From ced2b9eb2b7eefef69d9f8d290269b07c554267f Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Sun, 13 Feb 2022 12:15:25 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- incubator/linkace/0.0.1/CHANGELOG.md | 10 + incubator/linkace/0.0.1/CONFIG.md | 8 + incubator/linkace/0.0.1/Chart.lock | 12 + incubator/linkace/0.0.1/Chart.yaml | 35 + incubator/linkace/0.0.1/README.md | 41 + incubator/linkace/0.0.1/app-readme.md | 3 + .../linkace/0.0.1/charts/common-8.15.2.tgz | Bin 0 -> 41360 bytes .../linkace/0.0.1/charts/mariadb-1.0.68.tgz | Bin 0 -> 70362 bytes .../linkace/0.0.1/charts/redis-1.0.71.tgz | Bin 0 -> 71277 bytes incubator/linkace/0.0.1/helm-values.md | 84 + incubator/linkace/0.0.1/ix_values.yaml | 127 + incubator/linkace/0.0.1/questions.yaml | 2849 +++++++++++++++++ incubator/linkace/0.0.1/security.md | 714 +++++ .../linkace/0.0.1/templates/_cronjob.tpl | 53 + .../linkace/0.0.1/templates/_secrets.tpl | 20 + incubator/linkace/0.0.1/templates/common.yaml | 23 + .../linkace/0.0.1/templates/configmap.yaml | 65 + incubator/linkace/0.0.1/values.yaml | 0 incubator/linkace/item.yaml | 4 + 19 files changed, 4048 insertions(+) create mode 100644 incubator/linkace/0.0.1/CHANGELOG.md create mode 100644 incubator/linkace/0.0.1/CONFIG.md create mode 100644 incubator/linkace/0.0.1/Chart.lock create mode 100644 incubator/linkace/0.0.1/Chart.yaml create mode 100644 incubator/linkace/0.0.1/README.md create mode 100644 incubator/linkace/0.0.1/app-readme.md create mode 100644 incubator/linkace/0.0.1/charts/common-8.15.2.tgz create mode 100644 incubator/linkace/0.0.1/charts/mariadb-1.0.68.tgz create mode 100644 incubator/linkace/0.0.1/charts/redis-1.0.71.tgz create mode 100644 incubator/linkace/0.0.1/helm-values.md create mode 100644 incubator/linkace/0.0.1/ix_values.yaml create mode 100644 incubator/linkace/0.0.1/questions.yaml create mode 100644 incubator/linkace/0.0.1/security.md create mode 100644 incubator/linkace/0.0.1/templates/_cronjob.tpl create mode 100644 incubator/linkace/0.0.1/templates/_secrets.tpl create mode 100644 incubator/linkace/0.0.1/templates/common.yaml create mode 100644 incubator/linkace/0.0.1/templates/configmap.yaml create mode 100644 incubator/linkace/0.0.1/values.yaml create mode 100644 incubator/linkace/item.yaml diff --git a/incubator/linkace/0.0.1/CHANGELOG.md b/incubator/linkace/0.0.1/CHANGELOG.md new file mode 100644 index 00000000000..d4c51948bf9 --- /dev/null +++ b/incubator/linkace/0.0.1/CHANGELOG.md @@ -0,0 +1,10 @@ +# Changelog
+ + + +### linkace-0.0.1 (2022-02-13) + +#### Feat + +* Add linkace ([#1886](https://github.com/truecharts/apps/issues/1886)) + diff --git a/incubator/linkace/0.0.1/CONFIG.md b/incubator/linkace/0.0.1/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/incubator/linkace/0.0.1/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/incubator/linkace/0.0.1/Chart.lock b/incubator/linkace/0.0.1/Chart.lock new file mode 100644 index 00000000000..6824ccd66be --- /dev/null +++ b/incubator/linkace/0.0.1/Chart.lock @@ -0,0 +1,12 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.15.2 +- name: mariadb + repository: https://truecharts.org/ + version: 1.0.68 +- name: redis + repository: https://truecharts.org + version: 1.0.71 +digest: sha256:b1da3265f6cd1f2de737e63e8d697b533e3f12e3b717bfa59e79677a94d34a52 +generated: "2022-02-13T12:10:30.367605563Z" diff --git a/incubator/linkace/0.0.1/Chart.yaml b/incubator/linkace/0.0.1/Chart.yaml new file mode 100644 index 00000000000..d5d410d67d5 --- /dev/null +++ b/incubator/linkace/0.0.1/Chart.yaml @@ -0,0 +1,35 @@ +apiVersion: v2 +appVersion: "1.9.1" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.15.2 +- condition: mariadb.enabled + name: mariadb + repository: https://truecharts.org/ + version: 1.0.68 +- condition: redis.enabled + name: redis + repository: https://truecharts.org + version: 1.0.71 +description: Your self-hosted bookmark archive. Free and open source. +home: