvM|w>%c)@E0|=~I($KIj*FB^0ZEidbsWn!z6#I7Z0{bE|lhN~keQ7l{E6X~a+FUo#4IDMnA$ zwpI^&vg20pVb96>Ieoqp+1KIF2cEBZoCQD4#^D@4Ezzs`Tl`X*_%y5Uj&|=9p9%KX zPBb-{na;N~X4Ell$)Rwnb{`m_^2Av#n^Tk8)HVK)rm=yEDvK8q=QrgQ~js5kyS*NV#dKr<|qttT{m}iFW$HVKyY&WzHY?t_)>1u|^r7IQ@a9{~0nL^`E-Q zfoNU-f5s$NwShEdhWa2Btt0yFeIYu0@o_^*fEju5OIx?^Hz6;ad!+s!*=}2 zbasIOgT5yJsf(U`z@1_4mT)cpGfXKq5U}EGJ6Q*i92Pz3zq;cXgje8l`3V+7=XBej z(bN7ezs71hIh}WI*<6!Z5}JpgKhWqVq3jC@j@`qTnl&5K01z45g=IU3QP^g-e_1wJ zIvuSB5yk2kB`b}(qON&4arQcG$h2JT_kET>%tbmo9T>UVQ(UgRNYQ*gnI&F-yH(Is z6!Hc86#Gy@KdezYj5iz{XL>Mi5NAI7oXslcP8f7~ySQK7Yx&o6dg5nv)$iiSa(ySZ$=t3mx;wTq z_V36(hR5*kgN*NYx38TAK=ZvF^?xj^-B;lKY7^ockS*(G`K#>c_?W_X?Bf6oEGLvp|su3NLigUqQWHkW^z znR8}*il17OQ4y9G1lZtk8>mzpZXFgHdbglvB4d7$V+T$e#J4$N8gYHBE(~vAX=j!# z{UaHka}^7XjL9p+&Dehgnx9NH+e*x-%d2BfP7P`wUt6vxyllpp17;^$s!aM~{xS>? zeY@8i3I=WIYH9N8w;)Msn67@MdqTq9+hrxJ;<#E{RYd zPh!+)dAnu& z-X`yK+T>ZmLN_XV=JOWT!pt;xv7!Gh^FndGjQB6g#z#@-%hp-w`}?{2dY*xz)^ zZ`3LY(9`0PtQ61*#GfCQsNWs@7V{-8N=;^Fk$zQAhK*v68;Na%5yYRf#ZI7^+1g%P z!TcIyKec+xIkF=inRvt)OC=KGgfEUEBP0Dq#5;I~CdpFag1gs>Djy!9fFUi2KWRI& ztc`6=;JBI~L9w1)Y`S_k?2szS*zg(w(|AEPdj!~DE50P@s`D59&j2|W(Hd1D|2HxH z(UJj%E_ z5^N~~^BG2(L6#&d=}-!tBx90Rglu!M|F~1<>TP3`bI2buqKVMHJ=&m4a*smtHqOY$ zD^e0;88JblDI*1QS7>{uNu|{z4%&0lnFsO_8P(!`%>Ck&BvpW9S8xK3ltm}~frm`H z+IhTvJjP3AW{M+d@VAj0lZtlq!zf+ga>DmcHah$|?jt^*C&yRNOg8hb9qqqPI6h;m zv$X1Rh>90U*@AA)vB4;or05h$Es{FR^PR5d1Z`mu5AEwC+k&#-WE9IETIZnns?HdE zF3DNGgDXwv?ax@-F1Q7&WnCWjlGaK36b!IIb01bHhwEkGVn*p5vAq1gorGQUZdb!nJDRzV!`u{>0o{JE z?fhFF&>qsaz;>#Es*CHMZ&sCFD*~m%nd{I%ILY5;AzG>7HtWlgiv^I`|A;%%pU*Z; z4F*Byf2T>KplxMP#NLDW?j)Uwhc9mjg<1s*ZfNMIBFYp-8TI`$*!fCt#^WsdcS70~ z!0#IGlihEH{K^gO!n#}4UwGa@lWDx-h@GfW!vRkpV7H%V<-h_fo7c&kkH z)Hh}LcKLR7GFI6#r072rZ9%NawC=~6Je!v5_v_R1d0pCD%PpuX`l)M31G!A_EUF%# zS$eLFSGSPg@OdJZG)3tNC)u^rD>9EUB;YU^ARuLwdVyymH#=ZHrSmyo{ch)FAPz+3q2?t_mMlUpe|S z6e?wdRW+wz%77!i_2S>SDSQRkcq1Y2TbXIk=d?AmtEy__ zpAT56ofa)xlfEQWSIz}88X6^bKKpAPD@{zv@K1Dsg2#}=-z!r z;xLM9hE5#kDl;8xo`6Y7-KYU`TrW3VuT;60cu}t;VjVlCPfE5_pHm2rL2zQ1mb58o z{6I5CbV2~Mc5zn+oa<)gyghD@-&oWdT0S=r=XSByPIUXf?9UFoC?04E3HaXkwuXsA z(9I4hO zM1Sc1Im#+lBI}*BXNzfv@e;ZsNg|vNqpQ@9mo&#C^s?GWg?ly+mko=tdg0NhCAQ#c zc2r!JP&4@t(y#NHilaU`m4@ftyXxCf$8r3)bTB0()jw~G`{2Y81>c;)@QJVTqz`pK zvc>T`QTKAU<(QW9l^BWa3^UFkS?oaVoj1PHUzO%s$qKg9jF?>8?Y@%_+)z70m0#2l zNbuCpO7qV>+#j7tW=h=ey3dG%zrE#6id+R9X4;GB{sUMx>d+Q0# z7gBA8svku*$9`Yh+M!J^B%Y`r3QjeN?wOMPRd7blmbcgaoiBvi9&%S-6wlwN{k!Rw z*1eoB_}e^kR{0dqv#B2@lKc@4M)qXa)?J)0c-kJaR0H4-H zV59&LB==DtOmbSyeWwrK4b78kucDTT)&SSpbpkRT&fwTw%}mt=`WaAg8{0Ur!w1_g z<8r2-5_729{9{Kd(p%2KA3shkro+$}Kb!CK=?Af7!hz^o;3w95}sP5G4G&RNW<Afp(caqx`3*>-EV-=51%VmbwT zKJ+1z6>o#wXp+lqTs$W>K7S0k8ENbe3#AQgW|Lu6!KB9DFoX{hSg+oPYdpK7f^USC zAN3;i{1qnL?Q9}4nDEq2&S4v&;d?|c;n|^<{^w0h*!?m)Jdv-B-e{p2% zKf=CBe13uQ@ZlNuB8%(o5AGIP+sHkCkR!+fz8%DYpa5kAXN^kFQuRNSSX)JmGh?DK z29s>X%YKGc;VCpYg#=F-p~a)dCL9!V7rN_ki6s16j+UlHR*n^*jidC4Tsx`yZ59O_ zYOg5rzXx8KvKPxb2iz!Q#?fvw{1&HSR$&--!hc-tpQ=&hPTxSDJQtOOC$~l8mFWqS z3Tcm>S*UB>fl1q;O+7J?S}YHvs9>~{UyBk)9Cj}do7|Hs+|zD#$h(>^u0M6 zhkbiNaWLrcd$~W|i@VrZm$VN~!Mt@JK{^O$`6iLpzrKhF;s;~};qxj^#BIc|aRCzf z3tzQcOyzrG#Q8!JVT@KVo5XqrS>6CxT?9q2WnWt4R#msBIVpcyp+Be~WGB_PM(#{y z7my?xH(zJQbbPg?4!$u(hdcB+QHiYtJLu&C^MgI_39Y7je1 zK&+e(flTPz2l=mU%p`sZA=R*gB@8$$_3wZI6*cW?#^>98>G745V0%kRC;77Dihbdw z7J-oO8g;fSpn_$=8B+{;R2?m`;lb2UIql#nc8(R-&|B}MuWgptVV-P0qif1_RP@5S zAiLr-&sGAB-%w99VlJ2xmO5>+ZAm1=2Q)+p-FkZ@ssnDOvoq}S3;bhlb{oohpE-*I zCH9$M2QkYdI6CJ6MvtIQMLm0G|FA)UZaJ5ic43`X@3_sCH<8beDf%CRt^buTq+;oG ztr%GAk1CJK%VH;E0cuRrt^3Xy%5k^O#$6)O4gnH>1sje(r8JvuzBsDG(`fm`0p0nP zR&gV+h}at!($4aDFoT+#&{C4XZ5=j~TCjLiR{uLJvvkgxRYnCt^H;Ye$pQ#kM2#I~Y9^{LWk1V}7ba1-k0yA(> z^)uZ!UZHXbx$DIqolhiWX62%bkNc;9`=x{9#HrM{!Yd7!_9`sRGgkHaW&k zs?R35LIX)`Pj~Olrp?a7_JKUAz6H_bhwtSDdHJ38FEVM#m@vu8sQ8U2GjG9=%8+sq zOkb{8XH0SK@j)xJHi19Vs`9eB(NDko(016LCDzU@C$dYf7--D@CUfq?2p-{N4eo`Q z4UYsBFdX07^r0kh6X~lVaIVa;%X6BYX2hD5H&^?_(u>JH#2eA3?vrAG!RvN3%U{+R zM;<=QF1XE#lvID#QdM6VXf6?>7>g|@nRUh_5(`clQc+Wn)&68pRa86Qw#bz93Y zcGeBbAN3E+_?k~ePsjdFCZ<2%*bU*uHOKscsU17hJ*>MhXTM6k8=M$m<0|>HhA@w! z+z)h^4vEsh#{Yckg*JT&iwdI{k~iG3msZ8_b<6 zBr_g`%vBH6)}n&ZCbwAUWOH(0#jxXOVLt7r500O~kO}s4jB#+-{x=qjOrfOdPLh%= zbK4sT<;k%S8eCc8_ww**qQoRHjBI>UIv{8sMK$#V23^8IB@ll&#Qc_ehJ+v!U#543 zfRMnS-)(`=a#9fS%iJtX>w1>Xp?YSXQ1Th*&3)c0ul?RP z#ty#3Q(Ox6P7mF9kjT~%JO(1Ja$g5aC#YzC=0a@x3&`!{N^QwT2L|^&?gvl%{Qa=gK6L;EE;GlmKthFg3ar@nl4~EwK1Xx??TftIKKt^aB^K)GR%_g5)Oa z2<4}VR^}KaQ(#r&F^%97xsg^^Acg(2XNe^@|N7$`9MDck1tZfmD~d!KV$$5rpWS7W z3}Ad++_>O457algvjdMI{YBz21EsZy?_+Wa)#2H7!jYGzyfdFK{3!o9e_uuFzm)~sM| zXzf_%&&@*M$a2rUzT4K1Nw05qqzGRk3%D(e?nq*3h&cXg3G>t(^FomQ%On|#>k;}G zxV))0#-3!kc!Y(30M8jK9%&||p3!oD?S3yUbt83lY(>_Ask6)EtkSR@Za3cFOlARv zHINK^lQL#DnH56POD6i#8WI?3nn;Ec%%G?oOWo3Vc*6}{iuHZTWCqw{!f4dt7Py94 zNEjTZXDslQ=DJ6M5Gca_6z@rM@JrfJ|9W0;Tfy|AP?d0-kh!32n$5Jdksb~oRjz=W zQk8mmxINL2wMhkS0IjJ-W4!jIRecu87y2_BmTqL~I;eari{cNl5Q=Zh+-Cd{meQlG4HngAUWljrbu+VF7M9d|6nGiaUg9 zJ*JFe>yeFL>-33FL6SK1juB#~`%VZ-xSw7FRu8UO3kkd>5G^18=TT7MB&HCj^~nVF zZzA`&a(N z?)N^cSVXHXv#*5ZcK8-gCWCB- z(+u!eXh-Zoq%Wy6h*{aHS}ON&!n$}OefW5T!-wJ#k=(iY{Eo`F>p}1ZPjdXI;^G^_ zmM=7f{*K>DpU_y4#15zS#*EQ@V5LuqJQ#e5qQno-oi2sTY^4CM5{DFZZT*hJT;p># z+}dl1nvj*kqqGxFyoh93ftj>aMEaBXoC0t(Qc*OJTq1(dnwmnXtL(hPH!Ct8%SigE zJ|b%5MM9Z0M|#lAJM534KM{JpP6Kzy;@EIPx$Vk#KX#z;2JRjp`^TWru%ZxENhFV; z4kSYoj+=sPpc_cQW!M&%0X36sw@puSsq_rg2gHKABDk-jL(hbzOtH>nOkuLCJu69zd=iz9G| zqf9;Io7Nyfvm^eUTL=!lshb@3z&feC43zA70=Fyy*w3@`6Vd#YRX_kp;IP!=-^)Q%5+P27VCY(E%g2vJjjfUtWHCe{p&QX15Z}wGyWuZ|++} zwWE2E#u44hR+{+;T=A8y)}9`K%iAbNUrQU)(ZK_7{0NlWjR)ZABUan#5%~7kU%}`C zQ%)VdBP->9{`2j@18`CmIp9NrqxthRo>jjA7>z~;IGS?__W*n>iDK>NT}l>iKaFSA z5=>?}+aeI4PqeE*%19`+f+OJJS^Sup@>pR)0K*Axf-nRQW`!i=&4P#!a+QQtZ(con zd;aG5>e=Uy$8SD7I|7Ft?PQRLOK7KbKNL1Kk0?c_@lAAtQV$%TpAldpo=eAx>%zfl zgmavYf_Uu3ZblQ)WMh_rQ}R%bB$Om&>dUb(tWr6wG?8b9r6l&GAoAmM#>$dbek7#P zkto~x?)~Yr&+m@kJ}W1gAK=itzM_)4r{r)VB5vFD53BS zy7c}aZ=@MYB);*G_=H<1${tt6Byhs^e@Pm|)K%LJQN}jvwMii-ODW}Uhnbc$cZ$7& zDEB4Y2?2XYs{juGyYE*bZIRqGpc}<p}IiLW^#$$>2&JiY7RX zi%hBs>BEk{k^v2JDsCwcXE@J^@=`u1Z7rXsI4bwpahAVhD>Rs)YYZ}?8&F||bKpf; zxmd>F3s*^=2Wgg*Df5!SemM}3wD(~3+I=X3AA-Pd)E#6Dkjl5io|?L#hz347s0gLK zCxVw2nuPCgPv2dZ{gOSdj#NrrJ@Vo_<1!1(&@D)D7Kd{TqAZN#>mmWnADn1*WTy*W zS5u8(Es~7V!j>w+`jz-&s}5sLS_}8==>?GdRd-YENTKw(He6li;~?m zymSg_%IM`%PvrAI|CwU{U;lczL}<8ih zG?DTtE+0QSVC%yr`$;1nnhaAKpw82nE?gfnoPx7c@bLV@+36$FG9sTqh7-EY3U3ce zFJ{uiq|g!24eJ1a4{whzUmpQkR!YqmMMMoMGEB84!rmq9NgU<)Yd&&OQoHNMMVJDyD7tpeHEu*r=)k*7l8asHw3qX>Fh;pX?m9R{! ztLPP;hrt|2WYbF~W)krGmUHh#3s<;y8|S&{_aa8w}apqrHG#sWY|gK!k~ ztUme<8)y&MwxD_b-8jHx8?-Ov)fb{a5Z&e`$fk4=;G=&V7bzX268U+Bn~C^Z-f-L* z&a=|{%fWQ#3T}v6MRsnj6Nj46W}6SMPRW%N!$$4GDnGX`6Kjj~SV)j%gfvS&5OmNtDv46L%ly08050SFI=}6rSP`-Cklhj=by$ zK$*Wya2n7>w)LDy$hgR>7dn6LqaZ9&d^JsRMhGTv>a$i41sm~tHO;!2y?T8o++Jbd zv->*i-t4v=^Lsb)-y6eUvNd6CcIRtJH?wCV(jBup$GvCtbr@ajv>mf~7wTOwd7GIP z{`|oMX8E3B6lEaD!IbF9V1~X1vtmZ5(!W#XCs3Eku8_b|HX>AlA^{FFv<5ky6Yq4L8}*rFWVOaqtMj{Sg4jaYcn+>Csi0Rb)G*(|I5z)c$DIgUnU zbxcoOrY5GC8p2#Gyp&K9jLEJ)jFBg$nB}_4#zcjj!|{V^LnOgRWPin}pq9Q$V4Ou> z;F3+oG`<<$korWpG_ZSp{)=D8?(qvXAANa_!q7qP^;P^Po@DQ%XK5OzUw)%*D7~C` z<)>Usf*`6njh%Uc2xG=~WnW-0Ns){FA`EZuiF!&qt@V6iy=d>3g}qNHrq()0%t|{D z_bln!kFP*{+(820Qz6e|XD5VA?mAX&;mB4p3uZxx((-iVTf&mxmS|Q|eMJ2*f@ona zTRZ~g5FJZe4f_^dm&Zwh16Jvj@Q|(%LBtk~>@iu6=pjb#jz*(Lf^ep%LS%)QF^5MK z0a&7WESPxdxl*r;rqc?hQ3_e*w6)8qa&IQ z&>bkNRfr$wvX!86<74ONEnn5LC1l~{Z>#g&%V3s-_~Dxvc@7Fu_cw{7TGE=Z;h(XvObWQT5t+K+0pWm(i-uJy1p%u&NNBMTR}dup z$bTeqQ8WqhWscnI$Kafb+S3As{J{llO!b7~4U*?*7KFE@l~q7-(A3X@1o)(AKm`X9 zU81Oks3zm=e6Bqv|2M=c0(wvY{?*xc%z8VZ(*&7Hdud~VO4cYrpbi?6Qq8MH>q_yO zl(V!)zOIn5v@cc&SOL$5GM4ptuYm0lvJLK_C?e{?U&F*{e$*;Uq!wvM9=mZk65d@F z3B@5e8hjzUj4zMb-%Il4>g1fOQ6Emvzlh*$LqcBhtx1AzB7n&LruLqTJTSp|E%&K6 z3Sp%W7jNiWx=PdsRzm9;!ABH(t4WoawwCbJiIFz7wfAGExsBz3wwgHrOfe8ntmvCj zb9BGdsK1aAd?LFn8x5 zJ>>DJS2}}aZ0N+rly0(W+H0!Y{Ll!eZp)l zrU&Sxf%Qx)DLq=z6j5tE2z83~WMCmCqsl3qedg2|4U;3vO%)pcE!FIx@CUh?|tu$XEj8%OpPt@TWNSb7sYYLG){jEfvl zHz@8OGAnDxktY=yUx)p6-*Ooy0d|*zgR;OC8K$oLPtof$k*&%j_TT5`s9e07i&Z)8 zs7Kflh$cbwwWnwvW)gC#^FEnChkx+x){Zx7dWksG@nLY_`7< z5LQldhjgI$5IlI$T8pP~me=dBxTeuJ^(1Aazl<{)2}Ox&p3;{qH1(MlG%glGMpt-= z`(}>9*hOKjCAEo4P(H1RA_!{zm%OTXJT+zKD4&kNFp@xJ`yV%+F&ivhD?Fkv6O~d( z;syTx1i%s0BzXZ7^L9U{0q~8Nf*EX~rgE8Vn7`OcR~aX3Rv^{1urP1M!I-H^J`A(4 zVQMLGS8p!c>@osR$%4&XNvX#!5s!?s$Ot6dO${|ihmA)bW`Z=R990?nHn>L0!%U#4 z3e5`(T%6|Ya=2Q^02-5ag44Wlde&tB${W6miQ5WpLU<+1Ne?ek zy+3gOIvyj1B2lc6HelwCMwU57J;5`Jizp|H?1#&zz{4yaVJkgepmtH0XEpSy^21ts zSH!hy@1(HukRGtp5Xx@4)nF*T1u=~$>fdWralVAT+{y`d#eSnAuxrOrL9@uMR=8gi zw2|)stO^xu!ggs26hT!Ccqm7p%%Iqk$5r41fg=SQ>V_Z3N5DbpGEUo?%La}i_e1M( z;i~DW4k@`4_X4erQ-69?nT?hn{tspdu_n^!KEBwgl1YPmo6K_l@r1MdpU~1?H9D*& zR;#^zD&FEC3CAr9C$mR{6O$01e>{22zrH+w43fF~7~olw-<}5PW4_isu4mh0x=zt- z0EE}5lYwv)lgz~(l^>^WmB1mP*+EEKgs%S-gdx>>=$0wEty21=+ycOMas@3H{m=One`er+|MHj@KRv(v^0?vkQlY?Uhy8%JYY`ur)A^JJ;)EGyC?~-jM<8RZVvSmaFCuCz#vXVm zknxDJCPN(+VfYwCaRU=oN2x;(Jy<1kXBtOGlwjopcGwp126AvkE|w{ek56s17J2W~ucG%T&6un7R8MBHnzPu$)fB4D{tkC$RDQ!7o?Atdq@%zyrZVdQ*Geb z;#X4Mmil7`++mQJVJ|4C_41JA{Wz>wGX(Nk;%DID#qnFoLGCpfrz#ZZQ8{Bc(#n62 z4RMK>j5LAGs#7MuCeinFR0;td*%)% z^zbZ+Y0`h*H%mvFl-_Wd^I7sc9AG}Wf4;%Jzp0-V(NW(!p>>E*uBQ7ME0gJPkFZu%S<^<%UR|D zxO#v39`IzDbPEQKX~c;rWUMV27RW;kmH6EnN(#K_bEFEXXoy-(wL` z?liuMSZ1Q>EM`kWhV%2f;DYh!-p2C~JOJa_?Wx$FOED!&33_##Pz!1X5OAm1y)J`( z^7NKl=9;vYRFQ!aPOZJzrAb@4Sv*clV`#IFt1M!D_Bq-eYgp$>f1X8_WsdK^A?Gry z?*Ila&BNO=Fl+Jd*|@~JXXf9GnR)DG&BMK?O|+miE7OoJVLRb;;SX%?7utJwM*mZ4 zs%B<+HWD8>$^^UA(z}H{vXm{%?#OJccd-ONa-DYEd2oy5&*F#vVEL(a^tm3c6N%NvlwqQoD$zTU@ghT3KqVVj+JKn51BibLBfA5-oJ4c+m z*Q_3Ho=I-lShK>b2b$MDaFp9v_aodVpuAc@RSwa#k7nZ8jL@GA(P5fqr>x_n#XK+; z2a7(hJqoY!?GY$4oK^?Wpz_O`-Aa=*E|T%=R;r2|tT^@(u6yBJRyzcI5xlK}$P4Cy zSD=uL%yoHx0?oUWDBK2FLNfbrv5qU}gvZrUTt3B@?E4z^D=z}}t8vchPBBU({!F5d zzP#7p5x!ujaHPZCILh)A1vJI^T8kJ<&=^D$3D21;&KPA`Fo|fgr6~6B_(4Q(7h@r; zj}FMM%SJ$}z;_uyK8+!|6=-6~qt{N~H-xmZHVH+ZgrYo<$|sKw%5NP+=5Z2-@#OY0 zAye{XOG?WKbsCt?qSMO?q>R=e)tx~Ug}&;uDw*gEeZ9QKH%H)qf+)umoc^7%M+x|v z%+>$N@-&Dh?9I&-M<1dLG)P3^(XSF>l#d@B2<@oGHAsZK%y0x{nMr|)QYOhHa9Fyvy7BC= ze0FnlGip3<=ASGRB$P+j85pxmbF!YafTM#dr^3+zcmO_OP-F$YG$h4tJe%Rjqy9%i za+*4y5Qk*J7cmGinsZ|v%~C>G-VNd+BbeQ390=ZmWDOay+$Jc@Vh}`REue8_QzGy) z=1-V`w1~(ST1XDc^9+YUo`;yAt_XPyvcjE`%HIZ2K!$fzI)-?0hVw zejJAJ4Naf_0E9$bJO;@7zaq<7Fb&E;go#W?=`G7_%@d-t?L`{i0w<;6C&j=U3#{OmkmM?uC(o z49{_jLNYZZvI#CzF*0|TDvO>+eR{ax(^7v+NX4sImizHm?vUDqNppAcGCOmy6&puPF;_ytAyheh}ZB|_tf!