https://github.com/truecharts/apps/tree/master/charts/stable/linkace +icon: https://truecharts.org/_static/img/appicons/linkace-icon.png +keywords: +- linkace +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: linkace +sources: +- https://www.linkace.org/docs/ +- https://github.com/linkace/linkace +- https://hub.docker.com/r/linkace/linkace +version: 0.0.1 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/incubator/linkace/0.0.1/README.md b/incubator/linkace/0.0.1/README.md new file mode 100644 index 00000000000..bd572782189 --- /dev/null +++ b/incubator/linkace/0.0.1/README.md @@ -0,0 +1,41 @@ +# Introduction + +Your self-hosted bookmark archive. Free and open source. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | mariadb | 1.0.68 | +| https://truecharts.org | common | 8.15.2 | +| https://truecharts.org | redis | 1.0.71 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/incubator/linkace/0.0.1/app-readme.md b/incubator/linkace/0.0.1/app-readme.md new file mode 100644 index 00000000000..5ff067db3f2 --- /dev/null +++ b/incubator/linkace/0.0.1/app-readme.md @@ -0,0 +1,3 @@ +Your self-hosted bookmark archive. Free and open source. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/incubator/linkace/0.0.1/charts/common-8.15.2.tgz b/incubator/linkace/0.0.1/charts/common-8.15.2.tgz new file mode 100644 index 0000000000000000000000000000000000000000..1b6331143ab4e5e62af32414e709b25ea3bbab83 GIT binary patch literal 41360 zcmV)!K#;#5iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0POvHciT9UFb>b(`V@GW^wV~4bhRuy+ReP{cGBHGlQ=%HlYaM^ zo#Q|xBw_qyMTnEyer=eQf%RnHKahm z6{IjH9RX@dP#&fUMG56lm)(QWu-7}--)~)^^>vy@WZY^4(^#vmFm3Y}tu~O&TrDR^ zclF!9zUp`SqfW2g`?j@!IH3?HDCfY?0^)cKa57E*+W_vQ`K$#%0$G2p0RUi`#|HgE z1yNjLK-U=>EA(0`h09^5zuy_O9%=sN`d`6#iO2&nfZFxn@9htVz2f>m81$aj|6@GQ zK)VgzXDIn}b_z&_LOjJG2-9SWXUiP2wcdIL{yRcbxQr<)e2x&9pg6s5r5Q?AS#q*~ zGc;}iz+s(p7;8Z12*?5;j4?_mz^q^kfE;Bh!8Fa+V=$YCc?YL9e~`7>qE=J5fI_w) zDV!4k&d%jw=>Z*R0e=%Y!r*B?dG z0X&FChm+x8fATUM9!~apjWNiUaSXCF#^JgJ_^&hmV+>BFrzt(l5n&x_acDo|9R0Y2 zd9>}QU*jCjSjFmbH?SKHxrW&Qnmy2~ey7(N^alOj%l=T0_W?x1>0z&bxOcdJh@#Qn z!OO{LdN@58O%Ks@IPFh{2gAu=Fqj4HKW zZ#&YeUiCn0$PLF?mER1@8RbD|*cqtd?H}|}?=T9Zs2`2O-pk2!`f~U(+&c)-a5_BL zA5C5&)a&mJriantaJ1Kdc{rLvI2i2hj|R|B&V{zO8r=j@GEY;w?dYm{)uXE+HymA6 zelx6UX0hMfkM@RpJro^;{b;y1MN$7SnneBn!NKHUgu=;a8txs8`u)90IP6Dz!w3%c zdf~7)fWyQ6{RVAUkM2=?4cA1DYnVoepnQe$ZAaGBtR7odrY*rY9A2wRBZv+O4;iCS zgFHM$2cuCh45v}J7s4n!nD*hz{XsaH42J#a%6iYgn&=-jw<38cpE2Vs6;!cY11=!`{n-{mI^B67>$z!G13q?e~Xh@9^cQ4+qn5 z3d0cfP&kO9>A`5Yf4CP-r-MnfKZL!}VAS&pxKi^?hq^V3(+P~t7$FK^0@4-Aa~vVQ zK@%( zV}e>Owo}W~I7YdKixN1AkzBCqYo`U|hiJ_AZbd9iQNT7$9sd0jjBx}~zA+^L<_y6s zPS*>R&=(+rXptraQIO_*8n$d94F3KP0bgzvNxDFC;GY2i_`XZL<$v0^+#Q24xcOSqyBJPTybV}U;jVqU zWwUliPM3=b${8U?h~OMWAWI`6mVb;xNXDRFLqN-Hmcs}ELUTybY|V@QkmlgEMuxm# zeZZ0EiJ+|yD9jP02<%9XwF_Vpfe&dM<7D@^<>1_t0+lICpbV8XsB{MpjVZ4m5*)qOL@g_aiZ3s@#_1#!%l9LoW26L(y3NXJkxA-7tlmW@n3KN_rV2%mn@F2zuO!=&f4?l_bZ`tcH*lV@0 zBRT|AH4?%V7j7xT`Q7)GELjRXF08;gicv_@9KbkEuL)fTF>$IMMvm7sAj^nkb!{`gm z;gQ>pTFn`+w+4K;Vr_yvJvtWvTH-@d=*&=pgyNy3padY4k_F6cIV5D5grEoK4AMDR z5;l!<6feLE=9pC=ykrLHdK&$gjVh> zWU(Vrtgx}b)?`2h5lE1L%+qBYfe8Xa6Np+s{-viuLbGU@u|XI`iW?SSdbBkK<6T$g?Upa6u4;(#cUT*uxC0E!k_3@Os58bRO= zF$Bl)l2DX?NMoV8Siir=NraPG<-q3?80z7E!zqj~)m%~`;kYz_Um{Oi)jKM)7YhWN zFZ0V@;FSt$W$hBXYK(>Ihzn1?-4-b`DrH!8D1KP-;rDeiXP=x3jIWU89G1+5j9^f{!>omU-3YOLn_)Z=$A=jz1E1H@cNzN%< zL0v*LXEU2hE$$NEG*>(npsss=}PtJ~Q z%NEg<0BD0i>2bYIf6(g=hK0%>(j`T1l?V}v6DSVdgITS|9+!kWrRgI@TF9nBo|9S^`87a3)PO47Io>?35^=Shpgchokq%C~Q5upih2)BKal*twJAxFpVaD}GHaT5uR@-V; z+vrP{64cJpsEw0pnlD6I*2_-}H9irlucz-{zqvd;diO@Hu_;Dz^Z`xHn&WTI`2LNp zgHDo0h>b$4rDj!aF2ru}9n5%rQCsK(Icr@RU943IUUXwhbUX@@!H`$V-_5XK3) z=AA95hRShm>7N=byuM;1AwPa z+n9)ooV^7VE%|CO1-#SJi1N|1t1H_}CO5dRPtVo3kQe%}M5*dYlu{yD7FfVF$Pr27 z6#@x~)AVYY0ZhnJD0Xb43;w2;8iTsb2**W8Dn|O6`w5{VNRzkH68uZ?qqtq2G`t1ERZj<#!e@$zU+=t|Nv_Wbw1=Vb)T$jHOzo0k9D`O*!JaT3DD7XHM#8CB{<}uEQ8rbxaqqc0Lze$FfX7QiL3}z^NvE{3%FN*k0nE7Lbpoys zS7I;bs0f375`B%7{Y|)Y7H%!4;8-tlQ|axa`xBh zGUt<|fS+mDg2fwtBViLniE_T0Ailc<*G%_eyQ{*ffI-ylb8vBd7PQRf^y2u;G;lHn z5d3s;aVA^9M2IeBv*7HBeebgWoNM{JE4rLPI#+dkO?Lx%YR7bD^-J3>*|-R$S`js| z_nXDDC1=z+64c35>UuE>*+%oT8c9AAF9e#Rjd>bJL_w5Z3W^(fVOLQO;Fyo4{=*@` z_%({*`W%I65|J_J_vF_M<(LcE!h6Oc(6|%aVj2M<+ znSqHghGNQB1@W(_>V-4vwOT@Bg^r7iyY=963n{ps<51XlrS2L%?UlRPEE`aw^oJ7`q+jU?y{|UoWiJ`Ba$xj5RooZAy@tGGrb{d z_jlR;N@BsyahhSABoW)mBQQ^|n|H*V+A1S>ROLSSne84wa~sd+A7C6$V0d+rzD;N3 zeex#H)BN*qGz`kgNH+djvPpmwLuuk%3M2>#x>I9;z$}L$nl9sb{Ycnz+?6upBfUR-`|%Bck31;IJr#^1alXOOl%8993&*yS1TSz5b9I98EhEWq z6_|}!kGZb|PD-+@d`u~8cto11`wm{IBOl92N;wYfa2bIUAvDMfCXVnGErsNftB?fRi%y(z7hFYEPnh79U-cR6IbLKj+IgG8XaZxHgec#A z0oc#)<ni(Lg z$Cg_^&g8Lt$EKoW7Nc_t!>bqIjI-L;OBl-+A4F&L8x9v|Kfnc!*UHLjfoQq<8P33z z6~&x!K-+DJTZjxACughS3-;fU-2~>=eDDwN*a_=xgF&-+Dj%g=GgKy{EQZ=>N|c&s zSnEdinyFPD#!ro6DxjN#2_gb9N&k?YW zmH3yAJG-9^=+A7%M$<2*54O+tCMBh{p7GP_~gA+m#j6gcI+F_+XXS@kM8yz;o z(&d7UP$ZY0a@ZhZ>TF@kH(3UEgLRP}oZF02s!3M^rBvBckk68mevU*X_DJ3JkWZiI zG06Osn|08vG==H7q!vmCCdRxsYlYlaU(Lb9XNz%3;05jP@Be67tyU_lvP=_g)fBy( zx+>vRtEIu*4=8O3904$%}}*>i8$ZSV2G5{GF;MB z-!71lg)cBaAT(;DaVN83GA01C46*$wgU^1;rcGPg`^(f6A7y*yj))#t=Kx*fYSzUL zK^b>*-gVGnIHpSqxaW{`saUAiQ4+P6L`ubJacm_=X|uJ6llBA>99lzdt;s*ds4r}? zQU~6@&#j6QC9ddDi;g={jX^TQ$(M?vG$w5ra(8#OfPz2x=I5TbO=?pt2b6o4HDPqm z)Ha6LK1e*s(o3=1umEbmvVc#NoPuZ13X*Z25^AKPEn)Zx%9r|POgkS3d&+LkmV`&NQUn0i20x~vABWu z?G)teP)(c0#KK5jpOL=Td=~+^JD5HLab;SFa*C(i+O3%k;J3JrQBIw+ESLPX|G1Bc zi|S^^XoXNV!ZnKUN9pY*ZxzABW-F`@NH~WvF(pIh-MItZ%azM(qILh8%+Uz2?vD&o4lI6f#E1j;@31KF=KJhrCkoZnrE2@)V@c!d%`M6X1r%Jr8C zH{GHL>{w{*a?%u_lVu#g07>dV;_4`Oui?j>Z0*cbZK?3}Mzm?e5ZkD>P3qFy<{FAi z<2hRLdn^Eb!Gu$27(={xVJ2O=*XZwT;W@h#>!e2&I%Y6<d})hmX>f7pBQS zRRCdby!h+@_}sBB;zK}|leTbHN{Av$y(fswf>pM0?kAm#_<#I%v0gfCD%)f^;oAp^ zmRMYQn!%a858$xHBYs8XU1~?rQVfz7NcWvFF{V6sen8u;*+8BI5F#0*i6uoDvtLgs5904epV>;D1 zs$MX`gNQjws2m%D|Aofj<;#~pVhvmv6;i&55fsUothl!F=@=}tGy$J^aFt~u?=XCp zjEfa4-upk+`w}I56lJi%}0INz=JS7azeV^`(T z8#p2S6y`;)-xZZT2AKtl@RD0E0}&}BFwzVHy2z#k?0h(S*Pg)eip`V07_+NZj0CE^ z>BJN(z-*>jU82u?q)g)9`Kl5PyR3#EN}c0>A@T8h-ufpoVxPejLCTiNOva~>)$QXTz`7(K;i{^BphNqiB*(_JbIxt ziKV$Rgt%j@WA0S#&G~R_u`^d^`DKz7E~vjD`Fdwu9<6VlZW(x~*<6dln0aeX9*8`!uGx0X9-WUBQBHew%D(8=W3ZncLcyG_vT+)IEhfJTSvQUf|_cr z4U?!16N=mF&2CHma9%{*A5G{~|QU$xM8?o}=VrLLkLt%0rD6zVjn-Gj0DR zIQ3r(p?xSH1e(V3#tFHHIpZ+-{1~`=40I!f@TyEdKZ-FVNISkrtqmnK$Kq`l(XcE0 z+1O}h8Dsk=XUY*$6jBlQ?j_P1jH0$gpiNUwgNTN0jzgPqJpN}J3e3B^Evp}TUU6nc zG3|Hyy`JC#8dJf^+8|IaZDG0y)Vu5J>yGo@O&6f9Dyw5F0=go51gQwn)oJP5&Epn$ z27X3hNtQgsevZO)u|P@0eGjZK5hk*StSKC?QxGG#lGhw~yZ}b>Ax@WsK@R6BwmgNH z4C#m{1285jzzLHD{D#MzF?=F?i3rG-3EM(jvGinE&KOe~BL-R{@&b@$IA@K&!wF{7 z+fj$YQL4{{RX?n1%S7~5jN&wnEBC>2&xb=J9UCELuhT zg@XINci2QallfMqAC^3UC4it6%3;iwMw@MdRZui>)UD%LMf^Np`aIP7TEQsNk$-Dj z)*fD;&Q4|X9dJS$G!0~a8Gh3RC)4zWvti z)zM9tdD}#(R%v(JDow5&j_xy^6SBR^62D={irCu%V3pZdgKS-y^^+%V@+EDO4jnIa zPR%q2c0Nj-ut^rQ@8Ze_Hu z!(fW6v_Yv5#lo(gE@#SjS?P+}%mQ>-L zs`ECgMw7(;jBL9tfRmm-d>P@noTq=<{BB8>?DM`b_D5+Op)O)Fwv)lRPSA;SLM@uI>~S2n#OpQAMUXaIDH1N@@mj<_RvZI@ zA2GF(-Z93`v<~iA%kxd;cm*i}=jT5$zOhk#nqlgwP9NYkudCoF7(jZy^WC{tczBiX zAwi>I8zpQ6qhjrjhy_1MdAhv4hgN%y6NUzQQFu zn;n|K6~>RcC?Gl;C9)fUh%+3E+O?B$A-IcDQtj|6W#(-PjX{5~H|Se$eHZ~JW`~M# zD6uuMD6Dp@0?(d3NK^_AI7icQUA~H2M5S;Vuz#2+6<}}F?;Qv_utF}B=pfP23$`Ex zV_C1dL=CpNMqRj>Rk(u-WL6z9b)C8!wVr#jthVpYD`%+NUU{v&^r~)iZl{y!MEOP` zGdfwE&V<>A%yFi}3&iOa-a=8U*OyfLb=s1~v8k#AnrliLwpUHMrBGtk-YTE6hJI;&7cUF7&N(PCGMweN1QovX%>5_99Nz?I3+= zTq-%NLif84E8yL)%Z^*gA$r@biv&?JPsMdCwJ!2>$w+{|PIOKbo}lC!(>d2U&eG`K z)`r5NZf$5hA7UG!f#2ui&_HjsICSlYwJ|(<){@b2i8*=`!GZbR8>W*E0)wRF;$sfVlyE>gn_tGQ~K1(B$KDa}(_?B(-dcEFgIOPBKdcESm zgT2xIU;4vAuQwd+@AdZn(i`*!d&9qg-aYr#`z+ap{V%;cw^i)iALO~Y>3-MZoLh%J z;2Q~fS~-cAD9f?TNk2EarL$B-suIK@J)C50AhttSIg(AHVONLfw7%DiN)QD$cuAvf}`B+?ry$ z*}U@CudQ~w-GUjG+mA7@ufZaT`d@#e;Kf}DcE0f{0H%xuU{3--G{>Pm%zmP)PhqZxqb*G> zALIeIQm*Asv(=SZBeSJ`BN{kbp&ZVT)yRg?-GmYA5=tWbXKfE_lCR&glM8b%=nnmC zfS1!%^`k90jr#kyX1c$lr!4xB$&5UD+TrTB+&Y>WTyci=}6 z=~k^~yRNM>6yz6Aekui)2X2lQ(%`Sum|AFTb9rt<{3ElL^7_}e7VeD; zY*_#OL4U8X{`dEW2T$w&F&@7DKk$`Y2;Qa_g98ENLi{Ru|6gz0O z;jFwICNl({vkEW3b90?