%Vg%sw z>zY}){up&$VZHZchld`H@&GX}N}d?EwCj+{E*oh)=&X~_qY4L6WVsEhOuEj_w&G$^ z#xIn*Vr6ClRoU8E@j3{@%bOr~r-ES~f2B7@csyxx_WA65u2s&eU2lzcP6RF$NmGO* zmt_yOQoZ){VRPU?8>;P36^26Y;wl82W#cUK8!;c~(tegiAPYR~BH^MR!Ky`f1PyZ* z--(e{v8%*|^*biG;gbx&1JNlNNAuc5vUqb7Snw>aujue7 z;fv1Sd|O00+^Oa;+pV$E&x5cE>RCKd>O92Q$O_yz$e1S)`8OgY@VAR+S9f4aUEi3x zU`{3db$HORHgLJyu{wws`7)_Y^*-iV$XxV)f2)Q-^pG{9zM*+BjbK_t(PB^3GApRB zAnUN=G$kI2ZkMD|7x7nS&$|#4;#Jn0NDBe}PK8FJ?}SSEZHZL>t8X+cEmCC177*4e z?M)K3im)pxydY(P^n$x+81u{>c?^=2Rni!Y5|K+Yo3n<|I~ObSj3l9=k}nd7;z*DJ zZ32Whhuo!pJep^u#>1YpL42D7DEU*ASK~^Q2eST8anvL^C-Z|N<9Cfw*Ky`%jgq8H zd(Ear8H`OG5zw@{mpDkXT;M6e9!GI=x=w?XrG^xhA{I6h-g18iE-?^z5#+*MpG2?| zt%Ew((;M{CV2*MOE-zmaxv^4xngn@6b-F+|6t=`u;s8AQh3?KPg@=MXMHx0U2}h&{ zy*BiSU2Z}1EY$OiD2>!bp6=~1zezisG*45QGxiQ&W!_91Ii}j10m7N0v|+GVv;o&p|-5|B~k$E zq*7=_XSU+-0lz1V4c%y2RDDORJb~_td#3_*-LUuG!1pqudp(^jN#j|Lf>2P%YMm^M zC(P`VO@joKDMrHhI#@$dTdpsa^)J(wDjJ8XN?^FARN?MalQz_fDx@3fL>2V?X+%N~ zcj-g5nj%DzG6wr_@rJbeO?(~D7lb*Q&K6fyW(mqWlPZLiX#gCmiJP|~jLQhYDsco? zatOfqyAdhSxnJiE7p|m{*P9m+&a-LELNd#Fk;VmK0s1(qE_tFiF5LwAlC+lRM2;8V|ei3fam1S>Z3Q7lAOlh5v7b(Nht8C2{+2i z#7-Vga70wL0A~ahzab^ga%X8cmd)Z;h^KSEg zDVn(qMeO!^ChRF+MRAUKSoVjDH<$dHVPQoeLvZ?(FmI8D!hzcb_JVBvW~BsdSc_=U z`)$;W@U`cx-z*L|tYN(HeKqYb`_F&JhfbJr!@4!Du67!Kt}lu|kG=Yu_)(sO!|RY` zSvE9{{*`69{Z~;9{Vz~cAk<_qkc%n3v*4N+HcgQ!DsnNlAC<*vJ><9?djpvGka|92rgUCAqJ(K8QhI7RHl}Z=S zUw^F|LCNDA&Wg}BW$Znn=-(g;$nui|jewTdjnJyDXzTb*wg5D!PLgaqhy3V`Q2Xnz zJ?*bOxX8Ye_W}R{?Og-KdKUbY6Nu|0fEX9 z;5-dnv75V@j!}Mc{^3I&guyR#c|XUgOVrN^F1thGHm3`I(qHZ}_|JOJ&+h|His}ig z;CPNxG{Hh8D|&YoMWjhM^2DD@Tgbu|ciG5U9VEF$I|tC!XlnUG;*zHP{#y&(-_d8q z`j5hJy|upUvts?1bwzHj|IpC2{rZ0|AG-eYd-3!1mc@kD2G)lCgWakM&iH9iim9!F zY^cE@g89(_b)tIH&$S(U*#P~-REi2}K70a=W6j(9;p#s&`{5MV2*w6p_ z_|W-(L1%I+lVvp-%A9+pOANnUxo-kjEYmlQ+1(IAN>3!z(U^HDiY6F*LjWFwZ|bScmj_6HQ5e~Qlv`Cnz~yhHh~C`McVGfiFJ%m4fMEVcg-q1Lnj zQA;u9iOVYTufyuY54zSd`&68E*lAqhW(sDas3_<*p$szLY++j|0jLwSun?8;Z9E%o zLssVTk7yS5>fnfkx=mYed!3(OesunS2AA)YOw$O8`}Ea0n=JX&}YhhY#+J|rG{ zEp(cXf)G5U6U7II@8TRFFsD&}6?lG|FjpjD0zLd|_UN##;?Y7sg9@H;DLZxf^;dzc z0qmHHgoCzOg7yLad09&z#wi$OMLNM?R77Zwf)F_&uDYO6!BK}wApq6&&(PNo^>a4( zOZ12)Mn;W@>ykVffTiO&tnTf-GP+kr|BIB-75ZQ43%}JF;7a{ZU9kUXy1du_?&Cv^ z+oJvdj0agPwf=)XC64pUa?^i(Z}33Ne;N28*!{~#EvtXYuRS(@{#vm3mw3AD{a%@B zYSEI<)P^{3p==oQx%xou@(q`99Dg?c)>t<4BH z%||StP&oVPY|=6%towZEfXk}9NTY>ZbnV-_c~ZI+a;lzwwdnbV%Z{^3N|7A~>6i_~ zleC_Es)uHQ2sX!?Zj0p{UzqU}S&B2VDLQ%r4iAUWzF23AdMfm$D0_`>Yrw;@3m?_3 zD+i<1I!@4&mb_ZolJew~!#5l^E1cK(HtT4@zj;XUBJw7J|5g{V75X0!U^+x} z(QZX~20>`&o8ex|ogfCotg@agm^rpHa)@j8%BGV)G(U}KmBT-;E?+CF6taGk9f5xy z@)h9lUt)8IV#Z4lKP&NWf|!#mEvulU{4uEO8n#IGOeJBXgsbrSS`%0eC4oGy`GP~` zvB-PhL`;XE@oSA2LEQGXO?~iN@X^v9T8o30V%jzDEbvl8FJXBQcrhVAPOlzf^y(oSEou$(pO7_X)w0%r zlYpPbvxSw7JlwBs`?YPqwhfj{`?YPqw*8UUwtHRL8g|Ct+UB^z{#V7i-J$=#YN!kL zKN%`}``>+hsQvE}yK&^9^i~W4B_g#nZpe0vvtW6IBYrf3fe=97_s0&FEF4kQ|n@djWD7m_0{FJsZO}W z>JTiiu~Bqsoeeboj-_p4m@jD$sgK$R?UZpA_;-Qo)In|^UoI4;se1;N<=i*8d}ZzL zmGlD7@|?!C2<)hyIVmh+>zLL3Q0n>3?(g&hvjjMK%}m ze;E7t|9kl?#Q&eydFuJKsPvw_O|t>eRjAt;Fqyk69RN#@vGb27qI*r1Oy9+=#fWIF zq;$1bJ;XnQhgE<8C5OIeLXkdr#9jF)7*D)N8@*r*66zIv2nlgg+ZsSIE|eb}?Y~%4 z+s%u)j;-4AuJ-m4YC7zwcc||l>)D1lYj3sNhr_@AsXVFwn4cB$pDh1dF956J|8+%a z%YRee%l~`%td;)}g`u!Me5`L_-Dw~oQ#m_ageWt%JcC3pAo?B^IZabZBU=P-Am&2E z?}508L;O1m9HfLdLk54{B4DtuhPC7U7NqqePI^Tuc}>5RM{xbFNE{*2kGC7Xr$OWe z(PTf0>s6D+A?ArdQ4+jJ<04to^9N;8P;uU@?Gjfo;c!HcTp7O0hV6k8xdLg^TJcUC zMo=Hfv18E-9AcE=(Yx~Tg6h%Nxh1W2nT~!{dNr9pp6Bq2^`C8%x6}YutpBnu8}0Zn z#nATa|9yP;`j5e7$7TL}5$|8BODjspVqD2=hWNLU(=1y0eS&^2@Zti-twcmb(Yvuv zIeE*b{hw|7vU2`Yse7mKpNb~8^?y@S_w)Z=J`47r@}A!f?LC!QcUb^vd4Jf@_|Njv zGQk2=K5ANj%94HYRs6MJyD9N(lJBvE?aB67$A~tn9UdcEHfCsyXtQ;9lpnGh;AVA0 z%|tbLrw-gLUJp2zR*`?@xpdZG)>TZoEZXm~WXV;*eoJ_<9qhM)85e^6DjM!6)=waP zp~_{UekGh3>euSh-!9azYQa9zZj4SpH4HH4<{-Io*7naV2jl`oqN}}!WTInz*v?^J!*>u`^1|{Cw z@djko{I8uBHs1rRnE#rpz_$ONs_o-{@8z>W{=ZAk6T8j;+;EWLMZTF=syd%q)ti(V z`N}(+8b-e^!O~11C^X`CWJ2Cm2Ek>BcPNW~r%3=Cx$Cyc1o%EW#UZ}KOn~B48juRG zpw(Tjkq~fLcE42_14ju;^MGD(%5it*`>RUzj^J{nzusdaKE6P|TXVWE&)>H&?fTN} zbtL-hop$@od-bTz>m%o@Qb}pY?^QlSb2k@v>0PiQ=aKReUre}jO=~|tcSUuv1FEZl z&;il{!-)6(m58bi6#EPCt6Ja29&QBB(4f4Btm?XmaK+u>1xDVdG|2IL>f!SU{2TmS z#9|uI`r5VzYIr#T5UWe3t9~%u{|WL{5x93xN;=cLb~Se+9PkKPsxB?Bjp#<-_#< zQuWW{@>aK2uuL2sl-ItMQ+N!5h^Ga@wH3eT`nO3i$I$9gGfq1@)JVek_BFochrZnEif2iF+h{#MAsy26 z7S8&H-P#)7^2x99FFK8OwLlnC4#$@CaxB@e=J4?nYc+uRwOv;ElzT>zqh3CQqN6eo zhPlSK)nN+f+(U4frv*L)hqJhd@^h3=55b{C9@Cq458WcmCHeF-Fg z?M!dG5>H=eE=@PPFd7`g_&aclbDYkIOsA1*?C$5rIqCnG##GnGrHqZ{ZfVC6(x{5n z46*P^EtKb^q9HuVV!p)}ltvLB-&=fs48EDhSuW-d=Ge*OtoMxXA=^<<;8B9|X$Is+ z0(Ww5Wo@bYt@WV)*3TyTKUX#e9|)}S z|1nLYt^aGrUjM(BPj&wH|7Y**zuUI8MA7-#e+90Z-eY$nTHmrgleyzMY3tY2@w1)u z&gnTTrASD^F-5WjBuA6v{q1kziv&P`B5B8M=a{Rju}EM8*Z}qyHuly;1Qf!+H^gNY z^b^CZ@*uEEBBtA1q`c3+@1YelCUi7|q5OJIKYAHV6O2fbZNcZyClv*WzW|>kN@CmABys79c5G$EWx$hS>?|$)Cb)y0-`8&B>m^9$>tA zjqnbpBMX_vXIYz@kn&$lY2t;uin&NDEa)*Ss(X28TCz2LB}XB{552v+*-TC6SKnpwf18z={)DN1*cdIe4~Vh%Ar&)-vFYI!L=| zNCb0{kd##jilt8ZthQpBN)4=QX_k;ANTL&Pb9TAsXA7*Z6E|pDk{w?0SX=fXbwQ`w zWs(8?^Il!;h?blHL|EOIC{t~GhaK%kNJ%(TOu1Z1`HAW^!s<*iv|>g)^%M8IReWtd z%RKV1P43Pv5GmBSy5+w0F`SI*mcGt?hKnVc>vjB4K&o&j;4n)Pa_C{aJVfF94Ex*; zzMk>V;@!uJJ2vIseB%F)@#Osf zO$y_8mlq(&AYC@dkFYSa;GFyOklzisf5|A+eT1Fd_A)~508w=Y*i|?C!`(}$)cJK} zl&&jqGO~kb=`c*bBBX(^HAI2>oh}>Q(|=*k z-p}A1W-ty=yZ{SC3gPC!PyzvpNunH}aI<-X(;d6T{V_O1V_A+hO+8i`6mu={0nd zUt^me0D+(SGZZ0$q{EaShSE!_3oc&Wygz;U)A_|-1N)#7jPlQD9n4qHL)ivZe0+J! zAYH(I9P$Vihcgr(;wAgL8?b+H1YrtLJV!Ai+ufahU?a^Jd>YdKe1uIdgY2OHz3I4Y z|Cv19|9F(g<^QF|)qPCouOh^*+x4pyxYzFZl@H;IczxN}+!yxwDsWTj@zqEeueJYW zNMZ}gP^`%#`;{>x*0^C@m<^UcG2E5WSY8`u^U+-b5sV-SDx z)AskYy0SsdX4}YOE8ESxzV%np3HZcMbeQ5UCBP*i>HCOz{k>1wY2tD3s3$%yvNX^? z@-Ix*Rqun$Q3UxQ56LP$%)hgS?YGBF>_*8glJZaxAsFWwf7V%aqGj_juWAIDpF*+Q zOE)as?JaO|*Wn+@?0r59HJ!fqh*3g{?@$q0%&8lcIfl| zed?3t`}acEpg)+x;J8BYPiDesPX8ZV{~ru2`v2sK{y)l7rvLZV|5a8{*8g)#Y|;Pa zw;lSwUaXG(uh+Pz{@*~USNPnYQK`?D#6v0dDn7ovQoqCNChtsbpBv7uJj$7096}Nl zbWxKEIwi*zIT%??Kq|S5xMAv!BjryS^usrCv^`;&>hA5CQ^Oaha(@3j_K$z|ry>8( zXZQi_KmF;@jQ=y3KE?lgoX2JVQByuWrv0bL{?tHywA+7FjrQT~KQ=Mv3)_DR+%&%N zm#gLOyM9HHT4OF!R+R=Sz-R+4UN^q%XIduif9o$F$L332^)opA7r*e=T6=9s|C>Ai z)Uf{#2POOesP}aL<58YU{~x}1AIR~?y6L*?@J$%_?qSz^k{4S(wf6rejSt_m#FAek z{$sy4FylY;CZqAw{(p?eCI5+3q>m~3v2>)0)Yl}<>Bl@3WhY5t%rl#|PK;WB0CoW- zZ|n|baIyBYd*xwOfmj;ct0i%4(pbtGmY(oW-=RoEy8dT1cRxMGQ=9&aJ#qM+ui1yx z|NB!j|My@rc*_6vD36Q&%j-aVwt-{`YF{LsOCo_Nh4>uFB^A3XlUa5^#R z|8P8f(*GajDc%3P@A0pNN*1TT;-l^GSA5!W_N$eubM&iKxL>e`29DqI&Gmm>zyImY z%eSvzH8?e<*!y!H7}NFhP-n#g3t#@2*m1}}+rLFobbW_Nu+&@o?)>W2&!?|ntF3k3 zTy&HoS8v|lyn5f)O7y1#uRrm6Uhl9!=-3lob7VRe#Ru+;cfoVWHIHo+G5<5a{J(v{LpULkc%RSyqcuJbQg!LqT$JpGkUjVSL1PuGPuQwfQ zIS(9|V|)Q!%IJdp_dnwXyl#YU)>i)4V#BHO}V9{ zbg91ceL`w94ea2e-9r2qc`afO8$RO@qZuZ z`2z7jOx>~jrLu!QQ^`$T&+ca~&+d1Z7w=Es-u!UFBdQy0r4GrhM{YlX*<=Lc;E&ZK`elRWK`1)f$eFtB_!l#V6_MNT=o&Prbzo`Xim;GllH2MFiH+=H{f0QTZ|HbCIuLa1udkPy+ z{@G>)%0KR~0~zJ&Sb~fyO>9Bq$&q0V;&1M44=R+B>sObjSEn~`t~86mzjdBWMrD)H zpVDUZ|DSJ%s)@UafxFsR*}a&*w0Y)1Y%`DqiVSkM=>0QU zX};W3E&qww|1IzR%V(GW$8cH5x4=ADM0{8ZL1Kq;k4Ic7cm51-J)ROZH5PFK11Nq)lU)yeENZe?NR~Y}&zgNIh=vUhy4n|`P?89W%mHjr;>AEQL zj(oZj+yf@j<;W>MlOEa|c zv+cFW^>^|DER-`4nF6qM;F2e(;nj^}mS_H&B(G6?`@mpDxa;d83A}5Gn20xqS(*U- zd&NXpx=@}EOQ9Mqn2V{@noNvHQE9?snSv~FL-dT8BB4-@UU9v7Bld*>^x&YyTHd#> zK=p%M9l*%_Xs#OjqS?J!taGGol8WLC$pXhlhXj)A?y#Jq;cMd0A}c9Wk0SCUp|XOw zS0>@C!tgGm-N&hrp*o`L9iZQP*T~ozT>^!E<^WX~LeYor*K{qopd6G`p`7NU4>0@* zg<%Bm{EQRmj=gXELj8AU1xZE?q0s=$llF5!r8YI1Oe0cp_uvgPP^<4$j!QxIB!l+l(^Lq8WAOONYkQhP4KkG^t&yhu=BRtY&8BTMavI z{-;qtg)0#`wInJ0%)P7RQdH6kE@9Y+J~Q zN>dA%IPfEQ24yx&07~g*4DzP_XXp_f67h`FlwfzzhXAsa*0#n9>&X?|Ai80#R2R*G zS9HhOMTP>UT#gJoVYSR?{v%sQ#W|jsfsFR+4;>Diezt)v^$dWSAKbz? zJkeh6?gWr2^UaDXgOZ3Y)deiWez__D@p?6b8LwXCsx6H}lWdG0UF>cj7Yl1=Qzpt> zTd>)o#?w>#scHXBH$ltbKXvlI_ssZ@^xr4@?_)fT?Z21O35f8xUuThzR$s&#oNknK zfEH7&8vaHJ8&qwpby#XmSiotk)qR09x1eX~CTM1=ei+lPfD$JJ?8D#eB|F`YVI-5C zEn6Msm&zthBow2`Eh`i%EQY;>H5`8nS*iX1l&TH+7d0?U;n8RTU+M3*r~2I*2w%IfEfRjgfP!2 z$#jT()cJQ+|Ga{J_;ZE`d=m$-!>&##GM(mM2UsLBsAx-=BpGurR}?vn{#$F{`1tsH z)G;;E5~2hsPMA7iA8=#0LNhwWwp~QY%#S+YnQ9V#xUFnAL%^;R*%vmk~F(NtzfobqYMiK5oS93%2S4h|}P3&o0bNB}At?rX<2 zNV&-rB~LWIS24(vi19IxExE7Z*Gsd6Bta7CQ*i(~Kiu40Ugs9tY6GoAJ5N}Jaj=9G zPfJ2l>@aEap2&4!HvT&C!*Bh_j{}(HeV`K&MKf<5Biah|$o$ZcqU5g2?*(*GT05MC ztyjARrdIai{Uqb^vm9*aELvj%v-8W&0odn3)a1tl!QBb773BrXizJYrc=`ON#_f$l zA3v%=N~FzG>zed+yI`17y294HD8*hwrKE23S3Z=_a;&YLUv_qsv@8fmzs${~RFrto z-)Wt<6|b_$%fa4c{(O#t;^tq0AnlVCQ zpQ>Gx;Ti^pm{Q!+InRE}%NQ?pG22$58Yp+vw1VcJTv)Ngse=+HMai8|FR{Kr&M%w# zc9({ou4fU#%Zr3iYQ0Uih{6~TZc*@=y|@lTFjqJI|D#C^ZRMOD-pa?7!KYp<)tTGye=4oSc%l)s8Y z?r8APVtENQcs;{VUR?Eal9}JR7s6(ly64MV(wc_Uri$M1rfoE*ASOpW_3X>NhwLZR z4|F)z%>MJ9>uU|IK)ddL4omqz2gAYe$^P>g53~PVL9)(bk!*>noNVcGn~%uhpxb?F z+j2||Uol^Z4RgtM)X58ORV}{T_o1il!*10^G`#NfxIB8pe7m_l@g12TdSE|-u@37% z-KH$~#lAGkTqK;#FiV;2AVse;9 z_im>(I&!iOa&dvL2?L>`4=)4?n;?)feOX^Kz~wM+;T9Vm{{-eJ!^G|6t^j-x+xS1j zvxEN2i_7?sk$%5f;z#l9p#P)kv~>S#G<>rEKgwgH;CZYEKINUlH3L-?U|iEN)yG4rjUV+s`JCP-=dGpg3SM`@=RqZr(1 zG*red)Hhm%*>08cK3TH&hs8V5umLJRu4iM=^k@3UlxIJx4y=pJbUT%cfWE#-BUQ4c zGA$e73$S0fMbbjgobH{hyd8$|%~XYq(mF~Vo@cW2C1=Y5r7yrf=RUm90e3TW!mLuM z)EH8Xb=t4tXp>=cK`z%X-@UO{KCmbd&&0_A-@eNvxup=JB)MIuptI?BKqn94&{5m% z6g4`tWq|e(mH6) zt+FT#s%ruAtV9YNn<>phd}$=n23YuCmjHLW-M!|)VK`93m#N8_ZOMfzOQJ}aS~5Ql zPos3{U#wSPtUB7rP8h~h&2E~z`g1&MZaTW<$M`1Q)j1lqZ|f{7U9UJfJp6id^7V%M z=E*MbMmcy6=wNrKx3XGPE&oSob{N2n9KNUjziu4)oj<$$fBS>JDgRG;Pw`(L<*~{C zFe6&q3IN$^GNpxx~EYy>~>fO`5=nXlS zSpBMm(@9BZqs!9Y_$cC6+9`_>S=4lWV{j&4^k$riZQD*Jwr$(C?POxxwkEdiWMbPk z-_7s8yH)#TKX!NB>Z-1L?m2xPoKDWkWZn<$&!33c1kSN*o#e1RI0T(-!ZF*5BM^LZ z%Jg!W|3i1D?6JijF2Z5XO*)`Q$nggc=@OOW70Hg1m=8EnCkb{qinupmM1yijyR9ZD zy&y*3KsTO%fQ0L9@u4J-{Il2ewJhgu=i@+<3h<)*y)x=~_$D8=3jrb}hj7xP;CYr^ z#0l*K0z5!$vBni#@NqkuKOZ@04X0;z_r6tD?A$zZNEULYnP`VrrP;q!44}OM4}Bsx zMeZHh^$XGV`@uGx+@H%WXx(Gg#NYX*3B#DEx&WP(6O{fAKAA2`+?Z>NWq~N}4lu2R z^Q8sYchK^$g9XSg$=ma$sSkcQEYyr0Fv{7MY~m>cm){O;RuP#H+MGLuK*K=395g-q zQe9{?+s6fYz5l+}qkv+pxDEK-{n+MDs4SF+;)8QO#PE)Iq}4os1CuYS#@dYj$&H|I z7@qGr2u)Ou$?D>)@m(D4G1FbbYX5iOqdvhlTIo$qKFKPJik$W5x*K}`nH2XsArJeW z;LGh*uc3&y9w2Ye%y`g?0MT9c+8cLYkE?C|nVagB614LV$Sc9OH_qlrnUb@%+sJF5qMNd0)zK=zwNkm-~MG6%gLuVt}=!-C^; zCs1a28=z%UV+LkW2H440Uk5Cfedfj8-{N{JCT|83tgukpm=GVR4_xIFMf094w~Fa> z(g{>tTP{2-aVyhMU3vZWZC6GU80i)jz6Fm&D9S6rg%@Dd3*S?W4AB7Vm6+@y9 z8>t_6^(!%WKU5qFIgYgUXU>U^t$|x=wG#U6&CZ7&pv|~p9v28jb5X#)3Kp8-&Bhic{+-mY#oubt-!UgY2HXMT z>n7#W|H}_R^*vj}Q~618O~a1zb%+JI<-`09rOk|{?z86Z*t_CsW7OVWn22=~4RR;9 zsIuVhHj#wQp35#(Kj(y|ZV|(rokH*dgXv~YTv5ye(?MUDpE7>g+;!