${7Nec=B2CLn9`-Kf>il+0Rf2twVG&u{o2x{yWfe(J=O`C z9r36XfKFTv;R9qElt&iDb~_FvgQLXqlHtV~FX0>56$3F!P9HT-YI)&-;60yU0WJVL z5e_MvMLm7RCU*-%SY(X+oXDP&06eeN%Ph6*56C+I6i=D|>v(jJ#s3F`QBnWf-y4md z`2S-(we}yz)LaV?H;{4yIoB87JXRlhzO#+lN0VLPHLgfAg)mWQ4E!dPM&_G4*j7{p z?)z&AB6Y1x24Hk}B~AYaF5+rfnm5{q^A!rHRivXX*?7^cL(&e7Y2i_gr-h|5F6Bss zqWcLGn&xX6a>LrfTkZME3cxxc7e|8Ujel!RP2J>lRNc3pxf%)ZimoMii(mjK4R=*@ zz9H|hVQ`x~bSK>z`z(!)%41$L?ge0$0mr4?I}Fib5sf0oZwsW{1lbb0cJ58D-e9OC zOC!%DJ}C(g_ITvK4pVzy3cv>Wzc)PCFUtQ>ulFSXALF@={MQ6>zY2f`+e8D398xq}v;C~vlm{P>Ai%%}MAxv-7GV;Bodj9%43OQ@mo$!X zGW(cC;TO>DWhfmPkDXc-x=UW{co>i|LKkTPx{|u zJlwc#+y77G-GW-{Kd4gTB=OXn{!QY_hL(SI-@&r`t5*f9zariWo4@>QS^O0opS?d) z5tho9e4#d^v;fjE=1cW~+vRtPY(^m}(@X~7`R;C=_20#OqwT+aJLA8eKDWK5hJRBX zxGl@+WNh@y3-FxA))W+nkd|3Io`Q}}e`SA^{c?^_#;?E*P>R?$tM)gm00cA^or=&G z;Er>Nb~YW$_}VNr$y=?1xDlg*-cy=EGlo85sKb2o5fIAhPiY*XJh0mF4qK5BP)2fqrqtKr2jp}!|i|Hmu!5eHWBE+mUF0YYDvzo^Vaj=N7cqXNmLn!7wFYyd7-*w zr}(2Z1PY^{gOp<&G}muCSBL!W>Zw_wwGBNom-}a+Rj>KD~xs<%8MEd zcexp^wA@*2Feci1QZjSg&B$TP?2TP#|M0LZwp9-OvbnrbR(VbHg^a=911SN5f7sn^ z3K`V^exu;t2CziAUDtrZ`~@&=H4~B*OUc?OA$_adXabvSwE;~HUC3HAwQ28pB6J9T zZOi$9vq|ZL!5C-X$7y&~`JofyC!W|WR(|8zc!G}3<=v1<)Pn%o;?sH9IcN{5w+oM zkL@i;$Ce(Ah{mc=CYRDjmr#ljIjQKE1tF=?w^&8HvXHYsR+CnRYg1~fs(%MMsvV)N zD5w_FebY{fmK?oAT>qEFtgtYZddR3!54n|4bIgBMu#`<=&8gSssn|=Bjpt{7l5J12 z?Mb#Zf?%l1Egz3s95|My0FMf>0WaIp7e|9gyw+yBl{ zm?ja-*Y+h)#!{6bKTcsJv!~NSSo2DgpLI>rISdwu%`(S0MR@|_lZ2vt%7epOr@)oR zjOA(p=m2X)_JDKIQ$~UE#M8yoit}gtdOQ#7-Z4Q4ZQ~@Ua?#=DP*X>H9D3M}!O+Bm zuf>cFvWkWt6!BbT3C}Cz9^QD-TV+Wzyoyopwiq^5wfUf_8qH8E1|Hi2HC44aYO2Nt z)V^QhI5IZ^7ci?QYja($Q%%GMsJUTXe@%H6x>ugdx1xEV%A+t$mkBMDo%-AeeFNoK zJ`1^xKu~b%wX}xd#2o7nzM2@1)#n~r)X`P4w!1k(jqd# zm$U-a-QqzzC!7-fmaxtzFs!1>Qehstr(s!1eT~a&YkwuDw`f*|@--~b)4Xs}C`0qC z>gpxSwM7_LVpTpgau32voque7(4+sY!pDvO(I4~rY%2T@ke`dn7%WR-L zz1(f10dOhgcLvN>;YJ5QDYF!(J|yhR1ii?Yh|UitlB}pfE|57fTP2|3#Q0l z>`GTYUQNauPhP|Tx zzuy}^t^Y@PO7-u9OE9&OgGy8x=vW;MP4sd9B$79jP?wf?A*RrjmpXUle@;M^wO zqpDjG?a|y3b((E{M^tsD=^atGcMlXFQctkkTvIcVsqWQ*{p__RsZ`(mQ|HpeA=XVq zS$Es-T#@9a%YHSqSiJ1Fff!4d{WJ~_bl1;9z0_pgRXR{V!W|rCT!|FQDrCILg-7{SF*u8RG|H`(b)wvc5|bK8zx+g24D#ebV6`Z)BDz zS;LbTwuo;>mlo1%nx_jcBAsg}7EH&!sqMj5Ps_*!ywSEjNF{(J!)o_Ca3XORhZs00NpXQ2>HPx=iR9r1Jm-ZT6aH+6}@b zq3I$3!OFr-Vz65`WKnqyC~LkoOtq`4>J-C&ptccC#emfxUIj&--~n*k^QwlYRpnNf ziMQSDWY^kPy1xf!Bzle8G4+zo{m2KRf57|CisX zHpiucj8>tt<5*!-?Pi)-c-sY#XRM(nG%4-Wjkj@F{?ON0+sa5nvk4M1p2y|z5D-P0{u7!=^ee2eO72Nj@YoY4z-&zm) zcYPY_|5CrW-GRU+|DS_{QBnWz9X#p(kMijAKSxEt5ei{JUFJbQ3Ce2^0_!wlw#;S9 zd;PtI7u=W-I0i%Y^@M%w0;cV zjlyM)>6+===nD^!lrNJb@{yo?40`IPberzAP_i1gEb)Mn)muz92pv_ZXna<+g$YUj z;+rN>xNVt>oWhbH^P=u&QQI-b+&E!qw8=U+MW`;+jywR~+mo_Q2uo2rqWVQRK6x-AQ>tC9S_C;9&vkCy-MGn9NfI|X5m7};PL6KQ54 zTKbES-&;ukl2NGr2rK!vml3oBMBN!++g|MVcQ2uK&+iUK>AHeoBO7Fv3!^Akq&5)U z8loKfjUxDI%lA8b8u5Q2s2`61?-lodyP&{n*U34_D+tbC`U<%lNp#{YLuJZ z!X^;lgr?R3iZGjRak}HTxIc!3*jm>Ug3y!5VGC_hz|amSw}9Yo+zRlTIIuXv%W+PS zn*F;pLSr!4A2A_7(L&0$Hn>7-t*;96X6932pR9U+w5N*yt5A1$HvTo>|D$0^|KIOF z`Tsx4qxruMqE{|TnJ2`D_VIQ=DQT`FFgPMBo%Qk3_$HQ9&83Ds25)mr86P$F(od4Yp z`9CB^C<8c|;sn$6W~A@gNb`WtX8x}`b?eI@8~A_kV83ktIe5DN@hDG~|Cb$C_c5Kn zOo-iT*RN9GUccj)?!tq3efh-P1N(fLv8na=+DaL(TK_5vGuQuQtkZ|m|AxbUY5%|f zl>hrt9*@vU3kqIovOVSy-@)wm_q5uoLC0phmBm)It5ILW zMLY(-iW42aaaS7PoYL$v=3al789z;Y**omXkFz`r-H+l6*LCgtAX6M8(aA1dWL^E8 zH|)PXRvg_py~0W#3S*2Co$+Ux$73g(Pw}con8OUorC+*XQQh8*n7a=DOedFmmO6#2 z4HQxwy6}0PLGCbCxZn_{A&loKq55s{+6!Qf`PyO6W_9HQE2WHSW0o-(pj5 z$+1YK($+1OsMirBgO70@n zFkQ!y@~0fZ=zS8e$2?Qrojr3J_~O*g?;pqh@$dd@mj8NEAIkpIKiE4c*?*qm|2@uA zW&g2LK0T)W$7FxnV*BW~|JXa)`?vr2)SL&l|Cq7a`o^E$mRH~PGesKp*`%y0byR|J zI%-~Tec7*QnYjC{Ki!YjLtXVNNcsoA@OSIo>t_CcN9Ugg_W!*>Y5&*jKi&U$l&9AJ zM-cBlIsSMTU7H`iNdw;=PBNNxS%<+f6Je$OH2>3zRN84WHk~gX>XC#>_5L*1>SNUuv_foy$t@yGx(#z==X0k z`qfmL=3vK%o?^R8f^xpxck9b#kdW&%kHpBJWc5RyE`+aw(Bov1P_Q{OXTc_`c)W#t z*&o94da(U;j6tJA<}gQ5M;BDXD3B3ft1pTcY#z=uX-i4T|AHwys%8^^2Ua%5E0iEY z&hm7^8**MWb$MuSXyw5iDjMm34;%lZH|h^c{(n#Le;?<0fcPK9y<_{KvV%Ui*-cZ= z?&npW-Ji}*FONQ6{4^F3)eB;!3CnH9Zhr-n(GVr!@59ZhZvAV!^c^jL8`uA+eE;{! z|L1X@D*NBhYVPmF0w`HVJ>Rg7LHyP|gVP=Dd)j1Ia*r%v;@J9jAHc$A^||q#u6v#T zhU@=M7NAY`pV3}X{_`tgPwW2?9xeaP;<~E^$h&%s4M>0XS%LJ&4R)YHxh9sNLX~Z7 zLHnb_f;C9IxwAdUY)a1GoE?2Qx_JM=u^9Yk@MJP7n~eUDHlx3tynTEA^U1~WPtFW; zH^55s$&i~*T)WYO*iwcKZ7D;)Ev4Ma%Qyf3sJf7<^&%2S*F6&A9;!dN-szk}Jm=6+R4CJNyLB+H#H<5=Yf*=&Pu7wngm9>2#|&@`il63fw&=(G`PHYJt5r zWoZ_J9R+UJF=AH9kY*yJn*XCO6y*twPZEmqDGU*LF#F%I#lxHjc|3;Do z&@@pk1eOFRGm$U+_~`8$@Z-mm&FsHSbH*dQa8`?X^A^v>U*42z3%0Y&`N9M~4i#J- zl1`Z5PMCz#4o!hl}AaZN|uoX~_9YolRDybQSDw z48G-Gc~8E6{r0!e1gqD-$~1QO3n2CDzuy}cwU!}d%pv%&mNVs&S!sZpz&DM z9k}QOHKKaqnB}>QOMPy#wO7q$afAx^lt#+^UNd4I6v_kVDb%2a;;ffiQyC1|P!{3w zls=vSA8zVOnfXT#ue^u6k_21;y1VPlDJJI>PGaxcvu)oxE2XL+FES}OizvFz*`Sb2 z3hhAlGXU;IYiHdYv#yv8K?NvddBb1Y->^PaLD?gqtQkxEwU@baH=sENmk;$*D*4bjo4+_hn|4|Dfqg=t(=&0uj_7Ty_IY&jW=X7jM9n}Wq1M!&lK z%7Ndax$>A7IIU;;ciG#8^Fp)IP2=UK*fK0V7Hn4P7Ew)u#MjtvslUa|g2yMx%LYvy z$q2=ULaI&`CJ5}rael%ZaDNZN}EZ0|JeX!HY zU84y*m*Xh@zAy-irXUKuo{IE6p_YE3NS+WqfRmtg8ICqbYlEawu1fd8STA z`Iz&FvR=ZsXbXCK%SW&liJc!iQ^?7ZBJ1W-BJ zixq7Fr3SiG7x0ws<*EQA%f$rcqPj_rTIz?R*%UB3-P}Gggtf7$;*eD>!R@T*f83|q z{+F%7`w0HhB>#7>5dW{gKN>#ee|VH+2K#D zurc+vx(Z8O5f-Sl)w#YPj$6p{Y!z;2s=Oc5o`jO56zrg1{3U~SuZ8h!5wFOJ6WF6G)!Z6Dt1Be)5XQvxi*;A+e_83i-bjlgmc8kX-;WI zd=|#ds>!Vkr8{XZG*v}z!EwAK6y+yp!7kVl;i}ZfT`5OJ&U{_4JRPC>B+Bcbj$ADi zy1B8#K`3LNgPQUxI^~PlLWNV8EX7|VtE6k~wmy^(F}$svoCO<7zD;5DJ&a)zqP!lj zBH3CM)i}8C9OQk)>rBzAvlls>PH|}NSeXHGK6yvVQ@O598^?356@GxpOdSVReH~Y= z+bU?4B;IzXYSUy?b%P+nc-zrbok(sBnq%f)<~uM#T@O$&gfX6z%SJ zMqC0pIosBYw$$xxIf*fupQe;;Bi2Vz#Q32iiK?&8=+=X%YaC}kzy*%iHvPKq-18n! z@%oXIHLya){4P%4reWg}xNy?Iq~{CEfbYn3r@!o#oyCt^#~nLt$2P`_{BEwHwqsse zvhBHj0nuqq3qtoJ4~)YYq+5uK$ABM9SA0CL{CaVGW*v*G_hWEzeAe>Wu1yKkc@MJ1 z10XL1rwvoV=rx}4+2Km1BP34Kh}*@PSQYjmAzL|eiTt>`t2?P)SzS=CESc}OHux5V za1=;Tr99oO`pg92uH;fN3Tc{;eY{P4s#qoNXUR>fJ?X2siakTs8l!IQZM_0nb=t5& z6R1>w-z1SZVZUz$xHL3mIUz`05rmp$>f6mY^U89iG+4Z5OKwxgZ$#5Ro@1EFVb4DF zsa`|=quD?8snACI&!yO+-Ng#D>Hgnd$^ZM{U~l+j|9Omu+kZYFy37-qY=>_-`GOKQ z9~r~nwfi)->?otmX)2f>x0ERa+3+ee)c*$GkpB(-PoUiq7{9J|Sj`b(j7>N> zZW=SU!-X+(ou*lhKuy-JR$>HA6b4k{@JbHhHUr315mnzYz-gFQXiW-;{|cr!C$!pk z+5&hlw()<5r_BG=T~*TMtRLPX@t=G)@c-e#!Ju^id;jVF&!ap(4z4f$i}??X$=eF% zAijZem<~xamXdaJ&-X*>%+HT^N#aIbrxCXQ2z@DCBHH0xtoT;)F$)U!+GD)@IooVq z;w&(Il${$6_pE-)O(mLjrkOpUw17ZFR_A(#gyp~PYz4;0haF2CBW@=yS06A5COE{%e2jzZOMfz zPvck`fO42bM{zcXr^^M{w;gR15(Sg4W6jl`_hOtKHyzg=Rrsd7$Hg!@-dzug4e9NJycoT+$Gxeo&q;R&&BO_tvY^6uE;W`ucC{T-02w5I@0;B>uI#z=ms1? z(FxO=()FuduV0mPe<|(R7+Jy<#Id+x&P0sNqHR)ID$M>j`G)*&5`duHZgWYyb@2J; z&V{e`%?&8u6|;|1wh~LiH^BAHp)t{7hsLB6N(tg02!1vl{td0gK>P}5dQNkk%uIZF zN3bx6S7==aF~=)NQB#mNj}e{v>3Qg9gZ#gb@IM>lfA{xCrTouN`9B}$QRhE7Mk@pu zJMB)P-10I4z*8JTiU1}uXw@=DQT5?Zfk#^ouMK3G$Ln{8vChSk(ANlM$7!~b#{0i*ZyD7OF`h*}=^Tu- z+-VTZ9bBO`NS$e@A9zb9{O*Pl1QvFT%(U$H2_rM2n?_0qt?h@(5_Z44vAX5ZY_XK} z5(PK`_{*{RN@~Z=P`uAWU%zzy+D(8yyB)BjU2==V*Rh7pQbTq(t{c0T(>z`1X!2aG ztL@o_9zB;RapJf=;%1XmKQ_8Kr~RUjeZ#u8i*yNNy($&W@#-CWB+EQa7LtpIt-TuN z_M{yCo*%#dH-}6Cv`l9Y>HpIk4NCF9NByVxuaENZ981UIo|b*VLqzZgFw9dc*kfhl z7mHG^)BGwItR(&UktID~+oBU^r6A-)r!7X4{ z*iM^{!Is_s4cKJe`gdYm-GKpY^#2?5O8$Snr~HqP@`xO3ahzU*zbz+7+Q?+ar&QQM zBb0P1m%cXu+LZxiyQe9C+|IFG$!fQw+E**p0#vxSSWtX{<--WGEKjo>Gv&qD{kXeb zF?#J*y|Tl)nNEr8v4LbcIGJ@ALlTjsUHdjcixtX`(?!PP@BLT5(|;LwtZ^GhwBv?y zkQhu5g-(;+t)^i3a}-|b!5~z$x880zOt8;(;jFh=mz*ehyY(X|efRUFFLdgYhI#v^ zj{nPh4R^KxZsPyFvi)y=@D%^&Q65|WllPUkQ~lH#2U~n9{t2g_niRhLy9|w4d2Hgj zPh+#0&M^bhIm$A{-}xy|R=DxJvSN3Zt5k*7D8pI61kO;@p2(zv>MZEo1SKo8*>iRO z=nf-W8iuwPzYR%~O@4MyU7QdKlMuN*v)#;|xa*(wspJ2GbRInZ%kbc!sQ-`l4xao! z9_8VD>dlu7${fr5Dn~jM;aeCPRI(?Vu~@DGBL2~-?L|?%rDC~yd@4jua(p^Gpk9F; zeM8vuS#2A{C&!m#xANYI*_Ckd!1s+Q6$o3V*++2Yd*!VPtRFdoXmKF*4<9)WD0U20R#}4!761XzGm5LN-PW5gx-HA)< zs(P_rWqS_ViEzm&QtOt$9P_^APpju%UXpWEgTieviHW~VsR6f=iObHt)?FA)Zf?D8;q24a`yMxdmH+)lrM%$iIzdnxib{{`LP6 zfZ#INp1-JG71_E}S&zanT_%*V1ja$?dqSK#r-jvPnQh&I9T61FnLS0TB_lz}g>bhD zYT^c!ERn7bkfiTZGz3&>FmZ0krWwlPH3%Ui3PmJJW~K?v(>O*s4*;`?Ky>Mgb>=ao zSotVrIq5eap)5|<3w;z@Fa^CXeZFzS2vq}yXptraRlwz6&(YRk3566*moW$IgM2Ov z_+YnduGLZi!3xGW0>w6Wz9G9o6-GX;Tq&U0yas|M{{sXa{$G9nB>>Z3qGXfE`z1=u zDm7f7!?