%RFqQg4L3_3r zU$8k6a&4!NWV$;5Iww)yn#wJ|0Q@Wa{dID2Dm~;+)?{X|buPm_ks_s@vKEBrdp`7B)Nor#QHOUMOEHNx4<4o*!+^gx%KD9V3F2Gw z;fTXw8;7b1c?2JGYf?J_k*yU`dhxQ0M|%`F9d<3x!nHehb{=x>%37(woi#v*&)fMDC+NMnhTw`RIhR-mmc}eY9Q)*_9et4nMp+(-Pf;A4w_rlCpPjI zZd1BWQ%mcJ>1NyNpOz2p7-@&B^L=e_b7JHFuR5|~!SB7n>FdjV=7;T>qwdk;*r07E+>B}4NRsJ@) zJYb5x`9@|2WJ91_h1nzy(5?sdl|>2BBagErrJG2i_D6?mtu+hWFR*X?Gm=oePl$9H zu;&Z0Otw*fQ>-?G_R@U+R76-kfVdn~MK=E7CiUnIju^L@A<<_wx~ZIt{-~O%25FgEB;&n@8r?HCTlV@xjW%I0eJ>3 zyB~y7ApFR*3LH`rOM)WahdW?L!@F6714#WEC-;6OkjbTTE2Nrzm}V{~B~av1u=_j2 z@$Z;BWSW20z8rrEW2*JT8$ur-jsP36E0ba(3YCOuhGrFi^QsZ4So!o8VFP*!i{PWytJuh4QB=4)CJ_V8>i!+GDzwYzLvjr- zL9gNb_{khLjPBz4focfGlkZvX$=qTa4uDFW-Ef{qT_m2jrcn}lN~9Dfk5MJ_Ae*-@IBpQSBhpq!go25bc88=SBA)b zcc2ratua&Yb~;o5)y9mB<)t)eSS^F;2MU)kpN^5>;>9HJHySmRTj~}s&vLodh-MnC z*EPCq(Jcx4D(>{eUwu_rwO(hx#y-`&Sd4;YRBe6!gcC#KbIonmjPO>Dfo*kSxrSTd za&;eDoRP|0GBK1upm}P25CsYn<}nVInQ69PQ*jH0!;yr`z&fQiQ1dDR(m+T?+Oz30 z+Y$9jAii(Fmio`*VJ&jDB@XrP?*^YYJu*k5ck7js7)J|r^xYy=iZ>IbeABl^RVP{vIi_^G5jWdXM^Q9Fa#xSnE83v z|E(Cv;!ep)PC+*g>sV_7OsZcix-4&uW zDg^=>uu^ah;h1H(Rfq?XtvU0lk!hi=8`JgSnB8+JZOFQh>}8*GFP*!6)$J|{#%e(C z2NSgB17fDQ*6jq1Qp7To)Y}zd7b?5I_mw{k4x354}mv#5@~c=D?h73s37j4pfz$iP z8xd$>E)WG}Aj&>T2e(ciAsEBPwAxGw@uG_cx*|0ff=}WP2dS!rU8NR|=%j%)7&%+G zkha?RA>I@A$tJ1BCm2W|s=Yk1c6Rjf(+t1qU?NaH+A#<8B=CxVc6D> zon&(KIc1UeVBHq;g$A9yW4g%DNLpjHai{zH`ckK4LYniPd1`JtKDIk2O|JItN`pbhhlsi&l8B+Pl0WWeepTR7u66Aq<3aFN zPQ@NIis(gY*szk*GK81iayT;B>{uy@l}2+xh!h-Eb%R!#F#7aNBJ~$B*5FoaRxSX zYwe?OzmGUJ7a6Daoi}^E-kr6a@GmJ30$ALGIDF)rgPI5-*}4VYU;Ponm07-D%K3dK z01uS%rr-X5Lk!Ssh>+Sp-t~Sdh&wJnSJ(B*||i8zzsC*fG>i zVw7|O9N)2PJTn*DW9aL ztUNux;Y_O$m&*s~K^>Lh31aN_hj?$qkvL_7q4N+R1< zLm6qdfobdP>SeBt=DI-+#^=X9oWS7OEqy4pU)d39)g>i*8NQ$701$k>AU-l(Q=8(< z8GGb0qRG1_m& zeS+Y9zNeh+i)rGNNpodDC;#A&U~YEP3%`A~cL2DtXT-%9)w_$Z=6fSue_%RW(};zUQXKM){6hWPB@jQ354PX?OuhH#>68 z?(^CZ;Ty$X0xFMs{rq{D4*20pgUeq1j;I03j0Y#8lEG%9iyjR${i=i;Y{X~Xpk}o4R9p5 zwZ0#|vs3D$9sdmo;|*gZV_rUNMYX8>2GbK%pAR-6;&uq;qCVH zdObYY;ZKh1W->b7tU0BMX4v;* zL>1e8;d5<0;2~w1#=6CGx3CG?im1Q-QdJPY_m|Wzo|fjoez%BW!3skDM_IayL|z-{ zO$ePZq6i(wt^P!v#O_lMavNV%jEaf`_a@+n2IHl{Q0MA3itv78>=b*M9zrF4a}~!c z4XnWU8|U`to^lo9xsz5CDSbz&TC&pv+4Z1J`zT;8onhxeS zf{X=v#ZksNq^&Tynj{Sz41~ zGL_|E%g%Uv^$Mug{ZRI=1_{sKy##yD&@-x!l{fOq?c*C%V#WQt+>5wH9wvpn>bmQ$ z)~c=teq!mag&=7kSZ&k$Bn7>Q6VgPOyTgI5FbcEf0G+d3g-X}{0BWq zR=nOgG=2WX(FAA&Oc0+3eX2J2H7zOsYoNz=Z2-C8y5dr+*q)eKsv!AEuDA`S7B3eu zt);v|*4gd0VHjmAyYH8ePc($axS;`WC!-G`2#Kk*dHo94-H@#8W&1@u z%@_3?rBm~*r2BpoaZ4JCOL)~l$=*xob-1H~&y7XqR|qlR=_4m*&pSWtn)4)sw}9sz zJ%66xvjE8d=`%d=+`j>)v(oJ41b&f75dKQqMK>dqP_qmo@}Cs4903M91t={6kFn4N zNZ_3W`UIXsoP0jr`2Cap%Vy)^*M)G44oM2K#mzX1ABhrltZjef@6kKL=o)mXmF2?Y4?zX79q0N%wo_|7L6aa?`}##PcGsC66(8!Bs~ zDO(LdBkQLNElG0%%+o?-rab27Ec%zls0|4)#v`z1gMF@ne+LhRW+dK4&+oT!GTb3$Ow5EbB*QE${MY`!EN+-+s=7FUdq2N`vy{T+kLbRuJV_? z_ee-koH`56%&d+G3jzv1-h=-3+Rx|y5z>dy;;OATI0e7;^Z=h^FM-RtQ?zMf1^Kv- zF9kaY$hdNA=t53mP#fHENq8e_stscU9BaTG)zPU7W6k-h31h9_v|vx@QmF-(WW}fp zLy1i;#ov&m{KDqe|M=&%VXbi8dcvmAdl0trUU2Q!9Zc8K0d24{1wnSK+V2iaAqcrL z=esfxPes`i#jXLJ6*O2QM&C`<0)o{FaM`C6ilm0 zS=*ZXll{L@4Kt)yNBP!f99WMi~G^eOSn`bYeeGkGuL!JK`t2+ zc}83aXwSoea1%~{^{?i#Pn%yK@&*_m=AN1B0OkcA$g$doytDFTK<|$C1mKMlfg8|n zawqN-oHylMhV^Nc{;^8c`lAepGeJGu%eh?HiP;Q(+oIq#&7WyfMhX`dQK&E&t1cdi zk`CpB&4m;JD@3{RxT=lv?i|v}<%0LiZ$@CLqcDB!5~q3tsK*GK5yh7%)Xu zOa;2?3h-yfOMmod^qBwvC=tp4Hd?^F(xHi%BI6+7Pvt!hC=)juWmsBoYih^C80&u} zFQuhIUUwtTY0nCvl*P8rQKuv3WUQj7L6y#-YIGTBU&S;_B7CBwuJ4URcb?l>5??3e zvAIp}htOjv5KLzb?XfY`fa}zQj>u>2!CmVFpBIr2@l)wcqW$2$m zdh>Hj3oYCbah|Q3P1DkqL?nC4`*fd;C6s)^`<`Xy!T`ai#zXUf|610h0HbJG!<2~E zqv*GNqNG-=oNg!1)zF%B>>I*j0Fs3!dKKuPl z8!Eu2Mdm^6RLkPgI7O&OuBZ`an_3Q)o{uK8JhW!||E;g@MX@Q-hUX!#$>r9U4m zz@8jXVW;v`(ua4y^V3Dbx!-YM#pWINkGo?;d%|O%Q_}#-_Tsp87udFh8I<;kA>5}MXZ5A z9@|%cWzaeJZ+>j~=}$oL{O#HIXc5oUcViY{px6BrG z3hh|S_?jw5c0Y}xcgf#wD0&mM2wisIycANH?kWOAa!Nf$p}M5@LHj;SmlJy?2^NlU ztXt!J4Dp9gVz@BU*>6*~2T|1|-9@7XHtxGHT0^&RMzAg%Qo}~yx9jMv^BA*fqy=XC z-;9$A7I36}wc{)#K~=~osuONlratW=FKovVyjD|@jorac4neCt>eN_}_=Un@gy&Wp zBDXx_ZK@5G!ra!YAq)HGmDMuaXhu-%>)?;Go1#4Siu}d#&rHVlf$%ydCLhSA@85~` z&9_w@#brTS{fITvsRR3r43H~(WZdXy?H%CJ-#9&DG$y&{nmFSy8|#MrrfVq1ZRkghXE_XSe0U|860J=ouNVF%i2Er0>obpmLQ z*!K06A^W6P3!EGKq?r&k3iV^wu~gC_wzDwa2GjOqRxifa;9wF5mFSG4rz!i-)h7H| zIwET5`saKEPDY-bbCkGR`tek%yh&&<)I}oT62L>Dx;a7Sp_+5*_VS6^T?8t*k5Yej zvsK8!1N@1+zYUGd{}>^EMmkGeg=>pVoIk~E-5xQNk!ry|X7J~&d_Xg^A5Lm{Q=VGV zZiVX9<{fWt507yqT$!H|VjReoRMHcDhTb=N7^>YTgA8h3|6xy}U-?YX(Se?@8|Wk8 zLPLrvZh5wIE=9Ts6uyswF)LaKlX5&e^7#U&D71<&GlrROp*jv5x28L@Ps%qLRX0jO zIX~Wx$gO18=;yyV7msaOXn9_$50-@y{!xMRIuNa9&B}__BS#bj7V7bY;{Z<%~S8;KH~^>hy~ zz^zF{>_H?V!|z_PJS^gnWfp?Un0FPM)R5l-t3j@XF>`hR{4x&&j_4lf75$8)7;G?w zu{#K`nTFdhvN);*^dL8sEREJ z^3>udp14!};i7!53s5?gI!lwy`B2UkVOs(mirze6CUlJcN3?(?Cj-QdKmO18g8n6c z?rw=}l)?>roZ^bz9s|7J%d2NFjtH2^w|!*sJb%HEx+rbEs#1Kuu-z#KxTk$6V8h z)m?#>d(*P5Eo=3Ld+Xb+JLaUEvJsiA52mmY-XD7H!a$b~B~Ol!rTQ`|>R9H#scLLE z^(x>g_RSFa*qKXHXO=5Ux(DlnO~=d)^K5tESuR-XJu;1M&Km@=A;0m{2H{^sTi*d9 zQJV*RvQPYKJqa(P*B^kd+zfy#M-JbcKmWwT=mKE%yd&;>6iB0)5B~i{=~d(6W#tW; zk^5hdgWF7UY7&O0PqJK{F=6l*KSeo0DK2xpDs;AM-Ah7=uCIUW1j(hxqS@nJ;RVMDFe14Yc>4Qd zp6CU-O*es)PIh}PQJ-R8bdtJv(8c8l}7|3}Ojcd|nKAku>?0zu12ij4dyY6$;L4>^^mvk^D`k4}tW- zzcA{#S%uZ~FY*CQC$IP}Wa5r;Et9+yhEpi_O-QMbTY$RH*kmeKfr_Cq7tm2`3&k|} z@>yvrPF%&V*Wq=x%>(({(bU4QZf&PG4O}-!6l5gd&Q0J#%+Y7d12vg8xFw|7yw2hC z;=fMaSp#%okcRNY!L9|UURzDVwtv}dztec5+&q=0@FTK8h*`twDjJIRG}cL2J0#CC z`Z9-|6oY67lK~RrHL-{pgq1`D-fdguj?Fvf?C3T(cW%bc5F5=m9pM|!C8T@Jzc;^H zvrHSCH?5l4Gv`e_lh`(mTz_i}r+U?IJ#rL6*q;HD!i8e+W#<>zoas7^7+?4|KlvY* zuj#x1(y;FUTOqM?sC=%e1IJgZkDzk-Mt~#K2o%#2GpAe&NGWm=kbm4G-_^TF zsn{`54WA*^!3eWSq0khXO(2=LogEPD{f1QiN7q`(u0>s8(UnR?yQ?BopmZudldtj3 z;Q8%z{EAS!3u2gPJA6lE5RG*i&Nywbi-MUOz!oNuN1BT&G#wmeB$H2ouTmY{L}_PJ zl^xFIt_EoT*x1cqb^nV9&^1S~>h=mLM3 zq{bMVnJ59e_W%c#L_qjK+3U{FJJJBE-@elr;09-Bwp|*v*r^I727OY8w4K=b5QQ|! zzzXB$F)jBZRI@{n%aXZtGBIG~epAEaCbA37nKtAvk<=-(aPS|u>_60nM`Evf1*jMB z)6bfRR=H6lLj#4{SvmdQ^Y5olYfx;)pesp>P-)2bIW)8mSOi)PGDN5B>jOuF7CZ1O z?0U1V`0-~?7J=bN8!d7mYGD@bP2Ir-v)WQ0j-nRq9qcG5rY>a~f0eA$S!P z)h~+(Zz|{R)qc!!E(eSu8{Qx#i_h@>a*~NwIwB?fY@vRjxU;cj&iTCB^NPn4!{OdZ z-rzodRemnzC^M42;f2t8YS(Wc>*AB{Muz zR84+`EMW*ij4EtD>+SjVBgeqn{D97GP=(&k(G5m4^_bNrbQ=4f?d(07{^sU30i-dc zMhU<3zoFRg4}#21A^cRf2fiLRI0!o>-a8&F0Jj^Qxa!j#$uM;9olk#n{XloWk?X;n zUZ2pHE>`JpV9>uO1&HtAT^^~Q#;6i_`dIac1#!VK|6b| zdU2dW-l9&|8yv?P%#hEf^d0$Ff$X8J6hIs)=tr*)+i47WGgmO9p0JO^BmwRv=g5Y8 zbnA{=7q4%ZuWJ_y=k`s${HenirPOs_q|*Lm>j?wGPHwM>6%EO}2M%PmiJyG0um5)< zg1^V6&Fi4?%dL0p-pe{%ueqFiozrXM6Se7yJJk`M(Q@aMJc=;kz|En>z>lho=*I$n zu$~AzjGpxo*W$EUcrall&r28$ffo;95EtPTRCKUay-v=br}q`#!3ow+>Nn!933!Fr z+}0}=#CWCws!;sY8Fzr_5B=$nU$@@zpVODiKf7No20{K7F_D6S(C`(|7(e@A^Al}~ zFh%@2L}<8qAf8$V7g3uPOGism2FO-$0k8jp4hMiAmmC_j&rPLzqb z{g~la(LNH|=P~Csy=}R__=zhW^TMF8E;ukEPI(HJn%&iS)N9%pI-+xv#Nc65Av%lwy6GEha zw$Q&&Ub{B?5!H_oL4whmvx6}loL7}I;{plR!ISbmZ0rU$74jjbgW9n;p#SOX7xX#| z{Wj(iH)cP;@-*f)64&cqYa~)L=OMALCU#qeZx{>%vpgl2Ai+4mYBu8`3BHR)9a+4A z|A-l-<*R4G{rxRC7{ldIUf9)Gd)I0zL=p@YgGyc;t6%GwYJ~ae_5VS}kNrFXVP|=re;AMDqPBjfe8Sm^hM?Bn&hvSG#9jX^akHg~?g%og^xJC~Q zkcyURjV$W_Bn%KY-BBiMyJf-)z(bTV3OJ+ICuCn?kIjiDhSx~m&k>FbhmyXa4VSGM z*_40E(IoE_M3EwBCmj|DCWd26;toLP04iJhdKM`xk023Z*+mY$`8{RmU_rKJvqpK-s3`kt}r`*O8Au-bla>NMn3*fzytNuFRsp-SuL+42CW`Gh_!^H^OS!rv^4?LcE({VS*9L z1U*5Igy=g;GVhD4L}nBXPn?J=(Vk!t6F#xPW=vA(8h618j}`AsZT>#%oVEpBk;87< zmi$5%@^TBI%wcc8(h!Y}O3P{MV=m2_=ru+eP; zi)hc{==PE&V;;+vu#qHcEkg{T)9__ud`x5fN@Kpimzped+ESpS+xhm8%!^8F-%p7LcKXhew+5>NU2tkiwNzU{$|xhTx+;kJh2t1qm^f2|sS)+1ef(TaZd9wxE!Gj2EcM|#$RhJoQ5Kok{;0CVP+ zKz5NVYmmEc4I^<}w8}}C*0pR;SN8c|nW zWUy=47<#da;8Q;=k|%p`ocj$I5u%d-^&5`DX7ykv+L3LKSR- zTtU&*DO{9_K3?}Chq0VJi+y;($Ngc$LHT*xmE=+aXE*N!&=Kd-8+8ofgQwvLX0)2+ z&m>p_L9U_hHG9txBEHA4pU`-Tct|j|i(8+$O5kf1f8TtTR>7dyhv!`M^q6BoWdMo< z4qJl&m(qe5{dJk-{?F|`x~fO~{V;_A=(rnUIi0j>A2$KAqSQtx8qC}19UHl{B8jox z?yIHe(R%YOM@>G@Mbvy!?MeJ(MuY#2O5@!TGXe^YHgqq4uco2kV>$f-!r=m@4`qwn z;#>oW(^Ki`?jE@5x^u)7GCxdB&I}L$+z&zr=iah0Z?qp@Ms9ml5kW66>*6_~gH4I9 zq?}2{Qn@JlooX2HA2ReQ@D2ao$_V-&zlHPDodVv_VnGcv^K@WN1SM>9R2bp~i~W$# znBpaaqqs~``^>UXS{_B#>zv#E6blrW4aGd1q>O{xQ9?ecWg*E?(7#Yp{ws4i(r~cK zQTSzvVM*CeflhNbs;o6<;Aa+;t7iABnVV&-b(7 zgRkd;%kN_2)mRrQ&mvi)KUm1Fq=z`JmDvA6NqYo7#cNZo1pk8iNkh4UZsjy%38PxM z&nUoK+kbfLDhy6_oJg5W_oAyHlJAh(Yg<{#$k9z_eKu~y*4Jf}3kBaB1uadDz|xP_ zKeNVkS_JU@x{325%+92&aNB#|01& z5g3oX@v#sc3Wld*+i~D$GKKahEZSW}GR<=h4UG*6&qhMFJ1fd)WSbeX2d3T3ygn}K zZxGPC4we7e-TUO=!dBvc0e4*SJzrj_2oGaew1DK38&r_%W#q2cY3GCB^T>JKYxO%E z1)l1o8jiyBV?lD*ZApgLjg=i-j+GT2Y_Kfn`u)_|o%uY_Uz{Q6!sv)C5>D@4W+?4W zq2_D_doO`!G7VZLD7-QixWVRpdhdwc^6ZF>%_k?kG%AT#?4n5X4+}9I%1}JPx23b9 z9%+O_vOPkj9fT{L6(tG+rEH(e#Zwec+glV4uCBb`9Bt_WK6}0W52L@vA5sch2NC&> zwonUTrUJ}NnefFoi-CsuTQH~m4;7UiA8c40y9&dl)W4IfgUdad!h`JA9Yu$QoCml{4l?I?-6>ncJas<5AG2n1p_kl>w)JIlZj zui{$HAB@?BWl+?A-KO`c42@6bD-06c*H6KqaqeMl-;-4VxltHuAB96-94Tyw6UQwu z&(DGv$Jh8b#JNqn`MkMg2e?-vYn=MA}YvslQW}RpzrE}d*l);yWS2TCQ+7R zSZWzsa#rL+>q35c(}cNfh%>RYTXaxAh^@g?T;e-ioZ|bnadN?Al-24&ROB+x@3}?g zc^0ICzCOXTK^{YX-2#X81 zEzB0LEi9L)55LNSa-*ukto4pXN_pt-E;ihFes81#tRM&I1?@neK8J2cIDA~Wp>`bQ zAeMi*he(9tYUf@eu{KOX7%XQqG0TqAg2|8DlPh`z4gP(HdGFrvO3%ms#hf7&UQ2Tb z_Fhw1?vF^U?xrnx{|QIy^TRHxm*!OMB3)Z-tfrtW(&pNm8)C=Cg8!ydw?PM~MGJD3 zdEXk2S5?Kh_3moRAwsmKgjkpod-)Vhdin?zg++r)ak6Y3n-HFmrs)YtVaYYZL+);O8-8SCbR(O8ugdGmee zNb+_0x>}Gct83%Fo_Qq)*TT)VR?DsVr?e1{o!g(!4Ub=5_tIxQGe;iIjgM{3bH|bQ z;D5Uh#UBA1xA&vR|M}!sOGDaDu6n6yVW?VT@v5`iRl@z_;X8Tr-QC%R_#KpfBG(g4 zD6`*-=w?vg8+r&tY7LUuF0p=wn;3&EqYcBRtXrOuDI{wt(&PsQW%8E0wlw0}HNrS0 zK6?4`78}eYtyYqfPJuNXZXNR5&~jZ(Bl8?&;$M7{)F6tn6mhtHd!}Oyf^ahTkYJcn zr?1a>ynCtbQBDQ@jSQUUD6{2fzERRh=}Bx=@9%z#bv4G!^Pu^Eh|#!vlA3hl>{^d*vfn&NKEOG*!LQzHSYW)vXbA3T>q)nI4qom*ZM;h zInlv#aq819G7@Kkh~Ga5W@`JOO*7Kh9g8MeMh{3HnpEPK9dg7d^QFa=3I$#f|5kZ~ ziJS=KNz+;~q@12Enk447OGL?(bVUYsnB*wVD^DT}oa^_u&oXTIlEk)%dQ6S&C|%1V zk25|P2>WCiQezsR4g|ml&5Dz}#2c#>F92e#bmUhx4V9;co z{AFUAMuk-;uC5Ti$ZA=7Cl_PRt|+)en~z*F^#W%aUk2V2WLPyaZ?~tcQNcBVQ9+aD z6iK{b>zsAH?3iJ5H2s&+G*ixE_(qmI&9A6*j%hKjsgj7q_5AsMdxdoUUfd}Y(g`Mx zg6Gi~fInJGIa-+ZoY3mpu&e65J{R7>x9B`_iE2!Wm^9!D|Gu|WwV1}=eXq6$+B|>pZW_z->|U0M{Er;$vtU$WjL(Ke8P7HM;io*tRM(D%^t zNMG+OO`Hm+ZT~Enl4{V~`$r+q7)A8s|MvM#!0=8>=iK^2L-VdwaOLft*N66hd>$$K zbk6t!-5HDia=kXaR8;ZgHTj?F!|r?fX~x6^7g*Zggb{-p?gkSWG=bECYrSqwcjw91 z(a$jS@B_2+XX^(y63Err^}VsRc{qdmdAWKyg4%5d*y{&AL|tV4SQzPdgE7q3>E zeKRcYv-Q?