-}BgHP0e9uLX#X}3JT zyWfF#D4&US5T_xGr3jRc5^C!pqdkgmlJgSqUDr4w6zE*tuj~M;siP%LXDC5ATX|VZ z=qyL%ml$M_kn1#$2){p$P=um7*b&N55}_o-{AP**)4|CYyTbW_4bA(`|tjf|L3DTT)Vl`^7hNURVfCmr6fvF z&Q3-`Gzn@V>3UaNYe`Viz7F zuD8gxBMqC7Zgoq|hThco6S5zlx^|n+39O)R7o!amRHXLem#S%b7~1#3-*z6Ft^{vm zwM@mc3Y=!;Sc@n|hNqY$0A`$d!U~a0M2@gn$S5z5>5V6~IYo<#L?^tBvIWqI{Sae9 zxp`?vB|)>Ua_zd&2l#z;iWZ&3No-~t=gQx2%9rnL7AJct>Wj`4&sW_sjL-^i9=;8O zWC7VQKBDCBe1r_ic*LibtVRR#-1ao`(#}+2b9t02ss>e5?bk%S-yL?+oTja1sR!E) zKBI=h(`GG`60jOciW=z6SQK4kJl0yV$%-zx@`Tr}!@-L)AJa-nQD{snzh&HY(1}VS zD5*`wPmebB4MdXwvr!ZC!o0;?J6QmV=sM!6G|L-Albm3mdgipyU}~L-l@54jI#pyU zTUg;_b}M0J1OI&sD%HaVY?vWbV#8|GG@v>bEDJlcsILYUSDq~FWxeHZ+pIl>bF+0< zZtK3-Z3X1}W3{pYADgXc`xY$LYGix%suoItwK}gKd}{BFotEL<3oDgiJ#4hx;C3w3 zKyJ=H-|%tdmrikvW+(zYs2Qefwo^b~D7c=Z#MWoAJUX^Gt8-W?Y9EW*9Sd;jbj_pZ zR`Z)8WFFI1f)0vq)D3FGI8Lw66o@w@gfU+ZC0G`%^ARI(g#cM*S&SAap)me2PnQ`1 zGzI+ZYAzzXsC$~O2;v#qWrgu8z{CaEA01l#=EOB~OPH?_TK!n{ZI&&|-xSu_lCo*b z+bE$ZXVYx;KsJXHZx1SFI!mMT!eo0!#ow`4w}n!m-lHsIZ+N0S)~T7E3J;L&2-y_$ zjlP;X(C>jk4-Cq|@NbVIzcl^h*~d*QO%?M|fW&V&1pVGYC2nE5nBYWsh6w90jN=O0 zR$||#X0pr-#f51SLh6#ZGwIgwS(w(W*)nZ_pp0B#{9d$@0 zhnFc>@p)AGl6bEEp=k&%X}W+EhcJ%Uyp`jlv&+*r7nk3koW8z1fAitf$?==AxITv2 zQ51OuZnz{gT~vPNysz?Wv`*jxhn3$|)35V1t82UByK21RvuWL5phlx}F22Dis_5~n zTL37=SZxF$VjZaHcta#y5LH;{A+PGbLl3VS*W04KLSJ1XsBO{PMZG?Ayiy^@MSPV4 zuPbuUA}f^H8LTiP<-}Sd?yFA0X)2BmcP|Hb>~fFP(O|#UR)^e zw#S^n#)y{W#0K2NSZzSe6Ii_whBr^QJ^!s9zyGK9d+1)WjX-8Nz-_!iH~4?=?G^L? z5Bj72Q~sYvd1~|j(>Vf@c!|UvjcJ_Y1?J z{&Xc~?RC8!@y4-LNGPRCZ`O9d&?RYc5V%)gYx(-M)t2F{3q#xj059N7-v5_9hjE4z zbi&?ua+IY6(==a$uV2R%g(%cnrJX5}Sr?Yc5&1|^J_bGh!W>A9#Wsq+tvYD1%h(#7 zNf3zJAR*#<#(f|D+p2kLh_ z)PJIIo`P?W9D7Qb<~a%}n{k`Bb~@kw=gmzy?+1(`_IZ`5#v8Y+4+wvCVvKE;v% z#gboTiGV8?iN<{F&Tf^h)8&(u6Xmp7OtI^<>KpZzla7mjCd-NYQNAz$N+mqlKPk6W z&qn=E-T_DX?e78A>wkUz&DH;UdxNL@KacX8>|r{Ui^nf_=5yQ3IL;qH<2 zk~1kgCgDn(ZklmE)|$h4oYaIjH#G{zrX9M77hyyO`a*Mfl+Oqk4_YdS7rYkx+pGHU zLhhN^E&Ft*9yvIf?)>(M=^vE36hx^c8bTwSIG^~NioO*cYO3|*Ep*UQD>0s;a2+Z; zn*Mor$doCmiP*y}5Fu=dX_;$%d}qFmt=ZWgxV1bz;H{PIGqIs$HFgw{vmZ}h%N5A2 z+RnVyY$BcTa0c9uAKrgFyS!hJ_W{kvB#P$n9Kq;)60bj`DP<}qSrdvD4hJb!VOzJ; zG+|XhNwGX1U4D3T^!oDs>D&Lg{P6z$h1-vyANXDCWESw9vWrfsiPKLfuTPFHKb@SP zeE;^%aJI4t&ZL7Ej~(CR>E3aca?$di}OOWSb=%&nSm|a z=70T=r;BD7u##q@dt-<9mpR-1hSnd@)Kue)M!z?8tz1{8M-B{Ogedk=J}Q}1Rb7U< zx2kJSP_R@@oJB@)Z; z)-gcIPqM%2m+f-vkdsr~L)irgg)t~gSQ(BbI1};0NQOc@UGoOJ0tDM%qhy8iG+D3_ zQErmHT&wy=g?^B%JR8z0wyZ?14rc?Xy@Z}$6+Y-i_1N+7-S|2(hLc}a z=bW(|X5B!s&5j0`q+p*-(rTqjYp+8(PbbKawf2JSe%Asb)QC7)y2zL4^ynO%A0NGa z15`wu2yk!iWSWXjvXW(sJ>vl_;5fyYkLrvk;88ERTWCqi{8b;q@S?W!kO8E9FwLuq z!vp_G!}Hr8F+7&3a-;nZCn?3#^#kVr=pFR;iuS+WQ~dYGd47NAzmniwi=lk^o1awD ze2KO@{v&G=(ipU_!IY@Jbr$f;<&vQM@*2``j>xP1!EkVR2>$Q?1@+}ssCM#dzdr!M z-Py#(^`E8DT_b>Pvj6uFit+yr`g>3QACK|~`+w_V&ch>#Wr^8Zt+D^JW!&HZAWI`V z{+F|v(^h(sf}6|7;=5Y2W%+JJIYe!Zs^*Jl+o`ZmdTv(n=9*h?t1g1L&Ez=c0Aomq zO1@Bf+1#v3!a0hTG0GJz=S6ck^OVq2k(!5vyM+lc=3xE9kpNB+ zcdJp+3k%M1yd)ImKj56upD~^PBuW-`5)~E7N}C(iJ4$3?xlSq)ZhF3Oiexf3_kAS@ z=1fFLB*a_qp-#CiJ{t1J-46l$81u5$i!u27Kkl(9yZcOFi(lI}V*M$cD$dni#6+eE zG&|zr=LY8%vmA!#4CR>fiZqFMC9A}br2-Z7&)Ba%Hr3mSy1iG)VXlJp)WOh7SJS%H z@l`Rcgu>RN3S@jjPK0LYUG!3GGy`F8pq`h%I(M=h1EIR#cqNnfUZFLqY35h3OzNi~Q4j%SucM-hBQnvwYn%S@< zx@x3O!9}P-YPg;&QN*_=uu3*~3slpIbZB%YxO4wASbM%xhq;+Z@8|8O(+8&6a&2gH zE}EO=TcdxPb{g*;j$#anPy(%=ci(d*X@qo=zOP?f_V2qxhf}_p=4)5|eRrrd&C)oX zta(uk7e3^dKx?p?0-4EV-A1~_W%CDu$2FM zzyFl~?@=CZ|3BmL2eiRY<+*YUehtih{M^!tE2blv#BO*O|Mk~G?lFD$!A%+FitS9s zVUQ6NYD6+G=}6;JVF5$r0g!>HKhr8vJx|aTahN$nyJh--nB1US6E*%eP~2aeP+tKQLbz;$?)&;WMg%I^we+NUQ$d zwEj2qe}1xmCjqeO{_p5uP~`uk;nVr=qdbED^En3ME(J~#5T`R7Hskuz@k8IY&2qee z`C8@0miy%*voCEULX0cne1&~!w?%UnMQf`ztH8CW_peu?Q z+;)U}iTo-~j~ewTP-$@rc(Onx>kG zdOAh8pQoYxzmoxIgZv-v7yWm_IAscR+HknQpq@Q9|#o` z(W<|}QA>o;E@Xdd7jfO9dq|<|V}-Q^0<_5J`Zdno z^`+iA;TK&^&jz(X5nh%oh2}6%g9}8-z@t6aw?Oc}&|AE~#Zx_RBf9Ya$KJbkw{2q$ zqw`t60u9tDC^8$diXO-)0{PK5DGs$)mogV?B9Ug=p~jzBj1vLzuNb1S@W!