=w61`sT|(gfN@Z*_HF{_0txZ`4Ssd(is`QpxW34bq}e?BLlvp2Tf8CkgHfOT2TY`%0z8 zW(XQ^%Cz>ywW{f&29r&#Uhz~$F2t>&6N0F(g4TT+SgIS`F>8u@60=Uxa<)2LIL@eu zc>VgsoO+!Pqwtnh6)MR~exD^g0_0&br7RQwwj}-o0+CKn&R_V{DH+YHm0YrCeA`}N zoYRk3eSm1@1Ka?Q7ULy|?9`EyaaA=UQ-h)OIQAjf&@ZH?Y@iDq;~t5{69i-gdrTSR zLY9P$_enqAmVh+;aOgSX2K5?RJHrSC)>y(r4^>}Axe)D5c2PZP(Ja=}S$LuwSU*^o z3{SAyu-`D`mnRUys4dXz(xK}wo0@Zy!x3S4a^oaQ{inF5fj7wL*QZT?3&rzk;V@;0 zXz7%ldyL^SobSH7a59q#TACr$A7p&nXnRq3J>kD#L$*PyOkj4{u>BN2R-arMy)$3G zgx4R`2dvs+5AIRXrE!Ld@AOY?jEpzTFVDZx`#ggGlA5Vl9hm=Vi4gVcE97iB$==m} zfEqgqB+88>02fHe#0qAsU!`6P4LdFnj zf-fTJbOowGxWB$*uOuhQL6A?(zr(=yijNeJ=Ja4QDTMc@UYGBPcj|uyE*#P0(tCaV z1Kl<5mOXwUpHpXrpfYND<=-&~5?W12-})F%MizMdLl?%hW@v);z|TtC(G)%}-p*U3>KbVYXewnXH(2`o_e-jntF?{E)Ik zIK(up8RQ!=COOT5;8zsB&#?b%1#$IIyvQKNHTI$(15sG9WSex=)r`1YZfS-J^lB@4 zAiw5~+$Gs9iWe_YrX%^VqcT?tQSuEcO#mf_iz_MSD?2e=XpyeEmt8w5GBvsYDmZPdNrwdnk6gZ zqv!#aN)Ad{D!F_VB?~TE<0WD_2bgppCAX;gGLa3Hq?cS=$-80~R;<99tT_dK^_o+l zw_9_0OXiwWAwSTX%iC(W=JI+C*PO=|h1qYq)>5A=F<&4HcKwnz!-<^(&@HmCL<;Kd z)oTjqH7ik6-K25tC2uGu`GS9Ud6DyyKa}8~y9IVPX?$P|+v6Sl4nDg)z0vOeJ-b1-bhUkaVu7ols>e?#tFBGJZI z7CYDG5{Xpd=@NK%dEvQ-6sI^)(lPdoAR5(P`P$mH6hHKmF>6MR=!U|nqqdw|j& z!-gU&@WrB)_rs8izg*!!rb*b1lMo($CEM!yaoF`^g1YjJAktBaVtCG$qGNUOB9)7)0OFy(v5%&HD4fJRHD52q(d4KIrxR@$7io8;z&K!DtxxM{w4k zgtMa{oK1u3-munbk8CpLn+?n|%Ep-TMoUONQz~%9u3$jcB*B3n@sZ>c`|olI{|6;? zVF-NiLz1EYrgbB#LV;6JQNStG)XGJont|L4#Q@fBv8d{;eZ`o~G*~qX@EQ%<8Y{1% zk=HAh&@>qP;k4fy_QvC2HXRLT{rPY*n$CmSU^W={r{M(7C)4S`@At#wU_2a+hJJ56 z2?o$V>h%USdL`G9)I=(mk|?x~4|Xi5!q3mK1kR)sTExXyEG|r-r99N5%T6)&%aTHt z<(zf4Eo5Hh$lw-k^W%HLjQ+ww{6+N1)B7sKC$I1vw;f-cDqpGo7%J9H8R6dwHuQ;a zfmhUG1(;iHOpJ32;b0m%dc0FN#Gr6($8|a@5;c^&`;b6Q3SIcsHAKfs6~Xd zTZAw@lo6RQB!{67S4oT^sc6M2r7<;D2@87v7Tp#;;R!6TBFmfgo#>@qEs|uk=^C$H z2M_maCxgr*oDPD@B%i>qecHywnuQ5Y<{*R^Q7tn~LR_xAK^P_R4+v9A`x>p7iCzF2 zGSfJRf6cD%@X}z(i-U-lH((~rKjkfRb@Wm{BZ%`7g}%lpl88_S39i(tK&e{Q0$yhe z=z?Bg(*VBmKLAm)3ivwqH$IBkT58jTR$p(3N|6LEwl28((go{uk@+D6dA0A747|+S z#?PtjjY6r6P|5d7rU%;>+~I(k*0f%7Ys0megllL8^d^1@BS>JmdI8!4FWC~MAOKp# zOjlhZT-tLMu|6L~$1!-PY_9}aE_O(gX{(C0&#VY%e(KLqgb0GhrtkP+*g5&-@6S77 zmZbDAMh4D`Q)=ebK-a6Tw0MCEGg%X=R7#EU`?u$GTkBpBv^(72RVNO={9WV6N;qIv z&c>AAihhY{_G6W-(8i%i-h^aOM3y)^S;y=I=MZv?bxV@k1 z!DI>L>jN=Hn>p$yAI0{5d*G%do?WwxXOdQ&fYSqT^Vbvb_T~(HdjKv^udjc8c>@0O z@gwlAL}CEukNNrYU%**WfITqYe3vCF@e2UYlXJn|m)N`fc#}q!amcUCVMx@sm-#?o z7W>h8Okg(m16bBC-(n~{qL8>T>=VLVbJzg`^Q7SW9!Vgc^x~v@`_9kc31F^Jvu(;l zk>4KSd=bcgWd5m5y=AH>{eTL>BSq2T5QP%W*;Xnj9=OcC#Ux4NU8MAiwzr6qnIC!c zbreyekSjhFY!b!}Zx*#!od*3FB(jJc0nb~TAHRyOGstu+ zvv}r?`BT3OX@?bb+c27FtcUOkUA6K4>+hU4Z?% zmihZM@riw6k`uS~XrJpZNY`g4F*X_65?CXSscJu-IM z5@=OX816JD6b0K_6IMQo|03adYF9n_X@~ZkA2r!E(>rzuM1_YLoj>OLAKDsOlY}y4 z+tNQ>lO&?w6vS}qEd5Vd;;SSh&$(9+v(2+K`*fA^e7{(&ZRr5#ecz!EF#HLHVFW34 z#}?H%7Yh<8r~7eEpTUaO6;o_5RGDCUm=09G5zSkdhdvzL;eq}C>BP9pE^5xcMrSmWh zf*K;s&y^dr$}Y~OOn;j6Syq2o>Lii$BdR5;+H?R7C!S6mF!q;E+X@C zk|FRzXcY4-toS+In)Dw?0?+dfJaEp0=?v1&thhDFk3nAoc&HZXmqKL1*hi;I$Sa_KrW z&h2EXP=}-~KPzcZ%ICJCkhjikW{5zyY_h%N$6Qa~wizZP(oHGI?Axo?*R<#wL&af} z4&ddt90}5?wDQoo@K|*pIctEN2hOL_oxjDUvsJ^j)l}AW*bPpZWyM_$mK!OZF0CN1n)AyG}kkX!IeN3 zy6gSA##d5V-0YNrNh8KKh1e4&YkX4hFDU*MFS@WG&T$f|%D%aIFOm?7Wd4Z9Pm(T4 z5AKT;GfxTL6K>`aUR0HvyoPg|3Z|V;iFD@*B2-v1%g{Bh79`KRt~QmN@*x~ADS`OU)jQ$lw11kuj>250F6VUt$H z)^5sLbrEJZ(jBpjy`vjSvU5pr_#umP@;(iOZS6%-Qd@nCAVuMH-Vr*l&`GJBp`iVX z&2mmdq7`iEC@z|7O_!O@s3QZ8v;Vr=bQW)S3#r-?GgRHSv^jrvVr`3Ne;aPhagkej^;DxreM38&FRUCk%^c z)hk&ejBT$*ponGxsT`ig#sJTh>lPru0(D^ff$N{C2%Q3DTU{n(>PTi`Xgx6Vu1d6j z(Dq(}3*m}Gylln~pzN32&1HmzJQ|nP*G}m^blUx%*YP8bKISv>QM~x$w51L2IYr;K zzmpf(%%tuw^YXwjg4nEmaNtv~n$;F=8NneqPuC1@wJgVxS*c3s0OB;-#W|ve3yc5U z7*gZ$_;su!SFq?98tL^zRVE{UED6hXjcQjc8&@;)Vx2We@)8BgXoH&en+Ps+_&{h+ zTPR$ocpe90ePc0AW!5<5-dcJ=C!?FTN)C?tWs=p{Qe_vKlo*{8k)Vzwj0j>7Q(4X~ zX}-Bk;TDmE=()lA1g4}Qnl6*1g;H8gj>lCVSl&tALVyyZyb)?@U~m4VZ<~-e(ryya z^#2st5}1^xr6qCNkzVTggl4oIGaSaP6)~B5S?Ihuo$-fnGn@lNiD5j0aXn~!j{3TE_kD$Z2)fX&ev`I^vmxXin(Mf=r*7EHbnUs z9Gf<3WIsfUf{h1g*^oP(o;UbD@PUoZa0WL0`a2{Yi=+%Vib+lpysDA7OPPw;z1BD2 z6~f_vuewCFoP`_-tv_R-a(MXUp^}nekHCr`q-R4l+Jq zWblH9FSa64)WAY0w8ZlJdtyu&#NO@>|4@1B?#K=Xi7Pvb*7PqYVz0TP?VO(tMlJR2 z0?@66lazDryoWq%?_xH`c`$QY4y0c*--91+7|G;!GXoQpE5fPE9;!+>q@+`$VxlXM zRs(Nx!l3qu6T7j+d5WN{3fs8>2+KU;4};e z1MjqV>W+q^aCCY`Mx#;a5B$&_lfF0Xd;O8;d0~isjK}Watnc@|;n*FF{WId9dE2GZ zUUpebVP-dl(p-q!D^(T++KHkF%*^?o41w+v)Ka=@N)K@nHDMbTJ6wb1n0Wp?uv~Ez{|!+x?oOEG#dv zIN}SdVk~{WVm1TSMfTWQ-;Ym^Y{E2t5F!U#_nw@=fJ& zq)=2~4Djb&{?C;T#6K~Dx70gzT-nCO>1GNIcpk+>BNA>zOwm&D_;R`4pjuatP3IEl`eMS{k7?HuXg(+g@aZYdrS(?d z)K~gO4`5phU6K&Ty9`cE>9C_yldTNTg5gf%v#6=P5gvDh7HkhZM9XbkXPy;HupjbW8ZRpab+4A5C`=n;1m24U!hgTNj8 zQ8ez4gVSL^`cZ#)Ht@%UxZY_m8ik|&;M5zB1`)=+-s#z(higJRHUv`YX69q-xK&mi zBq3BTX(EDEjqfkxG*kd6oK`0&o^3y>m(RB*n>u=u*FDHKNh_Z<9_e3HtpPhyzX#cZ z-X75qcj-ESqqc~63D25@V@r6=7Ehob%RADlARQE^L9$dp1lXr5BCpg!wH)Ih(6^tE zTCzbEi&^ur9NvG#6M04$U1mWAIS@cFnREV^6D*d_xzl%DckZ+tVV-l&ozd&q`O8Goa8$bNrP;?kO5M1XKe|;47jZX zbO3OyS;Z`th&DJ~`!rk&=BgKsYki4LAH|8>LlvImMz2n8-n^2AvzvD>uKwFO@0EIH zBE$S|7|GC^SLiu^;RKO%)n4HYDFBybU1Cyi?*p%pNfxi-gxr#!Sb!54=F*nda!ia# zK76WRl`UtX-VgO_>K^!#()?#_^j3K{z&`jZ1v{en?Jl;!nxJ(BJ+c!#l!lnwVsh5y z?gtK~KvYaY9~K;{#AKUhTwVBeV{Vd)7eC{9oWwOyCR|aC7bsHCVQLju`y#wW$05I& ztokkf@4(7rU8ksB0T#klj)PAXEhSz^wanmSly9L4#GJfZ;za%+5n}W&Rap*;3sWL} z;BYZ(pNWJ(JI#wL6Tc@;Bbv>{mRFe>g6O`}VwUHNrfC7x_Z_?fs;GfvN<%WS;2D)1 zVpKWdlBL#)w-kpjae~u;WUwLps>-P@kU{tN#X;0?rJNo_#Pdp=G}g_A({!yGCKb@! zjWq5EssnVlAnI5Fb)*nBKpim>t!O&-D$tw;AiS}7@WZ*l{^C?snU2abZ>j)OUUu3N z|6lPxt}iB2=wrq4N22bNLpY!n`&v zm6|G*t~eTFs=wge`%?Q28c2`7y5Gnn+s3Cj4&+-P9expWjc~Z1ao|; zNd1a8Q79K2rJWVw>w5hI6NYV6l|xD(#9oSc9TjqCQ}~M-b_j!6Xq&uZq)NdLZ0)* z)t8IwNvpKhwveXRD%M;>j2G&B*JzQbISiKH-#hh(p7nOp5-Z*68p#!>&ojdN+{EXU z1Pg6Soos7ZSQ2zyS3Eq+w8iPOqw>Bo@P!B!xVwY_Zy_v*#7r$(B$P(H+{7N%fQp8I zcbtQbIy#WeLvVqwH03LW-c_`v;WQ)?H`5Sh%T%CRN=l{dDuM!ZbLTe00hy322GKnK?QA@3<3-%%n|(rY*w!cf?t+HxmDfGiU|lD_S7e$K#_%n%c`QG$ zKy9xYzxgx;>N7W`0rp#hVs z;;Dphwm0_4`li|rnoP8tBHv~}zg=KBsSEWyuXW(Q^VGV&{@?P%l9@yv93_w7V1`H- zLqd+FNEf1_!}&rYq!E5=09kOYk^O3b(k++=8;M2E&CDNDBR58zhVd#6mpI`^l}`#4 z8_)__j&)jfofxq3+T%lsk zJ~@j9z43UwRWfl4a`Yle&}Do(%Ne>98Ad|XhVAw`TapW?FPdbOcjVEtZ=XASz{uV$ z8zvp>gk+=Fo6@>#MR zXV2Vw^V+Q3SMq7M+efoFB;YF8{4 zoDR)yyC3=L90%Pzi&yJTz?cJPkRP0!{D0ns?-@yca9F-h2%8a-JE;5P(b4fSV86Cu zF7vO)$H(X@z$u^b%Oqz + +## Helm-Chart + +##### Scan Results + +#### Chart Object: friendica/charts/mariadb/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-mariadb' of StatefulSet 'RELEASE-NAME-mariadb' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-mariadb' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-mariadb' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-mariadb' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


StatefulSet 'RELEASE-NAME-mariadb' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-mariadb' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


StatefulSet 'RELEASE-NAME-redis' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-redis' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-friendica' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-friendica' of Deployment 'RELEASE-NAME-friendica' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-friendica' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-friendica' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-friendica' of Deployment 'RELEASE-NAME-friendica' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-friendica' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-friendica' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-friendica' of Deployment 'RELEASE-NAME-friendica' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-friendica' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-friendica' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-friendica' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-friendica' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-friendica' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-friendica' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-friendica' of Deployment 'RELEASE-NAME-friendica' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-friendica' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-friendica' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-friendica' of Deployment 'RELEASE-NAME-friendica' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-friendica' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-friendica' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-friendica' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-friendica' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/friendica:v2022.02@sha256:54866d423946f6c76ebc91787f3ce087c3533292db2450b6c355e7a68cd1fcdf + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/redis:v6.2.6@sha256:ff9e9a91c1a1d12b5d39660b66ef235535528883004af1d8dfd4047c2d9943a3 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/mariadb:v10.6.7@sha256:534fb95db986ef4799df0b9734883f63a45c66f63ba077ac2d6a002f4d91dbb8 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/friendica:v2022.02@sha256:54866d423946f6c76ebc91787f3ce087c3533292db2450b6c355e7a68cd1fcdf (debian 11.2) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apache2 | CVE-2001-1534 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2 | CVE-2003-1307 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2 | CVE-2003-1580 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2 | CVE-2003-1581 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2 | CVE-2007-0086 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2 | CVE-2007-1743 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2 | CVE-2007-3303 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2 | CVE-2008-0456 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-bin | CVE-2001-1534 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-bin | CVE-2003-1307 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-bin | CVE-2003-1580 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-bin | CVE-2003-1581 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-bin | CVE-2007-0086 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-bin | CVE-2007-1743 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-bin | CVE-2007-3303 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-bin | CVE-2008-0456 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-data | CVE-2001-1534 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-data | CVE-2003-1307 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-data | CVE-2003-1580 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-data | CVE-2003-1581 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-data | CVE-2007-0086 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-data | CVE-2007-1743 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-data | CVE-2007-3303 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-data | CVE-2008-0456 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-utils | CVE-2001-1534 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-utils | CVE-2003-1307 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-utils | CVE-2003-1580 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-utils | CVE-2003-1581 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-utils | CVE-2007-0086 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-utils | CVE-2007-1743 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-utils | CVE-2007-3303 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-utils | CVE-2008-0456 | LOW | 2.4.52-1~deb11u2 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apt | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| binutils | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| binutils | CVE-2021-46195 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| binutils-common | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils-common | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils-common | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils-common | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils-common | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils-common | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils-common | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils-common | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils-common | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils-common | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils-common | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils-common | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| binutils-common | CVE-2021-46195 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| binutils-x86-64-linux-gnu | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils-x86-64-linux-gnu | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils-x86-64-linux-gnu | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils-x86-64-linux-gnu | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils-x86-64-linux-gnu | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils-x86-64-linux-gnu | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils-x86-64-linux-gnu | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils-x86-64-linux-gnu | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils-x86-64-linux-gnu | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils-x86-64-linux-gnu | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils-x86-64-linux-gnu | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils-x86-64-linux-gnu | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| binutils-x86-64-linux-gnu | CVE-2021-46195 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| bsdutils | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| coreutils | CVE-2016-2781 | LOW | 8.32-4 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.32-4 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| imagemagick-6-common | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
| +| imagemagick-6-common | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick-6-common | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick-6-common | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| imagemagick-6-common | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
| +| imagemagick-6-common | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
| +| imagemagick-6-common | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
| +| imagemagick-6-common | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/633
| +| imagemagick-6-common | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/634
| +| imagemagick-6-common | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/97166
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
| +| imagemagick-6-common | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| +| imagemagick-6-common | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| +| libaom0 | CVE-2021-30473 | CRITICAL | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/4efe20e99dcd9b6f8eadc8de8acc825be7416578
https://bugs.chromium.org/p/aomedia/issues/detail?id=2998
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/
| +| libaom0 | CVE-2021-30474 | CRITICAL | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/6e31957b6dc62dbc7d1bb70cd84902dd14c4bf2e
https://bugs.chromium.org/p/aomedia/issues/detail?id=3000
| +| libaom0 | CVE-2021-30475 | CRITICAL | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/12adc723acf02633595a4d8da8345742729f46c0
https://bugs.chromium.org/p/aomedia/issues/detail?id=2999
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/
| +| libaom0 | CVE-2020-36131 | HIGH | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
| +| libaom0 | CVE-2020-36133 | HIGH | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/5c9bc4181071684d157fc47c736acf6c69a85d85 (v3.0.0)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2913&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
| +| libaom0 | CVE-2020-36130 | MEDIUM | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/be4ee75fd762d361d0679cc892e4c74af8140093%5E%21/#F0 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2905&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
| +| libaom0 | CVE-2020-36135 | MEDIUM | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2910&q=&can=1
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
| +| libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libbinutils | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| libbinutils | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libbinutils | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| libbinutils | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| libbinutils | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| libbinutils | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| libbinutils | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| libbinutils | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| libbinutils | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| libbinutils | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| libbinutils | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| libbinutils | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| libbinutils | CVE-2021-46195 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| libblkid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc-dev-bin | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-dev-bin | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-dev-bin | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-dev-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-dev-bin | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-dev-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-dev-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-dev-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-dev-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-dev-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-dev-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc6-dev | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6-dev | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6-dev | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6-dev | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6-dev | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6-dev | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6-dev | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6-dev | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6-dev | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6-dev | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6-dev | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libctf-nobfd0 | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| libctf-nobfd0 | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libctf-nobfd0 | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libctf-nobfd0 | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libctf-nobfd0 | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libctf-nobfd0 | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| libctf-nobfd0 | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| libctf-nobfd0 | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| libctf-nobfd0 | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| libctf-nobfd0 | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| libctf-nobfd0 | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| libctf-nobfd0 | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| libctf-nobfd0 | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| libctf-nobfd0 | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| libctf-nobfd0 | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| libctf-nobfd0 | CVE-2021-46195 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| libctf0 | CVE-2017-13716 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| libctf0 | CVE-2018-12934 | LOW | 2.35.2-2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libctf0 | CVE-2018-18483 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libctf0 | CVE-2018-20623 | LOW | 2.35.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libctf0 | CVE-2018-20673 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106454