~8zoy_k}!YI`01=(k!T-4KFYZnAikU#%dsJz zW@1;3cW%r|ZE*cn_LgWJy(nvt8@XzIR3vHscqetb)ootQ8UT*Yj)B@wi9AOrF&G`( zW;T}E$c;Q$Xo^N^DrJ#xkXM8O2sSXnA*iA7RGeNnXcmWg?jGHV_a2`{{of4kKlx=1 zQw+oTW&Ep%i)(KQ?9uw)`kd4VEZ5*ob7C;)!34kIgpl|QY`oq*j>9t`lMs7r#9#;+JNrzC@rxA5CCT5GerlHB0$> zIKP6FsuObkV@e1s|18PTil>1=ad566eFdHZX=5499R7Ze!ay&LJ~#sJzHPjC~K?RcdiT)PJ6i+e64Qt?WMv3<|Sa11UHXtD%d;|m(@Fo=0 zqYsFLRFQv3;BOh~{oZ)Zk%E-Z=T**-o*FDdLd;pzelXXHN#vjmu5l;^9R_5bM2MksUwa>?^#WR3c?E>Nab{FhY{}s_oE#NT2fX*9rc}RFbXhm57M3d4m8!Or zwWa#D;!>aD-8Id1tFoBk2qep2FijB*w_xxZG}3MSnKS=C{s4oOJU);U`o|yt7YGTU z5kd(V0{$gN{ibsLmy1_~U8RVknEl6a*-!V=ivM?X0Pgeu`J?LnZ$oeVIsfCMd_FDz zUr8`@b^%s|!-3M_V>$vK!v}bn`!8932@U97O+i|(fD;d@`oj>aku)g+jeYxx3kmmP~7eA z!#{zRy{^QaJn?ZHiHAV6`4TIG-n>*EZ@>=lrx_-WL0LzyS`)Cu1eI^K7NAC67-*C@QL2v-{vd8>@oYo`K2&g&Wg*% z`)MKQ^QlV!4AqiKdNqPn@W8-H@=2@+J zi>iz$AD1EJ_gyz$YFf)Sc|dr%VrRfB@#)Guu3#Fz*F16nA9fyP5BwFKnsWFwn$>)7 zQL0mG27jfw+%bFaF>(2v@y*@`eYsmc$PD(&w=JUIfKFT!eVPejhj9(Z0B9r%=`<&? zUfMvFZcnrXx^Cv^#4qMxAeJz43$zUasAp zvu)X>OwOz&?n>L;S(k=ajpC7E&wDPYWi02}&g+D2jX^uAHqBLTm?X}9Hb-fU7@`g) zC;3ZfGTX8k;97T$wYi#a7_U!C6(e=4fGW+=bm6n5<5>G6N_>;^Gc{@ro{Jh}U8wwD zoZXfOL|+iqQjR^|ZY)W)KW8@d|)7$5Az8PmiE!7_#v36b)lb@6$6rw*9xu{ui;C?`ix0?ST4! z6R#5g?M=p$$!GijV|)&?|4rV&RtO|1H-=>JE>NtbwgJ@g5&!kUQ*|e|_{cqkfHDlWE6q&B*{x5%zJQgOc{dV(T;VH6wNE!Dwm}5mf{1GeknuTGt`u0DRnr~AR2$nzA1qV3-#vUG|I_a`co+nfn~U=o&jIEY#VUc)=}w(um0Xp_fp^W(hR0DR7duPRIEo(D~g7;_4rff=dv z*Ac~k%4e7SXGyeCcfY=u2Cz^6pSaU%{EzQ{*8e}sr3zOXG zy{2%9&YHA=VnIn`xKIeh&&{fU_~~F{yWT~GA#(CcmtRU^Dkm{4iS!eFge+wS&QMQ`Rz|AfO6OVe}HL>fz5k8l1pzC@ z5_)!W5|V&AbIfA6#!f)iC;45u^khXI28^6!f@d=rhXd8ifcG*mTAI%HPlG9a{(Q8L z;{VPHMQbbqJs!W0{r=yo|7SS)eE$1!K2N|EWDKRT@UF@g03KE-2J;L@A?Hd74DQ7V zM(+s_nS$!(ZwlxNMG@e(os9Xx@$wj?D1r=ckSHo|{0`%=_XNa9-Qo2#NznqoMWHNg z^}miBAZ`jHv3QfC1QL{j2*=3jInQo>xnU$ly(i#8ELrg8;s%5`r9Eef*@^g9qTh4o z|4vWDzxs#O@`V4RztT;7QUIF6;66))?4!Le9r}>;zI5jBzW1fW*8Fdh;$`p4|F8E1 zyn(66hr4|Coc5d~CBLG8^&A``cp{spiN&mAAR2cALa7|T&!TcL=jp3bDn

-GK#MQp-XO4}NoI^NhB_P_q; z3H-YEjve2zy)RX2F$m>}vCL79KuqGn8vaUB@bsrA-sxm^5IUIB4AB$b{^+P@ zquI03>~*Hut6+s?={BCD zmTPDv){yAvTLc;J2ZkYlF;EvF0~`~E7h5jYf|VNBQOkiHSqFCHjGG5`AEjQ}W-$B1` zqyMl@n&=-^==U4x*K1r{IR@@ty}5jLdH&0r%bUw@UOfNh+4DD-7te3bK%bkp{X3~j z#sqwK^_pA5kW##ixi!s4#A~_LJUhD{*+kT+vxpj1MAXO-QQlxU>a+`{r|ovZ^mNxQ zu!yKpXAw23h^UbvqP)Q{-}&F-x18dDq$vs*SYyiIy|_VAM6kgq5)l|#vP@x!1SbTA z%fU*IMMR7`iwM6WB1VRYDA8kZZjCf2Kodg~6yOC81SJ>y2=Q$!+3(Df{R&I=4VLT; zhQn@)aneofgP-6!R4$_CV5mS#Des>m7ziPORq&3ktnW2t}om?p*%yjs#e@4u#*-LSIhhUHCH8$%iK6>a%~&k`VV-UcvT=I%g6bjyX~+855ywpoUqH_NcH zS%&4!GORFwkObKp#Y~30k(9wm-A1~GiO>(k9SE3#1f~>;BVfM9WE(Lc6YsDI(gQN_ zhC2qtvXh3Lcam2d5Vv_ijGc6Q`(MZ4=Jwg;D=`F@SKq=l<_n{=4qEOh*R_)E*~s=f zlkGZ_64_pz>_${vXVQ#{>l~)mH=$D2P+ezYqT+Vq-;>jJj+@D;-ErgElv%g4GV4~9 zS+}IjcBOebZAbHTx`SqmGV69$X5ET1>z0(+gK2K?Er_3v)EKm5zmut*{kk^g*6pm^ zx)r(YmXup}R$;#j{1!xHDXcCTUc*V8v?Ot|i$sf9bvuhyw<1>El2~=SISnSGmNbuc z(QJ{bZfB|LR)mOKlBylug_BV`N6BPlca*p`3F3B@ATwt;tUZZ90~rQ^GK9rDTic^L^lIu;hQx1Z^~T6xuUqIIhq`o6p$r;bujpul_Ydo730{)=$c#bOLIX1_$ zn?f*dsRWJfN)SiTMsr7nVCD?{3e6*f=8j&E@ub}v8c%ldie?3XKj=*JutKwM(tO(B zfYGIE!nv#v%$cXGCM)S}cc?O+SPxY=ayEK9Y6CN8=vC+)Hqv|O9M|-Am5x;(s< zoKqV)hmBc<9EKS*PD#Wjw6_w62RXVrI zrdhgGfy@w4B&uYhLc3k2Bum5u8h3}X6yn%QkWF9nI_qm*MPKtKjRe^zkI&lZwB4o~ zo$lInHYMsn&9{ljiW23SN|Zgks6ynlo!fdewYsf2Mm8clX-)Z7tS-+{Cqmn)hok8Z z_0Tg_rPA*PV&fWOYqCKAMp1D#4)VgoA|Utn;^JCj+tLLv5-xx*)ny&c@L`HTISO~v z`w|2Zf^n9}t2?mRxUxWzyv`OR+(3n3j#=+ZFwfSBqPO=YND)i%a*0y)6G&ygr*#S@ z?QHzfWMW!86<{p`w?-mx%L=TWUO5{1JAkz`;77yhE?_M&8@DWh#vDu#q-Dv`p) z){Kr#wd<_eRTR5f6^-)bv}Zpbo+Uma_pl7QO#$tsfASYAs;8-Wx(8^U-8q_tK%2(d zS>db*^g`YA2ENt%^B7##LZD4K>#UnqRI{-`;IMk`0iy@Fr7FS_a!nepWjI=jf)sJm z$pQo@Wdo|p#*tVLiX4h|ht8v+_0V}{ISHF}JqVjQ6}Q*O9Ez%GAw#B>HlYo`2*>xx zYW~@rR^5G8Wqf@TU#rKWyf*#Qc7b;OsWs4UW;wH(bv?40RYl9Nkw7&eilJ8vaDXLW zg)-$Hg*q-Y+A8YXY1;lSN32!p=t_OXBjuUYTb(o2>1`M7;GbHf9cGrJs#({Qs?+N9 zx{U90Q8d4GxSltriNJC-1cD;WPWdY>u$+XAo2hio%HK{uQv(y@y|B3=e)v&bO z+4ew-iAA59bk(OOWqoQ=)~BjV1IJ2hN>VcCHeCd_VgwjoBa+Dj`3D5=Q3~jmGPJhD z?@lbr(4?y}G$|`XlaexIKOU+`pK(j+Gqy^fiA8&wbk&|FW$kHF(w;nPhF*ohQ9E_k zA6eDeiA8&wbk&|FWezqNr@91<6y8`ZLjF# ztq5*yX3N-OQjfcu)Z?;AJuaElUOhlXczr>Z08tar*}}C9xAR+?lD;q{ZR@28?