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libctf0 | CVE-2018-20712 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| libctf0 | CVE-2018-9996 | LOW | 2.35.2-2 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| libctf0 | CVE-2019-1010204 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| libctf0 | CVE-2020-35448 | LOW | 2.35.2-2 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| libctf0 | CVE-2021-20197 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| libctf0 | CVE-2021-20284 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| libctf0 | CVE-2021-3487 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
| +| libctf0 | CVE-2021-3530 | LOW | 2.35.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| libctf0 | CVE-2021-3549 | LOW | 2.35.2-2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| libctf0 | CVE-2021-45078 | LOW | 2.35.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
| +| libctf0 | CVE-2021-46195 | LOW | 2.35.2-2 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libde265-0 | CVE-2020-21598 | HIGH | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/237
| +| libde265-0 | CVE-2021-36409 | HIGH | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/300
| +| libde265-0 | CVE-2020-21594 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/233
| +| libde265-0 | CVE-2020-21595 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/239
| +| libde265-0 | CVE-2020-21596 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/236
| +| libde265-0 | CVE-2020-21597 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/238
| +| libde265-0 | CVE-2020-21599 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/235
| +| libde265-0 | CVE-2020-21600 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/243
| +| libde265-0 | CVE-2020-21601 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/241
| +| libde265-0 | CVE-2020-21602 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/242
| +| libde265-0 | CVE-2020-21603 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/240
| +| libde265-0 | CVE-2020-21604 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/231
| +| libde265-0 | CVE-2020-21605 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/234
| +| libde265-0 | CVE-2020-21606 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/232
| +| libde265-0 | CVE-2021-35452 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/298
| +| libde265-0 | CVE-2021-36408 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/299
| +| libde265-0 | CVE-2021-36410 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/301
| +| libde265-0 | CVE-2021-36411 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/302
| +| libexpat1 | CVE-2013-0340 | LOW | 2.2.10-2+deb11u2 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libglib2.0-0 | CVE-2012-0039 | LOW | 2.66.8-1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://bugzilla.redhat.com/show_bug.cgi?id=772720
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.7.1-5 | |
Expand...
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.7.1-5 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libheif1 | CVE-2020-23109 | HIGH | 1.11.0-1 | |
Expand...https://github.com/strukturag/libheif/issues/207
| +| libjansson4 | CVE-2020-36325 | LOW | 2.13.1-1.1 | |
Expand...https://github.com/akheron/jansson/issues/548
| +| libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblua5.3-0 | CVE-2019-6706 | HIGH | 5.3.3-1.1 | |
Expand...http://lua.2524044.n2.nabble.com/Bug-Report-Use-after-free-in-debug-upvaluejoin-tc7685506.html
http://lua.2524044.n2.nabble.com/CVE-2019-6706-use-after-free-in-lua-upvaluejoin-function-tc7685575.html
https://access.redhat.com/errata/RHSA-2019:3706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6706
https://linux.oracle.com/cve/CVE-2019-6706.html
https://linux.oracle.com/errata/ELSA-2019-3706.html
https://ubuntu.com/security/notices/USN-3941-1
https://usn.ubuntu.com/3941-1/
https://www.exploit-db.com/exploits/46246/
| +| liblua5.3-0 | CVE-2020-24370 | MEDIUM | 5.3.3-1.1 | |
Expand...http://lua-users.org/lists/lua-l/2020-07/msg00324.html
https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b
https://linux.oracle.com/cve/CVE-2020-24370.html
https://linux.oracle.com/errata/ELSA-2021-4510.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6KONNG6UEI3FMEOY67NDZC32NBGBI44/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXYMCIUNGK26VHAYHGP5LPW56G2KWOHQ/
| +| liblua5.3-0 | CVE-2021-43519 | MEDIUM | 5.3.3-1.1 | |
Expand...http://lua-users.org/lists/lua-l/2021-10/msg00123.html
http://lua-users.org/lists/lua-l/2021-11/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XHFYHGSZKL53VCLSJSAJ6VMFGAIXKO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3EMGAQ5Y6GXJLY4K5DUOOEQT4MZ4J4F/
| +| libmagickcore-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
| +| libmagickcore-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickcore-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickcore-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| libmagickcore-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
| +| libmagickcore-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
| +| libmagickcore-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
| +| libmagickcore-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/633
| +| libmagickcore-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/634
| +| libmagickcore-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/97166
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
| +| libmagickcore-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| +| libmagickcore-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| +| libmagickwand-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
| +| libmagickwand-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickwand-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickwand-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| libmagickwand-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
| +| libmagickwand-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
| +| libmagickwand-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
| +| libmagickwand-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/633
| +| libmagickwand-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/634
| +| libmagickwand-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/97166
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
| +| libmagickwand-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| +| libmagickwand-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| +| libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libopenjp2-7 | CVE-2021-3575 | HIGH | 2.4.0-3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1957616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
https://github.com/uclouvain/openjpeg/issues/1347
https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://ubuntu.com/security/CVE-2021-3575
| +| libopenjp2-7 | CVE-2021-29338 | MEDIUM | 2.4.0-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://github.com/uclouvain/openjpeg/pull/1395
https://github.com/uclouvain/openjpeg/pull/1396
https://github.com/uclouvain/openjpeg/pull/1397
https://github.com/uclouvain/openjpeg/pull/1398
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
| +| libopenjp2-7 | CVE-2016-10505 | LOW | 2.4.0-3 | |
Expand...https://github.com/uclouvain/openjpeg/issues/776
https://github.com/uclouvain/openjpeg/issues/784
https://github.com/uclouvain/openjpeg/issues/785
https://github.com/uclouvain/openjpeg/issues/792
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-10506 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/100573
https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
https://github.com/uclouvain/openjpeg/issues/731
https://github.com/uclouvain/openjpeg/issues/732
https://github.com/uclouvain/openjpeg/issues/777
https://github.com/uclouvain/openjpeg/issues/778
https://github.com/uclouvain/openjpeg/issues/779
https://github.com/uclouvain/openjpeg/issues/780
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9113 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93980
https://github.com/uclouvain/openjpeg/issues/856
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9114 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93979
https://github.com/uclouvain/openjpeg/issues/857
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9115 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93977
https://github.com/uclouvain/openjpeg/issues/858
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9116 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93975
https://github.com/uclouvain/openjpeg/issues/859
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9117 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93783
https://github.com/uclouvain/openjpeg/issues/860
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9580 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/94822
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/871
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9581 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/94822
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/872
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2017-17479 | LOW | 2.4.0-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479
https://github.com/uclouvain/openjpeg/issues/1044
| +| libopenjp2-7 | CVE-2018-16375 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/105266
https://github.com/uclouvain/openjpeg/issues/1126
| +| libopenjp2-7 | CVE-2018-16376 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/105262
https://github.com/uclouvain/openjpeg/issues/1127
| +| libopenjp2-7 | CVE-2018-20846 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/108921
https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc
| +| libopenjp2-7 | CVE-2019-6988 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/106785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
https://github.com/uclouvain/openjpeg/issues/1178
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-13 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libperl5.32 | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| libperl5.32 | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| libpng16-16 | CVE-2019-6129 | LOW | 1.6.37-3 | |
Expand...https://github.com/glennrp/libpng/issues/269
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
| +| libpng16-16 | CVE-2021-4214 | LOW | 1.6.37-3 | |
Expand...
| +| libsepol1 | CVE-2021-36084 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.34.1-3 | |
Expand...https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.34.1-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssl1.1 | CVE-2021-4160 | MEDIUM | 1.1.1k-1+deb11u1 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 247.3-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 247.3-6 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2020-13529 | LOW | 247.3-6 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libtiff5 | CVE-2022-0561 | MEDIUM | 4.2.0-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
| +| libtiff5 | CVE-2022-0562 | MEDIUM | 4.2.0-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562
https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
| +| libtiff5 | CVE-2022-0865 | MEDIUM | 4.2.0-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
https://gitlab.com/libtiff/libtiff/-/issues/385
https://gitlab.com/libtiff/libtiff/-/merge_requests/306
| +| libtiff5 | CVE-2022-22844 | MEDIUM | 4.2.0-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
| +| libtiff5 | CVE-2014-8130 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://openwall.com/lists/oss-security/2015/01/24/15
http://rhn.redhat.com/errata/RHSA-2016-1546.html
http://rhn.redhat.com/errata/RHSA-2016-1547.html
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
http://www.securityfocus.com/bid/72353
http://www.securitytracker.com/id/1032760
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
https://linux.oracle.com/cve/CVE-2014-8130.html
https://linux.oracle.com/errata/ELSA-2016-1547.html
https://security.gentoo.org/glsa/201701-16
https://ubuntu.com/security/notices/USN-2553-1
| +| libtiff5 | CVE-2017-16232 | LOW | 4.2.0-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
| +| libtiff5 | CVE-2017-17973 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769
http://www.securityfocus.com/bid/102331
https://bugzilla.novell.com/show_bug.cgi?id=1074318
https://bugzilla.redhat.com/show_bug.cgi?id=1530912
| +| libtiff5 | CVE-2017-5563 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664
http://www.securityfocus.com/bid/95705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
https://security.gentoo.org/glsa/201709-27
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5 | CVE-2017-9117 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690
http://www.securityfocus.com/bid/98581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5 | CVE-2018-10126 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtiff5 | CVE-2022-0891 | UNKNOWN | 4.2.0-1 | |
Expand...https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
https://gitlab.com/libtiff/libtiff/-/issues/380
https://gitlab.com/libtiff/libtiff/-/issues/382
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2021-3997 | MEDIUM | 247.3-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 247.3-6 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2020-13529 | LOW | 247.3-6 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libwebp6 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libwebpdemux2 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libwebpmux3 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libxml2 | CVE-2022-23308 | HIGH | 2.9.10+dfsg-6.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
| +| linux-libc-dev | CVE-2013-7445 | HIGH | 5.10.92-1 | |
Expand...https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| +| linux-libc-dev | CVE-2019-19378 | HIGH | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2019-19449 | HIGH | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2019-19814 | HIGH | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2020-12362 | HIGH | 5.10.92-1 | |
Expand...https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-36516 | HIGH | 5.10.92-1 | |
Expand...https://dl.acm.org/doi/10.1145/3372297.3417884
| +| linux-libc-dev | CVE-2021-3864 | HIGH | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864
https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com
https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/
https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com
https://www.openwall.com/lists/oss-security/2021/10/20/2
| +| linux-libc-dev | CVE-2022-0330 | HIGH | 5.10.92-1 | 5.10.92-2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c
https://linux.oracle.com/cve/CVE-2022-0330.html
https://linux.oracle.com/errata/ELSA-2022-0825.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://www.openwall.com/lists/oss-security/2022/01/25/12
| +| linux-libc-dev | CVE-2022-0435 | HIGH | 5.10.92-1 | 5.10.92-2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
https://linux.oracle.com/cve/CVE-2022-0435.html
https://linux.oracle.com/errata/ELSA-2022-0825.html
https://ubuntu.com/security/notices/USN-5302-1
https://www.openwall.com/lists/oss-security/2022/02/10/1
| +| linux-libc-dev | CVE-2022-0492 | HIGH | 5.10.92-1 | 5.10.103-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2051505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af
https://linux.oracle.com/cve/CVE-2022-0492.html
https://linux.oracle.com/errata/ELSA-2022-9180.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5302-1
https://www.debian.org/security/2022/dsa-5095
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2022/02/04/1
| +| linux-libc-dev | CVE-2022-0500 | HIGH | 5.10.92-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57
| +| linux-libc-dev | CVE-2022-0516 | HIGH | 5.10.92-1 | 5.10.92-2 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2050237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55
https://linux.oracle.com/cve/CVE-2022-0516.html
https://linux.oracle.com/errata/ELSA-2022-0825.html
https://www.debian.org/security/2022/dsa-5092
https://www.openwall.com/lists/oss-security/2022/02/11/2
| +| linux-libc-dev | CVE-2022-0847 | HIGH | 5.10.92-1 | 5.10.92-2 |
Expand...http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html
http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html
http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html
https://bugzilla.redhat.com/show_bug.cgi?id=2060795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847
https://dirtypipe.cm4all.com/
https://linux.oracle.com/cve/CVE-2022-0847.html
https://linux.oracle.com/errata/ELSA-2022-9213.html
https://ubuntu.com/security/notices/USN-5317-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/DirtyPipe
https://www.openwall.com/lists/oss-security/2022/03/07/1
| +| linux-libc-dev | CVE-2022-22942 | HIGH | 5.10.92-1 | 5.10.92-2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
https://linux.oracle.com/cve/CVE-2022-22942.html
https://linux.oracle.com/errata/ELSA-2022-0825.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://www.openwall.com/lists/oss-security/2022/01/27/4
| +| linux-libc-dev | CVE-2022-24958 | HIGH | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda
https://github.com/torvalds/linux/commit/501e38a5531efbd77d5c73c0ba838a889bfc1d74
https://github.com/torvalds/linux/commit/89f3594d0de58e8a57d92d497dea9fee3d4b9cda
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/
https://security.netapp.com/advisory/ntap-20220225-0008/
| +| linux-libc-dev | CVE-2022-25636 | HIGH | 5.10.92-1 | 5.10.103-1 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/22/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636
https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6
https://linux.oracle.com/cve/CVE-2022-25636.html
https://linux.oracle.com/errata/ELSA-2022-9182.html
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://www.debian.org/security/2022/dsa-5095
https://www.openwall.com/lists/oss-security/2022/02/21/2
| +| linux-libc-dev | CVE-2019-15213 | MEDIUM | 5.10.92-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| +| linux-libc-dev | CVE-2019-15794 | MEDIUM | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4209-1
https://usn.ubuntu.com/usn/usn-4208-1
https://usn.ubuntu.com/usn/usn-4209-1
| +| linux-libc-dev | CVE-2019-16089 | MEDIUM | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089
https://linux.oracle.com/cve/CVE-2019-16089.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lore.kernel.org/lkml/20190911164013.27364-1-navid.emamdoost@gmail.com/
https://lore.kernel.org/patchwork/patch/1106884/
https://lore.kernel.org/patchwork/patch/1126650/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K03814795?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4425-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4425-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
| +| linux-libc-dev | CVE-2019-20794 | MEDIUM | 5.10.92-1 | |
Expand...http://www.openwall.com/lists/oss-security/2020/08/24/1
https://github.com/sargun/fuse-example
https://security.netapp.com/advisory/ntap-20200608-0001/
https://sourceforge.net/p/fuse/mailman/message/36598753/
| +| linux-libc-dev | CVE-2020-12363 | MEDIUM | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-12364 | MEDIUM | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-14304 | MEDIUM | 5.10.92-1 | |
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
| +| linux-libc-dev | CVE-2020-15802 | MEDIUM | 5.10.92-1 | |
Expand...https://arxiv.org/abs/2009.11776
https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709
https://hexhive.epfl.ch/BLURtooth/
https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/
https://www.kb.cert.org/vuls/id/589825
https://www.kb.cert.org/vuls/id/589825/
| +| linux-libc-dev | CVE-2020-24504 | MEDIUM | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504
https://linux.oracle.com/cve/CVE-2020-24504.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
| +| linux-libc-dev | CVE-2020-26555 | MEDIUM | 5.10.92-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
| +| linux-libc-dev | CVE-2020-36310 | MEDIUM | 5.10.92-1 | 5.10.103-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
https://linux.oracle.com/cve/CVE-2020-36310.html
https://linux.oracle.com/errata/ELSA-2021-9307.html
https://www.debian.org/security/2022/dsa-5095
| +| linux-libc-dev | CVE-2021-3669 | MEDIUM | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
| +| linux-libc-dev | CVE-2021-3759 | MEDIUM | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759
https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5135-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2021-3847 | MEDIUM | 5.10.92-1 | |
Expand...https://www.openwall.com/lists/oss-security/2021/10/14/3
| +| linux-libc-dev | CVE-2021-4023 | MEDIUM | 5.10.92-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2026484
| +| linux-libc-dev | CVE-2021-4037 | MEDIUM | 5.10.92-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848
| +| linux-libc-dev | CVE-2021-4149 | MEDIUM | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149
https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)
https://lkml.org/lkml/2021/10/18/885
https://lkml.org/lkml/2021/9/13/2565
| +| linux-libc-dev | CVE-2021-4197 | MEDIUM | 5.10.92-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2035652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/
https://ubuntu.com/security/notices/USN-5278-1
| +| linux-libc-dev | CVE-2021-4204 | MEDIUM | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/impish/commit/?id=53fb7741ff9d546174dbb585957b4f8b6afbdb83
https://ubuntu.com/security/notices/USN-5217-1
https://ubuntu.com/security/notices/USN-5218-1
https://ubuntu.com/security/notices/USN-5219-1
https://www.openwall.com/lists/oss-security/2022/01/11/4
| +| linux-libc-dev | CVE-2021-43976 | MEDIUM | 5.10.92-1 | 5.10.92-2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
https://security.netapp.com/advisory/ntap-20211210-0001/
https://ubuntu.com/security/notices/USN-5302-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-44879 | MEDIUM | 5.10.92-1 | |
Expand...https://bugzilla.kernel.org/show_bug.cgi?id=215231
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f
https://lkml.org/lkml/2022/1/24/4067
https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/
https://ubuntu.com/security/notices/USN-5302-1
https://www.openwall.com/lists/oss-security/2022/02/12/1
| +| linux-libc-dev | CVE-2022-0001 | MEDIUM | 5.10.92-1 | 5.10.103-1 |
Expand...https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://ubuntu.com/security/notices/USN-5319-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://www.vusec.net/projects/bhi-spectre-bhb/
| +| linux-libc-dev | CVE-2022-0002 | MEDIUM | 5.10.92-1 | 5.10.103-1 |
Expand...https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://ubuntu.com/security/notices/USN-5319-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://www.vusec.net/projects/bhi-spectre-bhb/
| +| linux-libc-dev | CVE-2022-0400 | MEDIUM | 5.10.92-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2040604
https://bugzilla.redhat.com/show_bug.cgi?id=2040604 (not public)
https://bugzilla.redhat.com/show_bug.cgi?id=2044575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0400
| +| linux-libc-dev | CVE-2022-0480 | MEDIUM | 5.10.92-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2049700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480
https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)
https://github.com/kata-containers/kata-containers/issues/3373
https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
| +| linux-libc-dev | CVE-2022-0487 | MEDIUM | 5.10.92-1 | 5.10.103-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2044561
https://bugzilla.suse.com/show_bug.cgi?id=1194516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/
https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/
https://www.debian.org/security/2022/dsa-5095
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2022-0617 | MEDIUM | 5.10.92-1 | 5.10.103-1 |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/
https://www.debian.org/security/2022/dsa-5095
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2022-0812 | MEDIUM | 5.10.92-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2058361
https://twitter.com/iMilnb/status/1497125078252806161
| +| linux-libc-dev | CVE-2022-23960 | MEDIUM | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://developer.arm.com/documentation/ka004995/latest/
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/spectre-bhb
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
https://www.vusec.net/projects/bhi-spectre-bhb/
| +| linux-libc-dev | CVE-2022-24959 | MEDIUM | 5.10.92-1 | 5.10.92-2 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
https://git.kernel.org/linus/29eb31542787e1019208a2e1047bb7c76c069536 (5.17-rc2)
https://github.com/torvalds/linux/commit/29eb31542787e1019208a2e1047bb7c76c069536
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5302-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2022-25258 | MEDIUM | 5.10.92-1 | 5.10.92-2 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
https://github.com/szymonh/d-os-descriptor
https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2022-25375 | MEDIUM | 5.10.92-1 | 5.10.92-2 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/21/1
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
https://github.com/szymonh/rndis-co
https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2004-0230 | LOW | 5.10.92-1 | |
Expand...ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt
ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc
http://kb.juniper.net/JSA10638
http://marc.info/?l=bugtraq&m=108302060014745&w=2
http://marc.info/?l=bugtraq&m=108506952116653&w=2
http://secunia.com/advisories/11440
http://secunia.com/advisories/11458
http://secunia.com/advisories/22341
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
http://www.kb.cert.org/vuls/id/415294
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.osvdb.org/4030
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.securityfocus.com/bid/10183
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
http://www.us-cert.gov/cas/techalerts/TA04-111A.html
http://www.vupen.com/english/advisories/2006/3983
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
https://exchange.xforce.ibmcloud.com/vulnerabilities/15886
https://kc.mcafee.com/corporate/index?page=content&id=SB10053
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711
| +| linux-libc-dev | CVE-2005-3660 | LOW | 5.10.92-1 | |
Expand...http://secunia.com/advisories/18205
http://securityreason.com/securityalert/291
http://securitytracker.com/id?1015402
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362
http://www.securityfocus.com/bid/16041
http://www.vupen.com/english/advisories/2005/3076
https://exchange.xforce.ibmcloud.com/vulnerabilities/23835
| +| linux-libc-dev | CVE-2007-3719 | LOW | 5.10.92-1 | |
Expand...http://osvdb.org/37127
http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf
| +| linux-libc-dev | CVE-2008-2544 | LOW | 5.10.92-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=213135
| +| linux-libc-dev | CVE-2008-4609 | LOW | 5.10.92-1 | |
Expand...http://blog.robertlee.name/2008/10/conjecture-speculation.html
http://insecure.org/stf/tcp-dos-attack-explained.html
http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html
http://marc.info/?l=bugtraq&m=125856010926699&w=2
http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked
http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml
http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html
http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
http://www.outpost24.com/news/news-2008-10-02.html
http://www.us-cert.gov/cas/techalerts/TA09-251A.html
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340
https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html
| +| linux-libc-dev | CVE-2010-4563 | LOW | 5.10.92-1 | |
Expand...http://seclists.org/dailydave/2011/q2/25
http://seclists.org/fulldisclosure/2011/Apr/254
| +| linux-libc-dev | CVE-2010-5321 | LOW | 5.10.92-1 | |
Expand...http://linuxtv.org/irc/v4l/index.php?date=2010-07-29
http://www.openwall.com/lists/oss-security/2015/02/08/4
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340
https://bugzilla.kernel.org/show_bug.cgi?id=120571
https://bugzilla.redhat.com/show_bug.cgi?id=620629
| +| linux-libc-dev | CVE-2011-4915 | LOW | 5.10.92-1 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497
http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html
http://www.openwall.com/lists/oss-security/2011/11/07/9
https://lkml.org/lkml/2011/11/7/340
https://seclists.org/oss-sec/2011/q4/571
https://security-tracker.debian.org/tracker/CVE-2011-4915
https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131
| +| linux-libc-dev | CVE-2011-4917 | LOW | 5.10.92-1 | |
Expand...
| +| linux-libc-dev | CVE-2012-4542 | LOW | 5.10.92-1 | |
Expand...http://marc.info/?l=linux-kernel&m=135903967015813&w=2
http://marc.info/?l=linux-kernel&m=135904012416042&w=2
http://rhn.redhat.com/errata/RHSA-2013-0496.html
http://rhn.redhat.com/errata/RHSA-2013-0579.html
http://rhn.redhat.com/errata/RHSA-2013-0882.html
http://rhn.redhat.com/errata/RHSA-2013-0928.html
https://bugzilla.redhat.com/show_bug.cgi?id=875360
https://linux.oracle.com/cve/CVE-2012-4542.html
https://linux.oracle.com/errata/ELSA-2013-2534.html
https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8
| +| linux-libc-dev | CVE-2014-9892 | LOW | 5.10.92-1 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
| +| linux-libc-dev | CVE-2014-9900 | LOW | 5.10.92-1 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9900
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
| +| linux-libc-dev | CVE-2015-2877 | LOW | 5.10.92-1 | |
Expand...http://www.antoniobarresi.com/files/cain_advisory.txt
http://www.kb.cert.org/vuls/id/935424
http://www.securityfocus.com/bid/76256
https://bugzilla.redhat.com/show_bug.cgi?id=1252096
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
| +| linux-libc-dev | CVE-2016-10723 | LOW | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723
https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/
https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/
https://patchwork.kernel.org/patch/10395909/
https://patchwork.kernel.org/patch/9842889/
https://www.spinics.net/lists/linux-mm/msg117896.html
| +| linux-libc-dev | CVE-2016-8660 | LOW | 5.10.92-1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
| +| linux-libc-dev | CVE-2017-0630 | LOW | 5.10.92-1 | |
Expand...http://www.securityfocus.com/bid/98213
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
| +| linux-libc-dev | CVE-2017-13693 | LOW | 5.10.92-1 | |
Expand...http://www.securityfocus.com/bid/100502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| +| linux-libc-dev | CVE-2017-13694 | LOW | 5.10.92-1 | |
Expand...http://www.securityfocus.com/bid/100500
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
https://patchwork.kernel.org/patch/9806085/
| +| linux-libc-dev | CVE-2018-1121 | LOW | 5.10.92-1 | |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| +| linux-libc-dev | CVE-2018-12928 | LOW | 5.10.92-1 | |
Expand...http://www.securityfocus.com/bid/104593
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
| +| linux-libc-dev | CVE-2018-17977 | LOW | 5.10.92-1 | |
Expand...http://www.securityfocus.com/bid/105539
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
| +| linux-libc-dev | CVE-2019-11191 | LOW | 5.10.92-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://www.openwall.com/lists/oss-security/2019/04/18/5
http://www.openwall.com/lists/oss-security/2019/05/22/7
http://www.securityfocus.com/bid/107887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191
https://ubuntu.com/security/notices/USN-4006-1
https://ubuntu.com/security/notices/USN-4006-2
https://ubuntu.com/security/notices/USN-4007-1
https://ubuntu.com/security/notices/USN-4007-2
https://ubuntu.com/security/notices/USN-4008-1
https://ubuntu.com/security/notices/USN-4008-3
https://usn.ubuntu.com/4006-1/
https://usn.ubuntu.com/4006-2/
https://usn.ubuntu.com/4007-1/
https://usn.ubuntu.com/4007-2/
https://usn.ubuntu.com/4008-1/
https://usn.ubuntu.com/4008-3/
https://www.openwall.com/lists/oss-security/2019/04/03/4
https://www.openwall.com/lists/oss-security/2019/04/03/4/1
| +| linux-libc-dev | CVE-2019-12378 | LOW | 5.10.92-1 | |
Expand...http://www.securityfocus.com/bid/108475
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95baa60a0da80a0143e3ddd4d3725758b4513825
https://linux.oracle.com/cve/CVE-2019-12378.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/229
| +| linux-libc-dev | CVE-2019-12379 | LOW | 5.10.92-1 | |
Expand...http://www.securityfocus.com/bid/108478
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=15b3cd8ef46ad1b100e0d3c7e38774f330726820
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
| +| linux-libc-dev | CVE-2019-12380 | LOW | 5.10.92-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
https://linux.oracle.com/cve/CVE-2019-12380.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
| +| linux-libc-dev | CVE-2019-12381 | LOW | 5.10.92-1 | |
Expand...http://www.securityfocus.com/bid/108473
https://bugzilla.redhat.com/show_bug.cgi?id=1715501
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515
https://linux.oracle.com/cve/CVE-2019-12381.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/230
| +| linux-libc-dev | CVE-2019-12382 | LOW | 5.10.92-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108474
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://linux.oracle.com/cve/CVE-2019-12382.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/24/843
https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/
https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382
| +| linux-libc-dev | CVE-2019-12455 | LOW | 5.10.92-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2010240.html
| +| linux-libc-dev | CVE-2019-12456 | LOW | 5.10.92-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
https://bugzilla.redhat.com/show_bug.cgi?id=1717182
https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
https://lkml.org/lkml/2019/5/29/1164
https://support.f5.com/csp/article/K84310302
https://support.f5.com/csp/article/K84310302?utm_source=f5support&amp;utm_medium=RSS
| +| linux-libc-dev | CVE-2019-16229 | LOW | 5.10.92-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16230 | LOW | 5.10.92-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| linux-libc-dev | CVE-2019-16231 | LOW | 5.10.92-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d
https://linux.oracle.com/cve/CVE-2019-16231.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
| +| linux-libc-dev | CVE-2019-16232 | LOW | 5.10.92-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232
https://linux.oracle.com/cve/CVE-2019-16232.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16233 | LOW | 5.10.92-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
https://linux.oracle.com/cve/CVE-2019-16233.html
https://linux.oracle.com/errata/ELSA-2020-5508.html
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-16234 | LOW | 5.10.92-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
https://linux.oracle.com/cve/CVE-2019-16234.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-19070 | LOW | 5.10.92-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1157294
https://github.com/torvalds/linux/commit/d3b0ffa1d75d5305ebe34735598993afbb8a869d
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
| +| linux-libc-dev | CVE-2020-11725 | LOW | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725
https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
https://twitter.com/yabbadabbadrew/status/1248632267028582400
| +| linux-libc-dev | CVE-2020-35501 | LOW | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://www.openwall.com/lists/oss-security/2021/02/18/1
| +| linux-libc-dev | CVE-2021-26934 | LOW | 5.10.92-1 | |
Expand...http://xenbits.xen.org/xsa/advisory-363.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/2
https://xenbits.xen.org/xsa/advisory-363.html
| +| linux-libc-dev | CVE-2021-32078 | LOW | 5.10.92-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://security.netapp.com/advisory/ntap-20210813-0002/
| +| linux-libc-dev | CVE-2022-24448 | LOW | 5.10.92-1 | 5.10.92-2 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf
https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5302-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
https://www.spinics.net/lists/stable/msg531976.html
| +| linux-libc-dev | CVE-2022-25265 | LOW | 5.10.92-1 | |
Expand...https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294
https://github.com/x0reaxeax/exec-prot-bypass
| +| linux-libc-dev | CVE-2021-39686 | UNKNOWN | 5.10.92-1 | |
Expand...
| +| linux-libc-dev | CVE-2022-23036 | UNKNOWN | 5.10.92-1 | |
Expand...https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23037 | UNKNOWN | 5.10.92-1 | |
Expand...https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23038 | UNKNOWN | 5.10.92-1 | |
Expand...https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23039 | UNKNOWN | 5.10.92-1 | |
Expand...https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23040 | UNKNOWN | 5.10.92-1 | |
Expand...https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23041 | UNKNOWN | 5.10.92-1 | |
Expand...https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23042 | UNKNOWN | 5.10.92-1 | |
Expand...https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-26490 | UNKNOWN | 5.10.92-1 | |
Expand...https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221
| +| login | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| m4 | CVE-2008-1687 | LOW | 1.4.18-5 | |
Expand...http://secunia.com/advisories/29671
http://secunia.com/advisories/29729
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
http://www.openwall.com/lists/oss-security/2008/04/07/1
http://www.openwall.com/lists/oss-security/2008/04/07/12
http://www.openwall.com/lists/oss-security/2008/04/07/3
http://www.openwall.com/lists/oss-security/2008/04/07/4
http://www.securityfocus.com/bid/28688
http://www.vupen.com/english/advisories/2008/1151/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41706
| +| m4 | CVE-2008-1688 | LOW | 1.4.18-5 | |
Expand...http://osvdb.org/44272
http://secunia.com/advisories/29671
http://secunia.com/advisories/29729
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
http://www.openwall.com/lists/oss-security/2008/04/07/1
http://www.openwall.com/lists/oss-security/2008/04/07/3
http://www.securityfocus.com/bid/28688
http://www.vupen.com/english/advisories/2008/1151/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41704
| +| mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2021-4160 | MEDIUM | 1.1.1k-1+deb11u1 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| openssl | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| patch | CVE-2010-4651 | LOW | 2.7.6-7 | |
Expand...http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html
http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html
http://openwall.com/lists/oss-security/2011/01/05/10
http://openwall.com/lists/oss-security/2011/01/06/19
http://openwall.com/lists/oss-security/2011/01/06/20
http://openwall.com/lists/oss-security/2011/01/06/21
http://secunia.com/advisories/43663
http://secunia.com/advisories/43677
http://support.apple.com/kb/HT4723
http://www.securityfocus.com/bid/46768
http://www.vupen.com/english/advisories/2011/0600
https://bugzilla.redhat.com/show_bug.cgi?id=667529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651
https://ubuntu.com/security/notices/USN-2651-1
| +| patch | CVE-2018-6951 | LOW | 2.7.6-7 | |
Expand...http://www.securityfocus.com/bid/103044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
https://savannah.gnu.org/bugs/index.php?53132
https://security.gentoo.org/glsa/201904-17
https://ubuntu.com/security/notices/USN-3624-1
https://usn.ubuntu.com/3624-1/
| +| patch | CVE-2018-6952 | LOW | 2.7.6-7 | |
Expand...http://www.securityfocus.com/bid/103047
https://access.redhat.com/errata/RHSA-2019:2033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952
https://linux.oracle.com/cve/CVE-2018-6952.html
https://linux.oracle.com/errata/ELSA-2019-2033.html
https://savannah.gnu.org/bugs/index.php?53133
https://security.gentoo.org/glsa/201904-17
| +| patch | CVE-2021-45261 | LOW | 2.7.6-7 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261
https://savannah.gnu.org/bugs/?61685
| +| perl | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| perl-base | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| perl-modules-5.32 | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-modules-5.32 | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| re2c | CVE-2018-21232 | LOW | 2.0.3-1 | |
Expand...http://www.openwall.com/lists/oss-security/2020/05/14/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21232
https://github.com/skvadrik/re2c/issues/219
https://www.openwall.com/lists/oss-security/2020/04/27/2
| +| tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| util-linux | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| + +**node-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| dompurify | GHSA-mjjq-c88q-qhr6 | CRITICAL | 1.0.11 | 2.0.7 |
Expand...https://github.com/advisories/GHSA-mjjq-c88q-qhr6
https://github.com/cure53/DOMPurify/releases/tag/2.0.7
https://www.npmjs.com/advisories/1223
| +| dompurify | CVE-2019-16728 | MEDIUM | 1.0.11 | 2.0.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16728
https://github.com/advisories/GHSA-chqj-j4fh-rw7m
https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2019-16728
https://research.securitum.com/dompurify-bypass-using-mxss/
https://www.npmjs.com/advisories/1205
| +| dompurify | CVE-2020-26870 | MEDIUM | 1.0.11 | 2.0.17 |
Expand...https://github.com/advisories/GHSA-63q7-h895-m982
https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d
https://github.com/cure53/DOMPurify/compare/2.0.16...2.0.17
https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2020-26870
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26870
https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass/
https://snyk.io/vuln/SNYK-JS-DOMPURIFY-1016634
| +| jquery | CVE-2016-10707 | HIGH | 2.2.4 | 3.0.0 |
Expand...https://github.com/advisories/GHSA-mhpp-875w-9cpv
https://github.com/jquery/jquery/issues/3133
https://github.com/jquery/jquery/issues/3133)
https://github.com/jquery/jquery/pull/3134
https://nvd.nist.gov/vuln/detail/CVE-2016-10707
https://snyk.io/vuln/npm:jquery:20160529
https://www.npmjs.com/advisories/330
| +| jquery | NSWG-ECO-328 | HIGH | 2.2.4 | >=3.0.0 |
Expand...https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614)
https://github.com/jquery/jquery/issues/2432)
https://github.com/jquery/jquery/pull/2588)
| +| jquery | CVE-2015-9251 | MEDIUM | 2.2.4 | 3.0.0 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html
http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html
http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html
http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html
http://seclists.org/fulldisclosure/2019/May/10
http://seclists.org/fulldisclosure/2019/May/11
http://seclists.org/fulldisclosure/2019/May/13
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105658
https://access.redhat.com/errata/RHSA-2020:0481
https://access.redhat.com/errata/RHSA-2020:0729
https://github.com/advisories/GHSA-rmxg-73gg-4p98
https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614
https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc
https://github.com/jquery/jquery/issues/2432
https://github.com/jquery/jquery/pull/2588
https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2
https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
https://linux.oracle.com/cve/CVE-2015-9251.html
https://linux.oracle.com/errata/ELSA-2020-4847.html
https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E
https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-9251
https://seclists.org/bugtraq/2019/May/18
https://security.netapp.com/advisory/ntap-20210108-0004/
https://snyk.io/vuln/npm:jquery:20150627
https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf
https://www.npmjs.com/advisories/328
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-08
| +| jquery | CVE-2019-11358 | MEDIUM | 2.2.4 | >=3.4.0 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html
http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html
http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html
http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html
http://seclists.org/fulldisclosure/2019/May/10
http://seclists.org/fulldisclosure/2019/May/11
http://seclists.org/fulldisclosure/2019/May/13
http://www.openwall.com/lists/oss-security/2019/06/03/2
http://www.securityfocus.com/bid/108023
https://access.redhat.com/errata/RHBA-2019:1570
https://access.redhat.com/errata/RHSA-2019:1456
https://access.redhat.com/errata/RHSA-2019:2587
https://access.redhat.com/errata/RHSA-2019:3023
https://access.redhat.com/errata/RHSA-2019:3024
https://backdropcms.org/security/backdrop-sa-core-2019-009
https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358
https://github.com/DanielRuf/snyk-js-jquery-174006?files=1
https://github.com/advisories/GHSA-6c3j-c64m-qhgq
https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b
https://github.com/jquery/jquery/pull/4333
https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#434
https://hackerone.com/reports/454365
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
https://linux.oracle.com/cve/CVE-2019-11358.html
https://linux.oracle.com/errata/ELSA-2020-4847.html
https://lists.apache.org/thread.html/08720ef215ee7ab3386c05a1a90a7d1c852bf0706f176a7816bf65fc@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/5928aa293e39d248266472210c50f176cac1535220f2486e6a7fa844@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/6097cdbd6f0a337bedd9bb5cc441b2d525ff002a96531de367e4259f@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/88fb0362fd40e5b605ea8149f63241537b8b6fb5bfa315391fc5cbb7@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/b736d0784cf02f5a30fbb4c5902762a15ad6d47e17e2c5a17b7d6205@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E
https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/r2041a75d3fc09dec55adfd95d598b38d22715303f65c997c054844c9@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r2baacab6e0acb5a2092eb46ae04fd6c3e8277b4fd79b1ffb7f3254fa@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r38f0d1aa3c923c22977fe7376508f030f22e22c1379fbb155bf29766@%3Cdev.syncope.apache.org%3E
https://lists.apache.org/thread.html/r41b5bfe009c845f67d4f68948cc9419ac2d62e287804aafd72892b08@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r7aac081cbddb6baa24b75e74abf0929bf309b176755a53e3ed810355@%3Cdev.flink.apache.org%3E
https://lists.apache.org/thread.html/r7d64895cc4dff84d0becfc572b20c0e4bf9bfa7b10c6f5f73e783734@%3Cdev.storm.apache.org%3E
https://lists.apache.org/thread.html/r7e8ebccb7c022e41295f6fdb7b971209b83702339f872ddd8cf8bf73@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/rac25da84ecdcd36f6de5ad0d255f4e967209bbbebddb285e231da37d@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/05/msg00006.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UOAZIFCSZ3ENEFOR5IXX6NFAD3HV7FA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5IABSKTYZ5JUGL735UKGXL5YPRYOPUYI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYH3OAGR2RTCHRA5NOKX2TES7SNQMWGO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV3PKZC3PQCO3273HAT76PAQZFBEO4KP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLXRX23725JL366CNZGJZ7AQQB7LHQ6F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZW27UCJ5CYFL4KFFFMYMIBNMIU2ALG5/
https://nvd.nist.gov/vuln/detail/CVE-2019-11358
https://seclists.org/bugtraq/2019/Apr/32
https://seclists.org/bugtraq/2019/Jun/12
https://seclists.org/bugtraq/2019/May/18
https://security.netapp.com/advisory/ntap-20190919-0001/
https://snyk.io/vuln/SNYK-JS-JQUERY-174006
https://www.debian.org/security/2019/dsa-4434
https://www.debian.org/security/2019/dsa-4460
https://www.drupal.org/sa-core-2019-006
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.privacy-wise.com/mitigating-cve-2019-11358-in-old-versions-of-jquery/
https://www.synology.com/security/advisory/Synology_SA_19_19
https://www.tenable.com/security/tns-2019-08
https://www.tenable.com/security/tns-2020-02
| +| jquery | CVE-2020-11022 | MEDIUM | 2.2.4 | 3.5.0 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html
http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://github.com/advisories/GHSA-gxr4-xjj5-5px2
https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77
https://github.com/jquery/jquery/releases/tag/3.5.0
https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2
https://jquery.com/upgrade-guide/3.5/
https://linux.oracle.com/cve/CVE-2020-11022.html
https://linux.oracle.com/errata/ELSA-2022-9177.html
https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E
https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/
https://nvd.nist.gov/vuln/detail/CVE-2020-11022
https://security.gentoo.org/glsa/202007-03
https://security.netapp.com/advisory/ntap-20200511-0006/
https://www.debian.org/security/2020/dsa-4693
https://www.drupal.org/sa-core-2020-002
https://www.npmjs.com/advisories/1518
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2020-10
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-02
https://www.tenable.com/security/tns-2021-10
| +| jquery | CVE-2020-11023 | MEDIUM | 2.2.4 | 3.5.0 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html
http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023
https://github.com/advisories/GHSA-jpcq-cgw6-v4j6
https://github.com/jquery/jquery/releases/tag/3.5.0
https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6
https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440
https://jquery.com/upgrade-guide/3.5/
https://linux.oracle.com/cve/CVE-2020-11023.html
https://linux.oracle.com/errata/ELSA-2022-9177.html
https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@%3Ccommits.felix.apache.org%3E
https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@%3Ccommits.hive.apache.org%3E
https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E
https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E
https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/
https://nvd.nist.gov/vuln/detail/CVE-2020-11023
https://security.gentoo.org/glsa/202007-03
https://security.netapp.com/advisory/ntap-20200511-0006/
https://www.debian.org/security/2020/dsa-4693
https://www.drupal.org/sa-core-2020-002
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-02
https://www.tenable.com/security/tns-2021-10
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:ff9e9a91c1a1d12b5d39660b66ef235535528883004af1d8dfd4047c2d9943a3 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/mariadb:v10.6.7@sha256:534fb95db986ef4799df0b9734883f63a45c66f63ba077ac2d6a002f4d91dbb8 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2022-23308 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/stable/friendica/2.0.0/templates/common.yaml b/stable/friendica/2.0.0/templates/common.yaml new file mode 100644 index 00000000000..9705d4f5fa6 --- /dev/null +++ b/stable/friendica/2.0.0/templates/common.yaml @@ -0,0 +1,2 @@ + +{{ include "common.all" . }} diff --git a/stable/friendica/2.0.0/values.yaml b/stable/friendica/2.0.0/values.yaml new file mode 100644 index 00000000000..e69de29bb2d