{;M-FH#uiaJ?kY;hWl=gV ziBfx5YGq>GmaD|wu}X%scHD3{tNCtaWQ43WDV!&=t;|MMIej=@+J?AU%8$EB`Egmw zk4sYCI8Dv9cuEBOlpdcoTF+4m5<=NBMfA4_q=c~iN_HC!&4PT~RgjO%f_z*Ob5Dr3A%c7A*Y{z+kSsl9vE{V*fv2_4M$7v zXHO8fy=1LBY{aTMu^-OZJaFs3AtE>a@}bU10J77Zs> z!_~J%MfshhqWnr!ly62wxr3qAI#(4ZPYRXfOcaiAb%9#|Ax~*Rh>MD&;MK zykTW@d}DMPV*amWiNV41Ai@bnAb}|Z!(#wLn256p&VYpN&c6h@l$#g}Z`y9ZdD9&+ zOkT@_0#6RI#!Nw%PT zX@XNb2W12VD;$MDc5Nl5Sz-4(#!iVhs~gX2CPwLIT%hIGjOa}zn2AWgtn(28Rf!def5l zV6`S8SU@a~(_qF(g3>jnR7ig@661CjjW@PhG`=N(%kLV%$dr>^ErN`g1d;D!h zw>sC{s+8RF9aCkq=j~MFW=sFMXAi})RoLoWV5?GJ%XdswO=ROYqhV8vI%`E0rN}=F z4VymDT^%T+F+2ZG`bpkb?1)VWMirApDTJSih98qJf^ zxo}XWZqTqiDRwlPC#8G2p6Y10hoIrvDn4{B_)w|$P#z6iEV{LfPuJ0K9j{zcr92!q zJY1Vy=XSR1+=^Z28g`vKlL5XKRGRmT+u5jbD@KiL7&UuPX`UXpv&!w3Rc_Z%xp!mI ztn#|uR9@wm@XDHtTj;$Ums2Y)&5EnrRdIF8imO{Ft{jbt6^&-a)$OXdR_b55h2pv! zjb?SSbMY&;Iw_OG&}i0!I@e~ZlxA`ZJ&2=WvnFiykvf(~%Gc?rjEjF5E;c^WosE>y z7#@a3v!v-M$@ulG_5E`mhzFTC8K&Eq z!M9k=UaM%onJw6FYEiYPT~%%VVnuN%=?(P&7s2I35qRmqUS)IRItxC~-+g~^4c0hK z)zpq#CC|*pr`6L^#ahEGiEzM|j^;%ALSd1LSJCKf!)H@Vx@#rn;VbDRZgr8qU%ZR~)s^P9oCsvBc<;ujgGcaryVNESo-?XdMH>m+` zAd%l(hBK{Ld_}clbD3Tv%F--gvgn0a?Bebl&MS=o*BlOvL>X#^#?GSL#%TB^Oa7Wt{drefa*A4j>z>hzggG!^8=1SI}c-t8%QcY^Jt|*z6Li~B)x!$ z2=@$ENs6c7JV~VCpuR7N&Z_lR0b603_wfL!xQ|*0$`pwdi#5bCLowvt z1%xs%N9+NiSZYBMyzm`yMM;TZmTmzIRv2wKic10`j^iA0mh|lUzZ}lVz_q;IiL)-+ z>-{U6qclbg(KB%O^;e$bO&oXN-ifBq3|`*ry#v=MArv!`ZoxYsLg(IrHz?)0Ie6E5 zH!wc$O8@b{1jNfcIZehjfhXW;hx%Nua< z{rUARxV!kYt_ z$e07c3I+EVW;jH&V9W(Kc1XHBS;IJk(aHZS-nij!{A1{TC*C=6 zy}=I&iU)l9PmaI>r<6Ip0k}a(konV(_#WFJAN2;{qCn{xrU6OAqID>LaF)vx_J&^F ze*fbwOZiK@O8~)7LQJ#~C^33C308zqbkrLR2EFqr0@rxCVw5X*DBYkC48U!9X{%7( zznC0S{C|a_^*|Z&k1hmu@_)~Dr|z`E|9#&be&+ul8B4aG-@C;j;I*)h%&WL`pt4-B0LOwesO$U{Qxq&y>}^hg@TkwXg(S$XNuRdK>+4K@P?7*o(3(2nISf|K)+b$&EXr>& zqrweykG75!Gewz(0LEZ0&m|n7u;%uhfhT9>bHs)DJHZ*Xt4GX$s(?TN7~e06oM=cQ7Tu1K&a@{2}mfJa9Zu(^hB1h(0W9U2OkYlubKlJC}p(a;+o6BAfqT9gpk2Oh*L3GMJ6i)5s{_BQjv~I!q$SLV^62H$q+DkPnOcL={80|R zQoM~frQ=lGJQV3m3^o63CSZw~ZGZoeNKPV|I@jOjeu3aS%s^Tw!Sk)CQ=n>YK`uyy zoA&1Bd%kPzJv%a+Ub0%sQV!uAxa;@%5MILv0YO7M5Yji0qRFTMo_sJsF@H0xf_A`< zD-?q{VJlljiWMN%p)NbT)X&traZ!s0yMIETBiRZsm zN8nbQJpjE;#0eS}=F%L=jTp0>XCZKh!(UPg?{+X(2gl14QF_2$gfUQ!4L5X^uiCm% znc)rHaP8deC9lHQzLN)%-s5=r45#HmKIxmnmBUmmfnaVT^g!)NlAsucDhbGBXiTU{ zmkSURCKICMs(?u%U)Ji1+Rtl}#VmmRyj$_~9K(GK-GJVWo##DOdASMskvMtYS4%#g zzjq)PPg1gG5J!)&RB}+pQpxqBh%BX^OjlT37$8*jh}`4$%S3ln(_V6QB}b)MS!o2; zX3ZJ!cdt1Edbc%~_f%bTCgew2b9rAa*IfQy%QfeSMN!3@ueAiS6_pEQDRL)yHCi#MYbM-2hC7+bypU3nKHc5O`A={A%ev2bi zUXgvZ1NvuNnjZJ{d2#=&f3iv96a8+#c*HH+{#l>H5+;L?MEZRuALd}hioa3@G*oqG z@xPG_4bj6USC%-GmKuq+$N3U?bM?xxljGzk+-1RCLY^b>;|d2WvB>n=;%{mbcdq1a z*?_h6rHp%{KQS7Ht{@jnsXYust^&&iFh>i%CRi$3G9r7II}5UvBNk`jTdwRuzS~qi zks7+qOs73#5YcVzcmm%W2eJc&=_4_*505L??i$!fVez1tLsZBHm6hEL%;BbTEKdQd zT_|*?lVZint$R0FS^AainkC(k0*krU1nxTdt~zR0A<~ zGDj}AbmxYPNK;&cRql$_wv3MGtEt$$1K!*LZ(xK&z0!qErC&M*dPYcUgfojy7YiI? zwr$u2&(H$L+&a@u0uobk*BAq7CY(7x{gk4`&&6rLeZB`BOazBM2}m5EgwYcktWcOm zI9?9WM!MBbxH-Fw2MGxWF$vMh6W!MU#^C_Q3=i}#ib+Qaj?tx9ik8(So9tX%1rR66 zqUef5IH=ghmy1_~T}e}~Hs zGTe=*jWhf|bOndw$=S%Ajs4jO&gT%#+$oxk=H6ns2#07GqDe4X3|$Y7=d-Ch8c+S< z$PeHtntPLQej0@HX|Nj`(L2YeNyq$QgVL0XF=4#%7TV6#23)Z#1dxmo8o)?Wl27bE z^%DM?v$`+@5PVNk{BQnl#7!u0u3l7d3Nv-*A~D@S_JvXb)@`wv=56zesdm$1)fm7J z=(wq~`WhNJuCatp(R4C#gJ2N`egMN@y71s^JPhXZ;m8YTlaV)EOlNTFjYk2RPp9*# zJD&&s>F9K{7!F4VV5QfQwnTO=CDrIDJ=(LNiXc7961dP>Xi?PO@VE$tmdj9wFFV88 zuUjfzR!Y|Sw$OQvBZGUi&ClYMF#1A*_(I|2lyOz+lT(C!HyvM`8&A3Y7#iM9U7o)Y zYzP@_fLFXF8i<(Km{ra#RCH))!FaE2NI?;oP7gs=-LgnBAboSPHDb&_}B&f|T&%0!J{vH&5Xm|K|%32FW14W^jH-($)-?F+mX zE_wyX7p`#$|3>8A$kt#bn}bNUufQZC*yOc{Q*;uTGAw0@!Czw>>47ka1lQ)Pz<706 z4>U`c$OgR_%?j`}d<)c@yMSjg+&~@ufv?xH(c%OqOp-BfRBDUyyVsX|TbDx`I65*|wagrT`ne>J zjat5jXwXS$GP&VW8Gv~RoM+#!!1Y=CD8_fm_~%$XNf+KAhFCQG2AB9m&OIPOZ#Z_0~Y0^Wb=Sq8tzdn8EyaZfokMw#T|M=qza8Wc69~5uCP03n)1Hf_gT!`Om;$1(yO`--m^ivW2quy_B z^Om7BhS6orP`ZEts@s>ZDN^B0Sf%?y#zbh2IA9Qw6ms8V4aCtQnS5_Qz!aSU5!W=| zCbEwB{VB~CfyN_+=S}9VFh%(TTreK3iWY|`oN3Ot+CXu@RUZ1KS(-$V^DExpG9q&r zIg2ccI8(?CpB-Wn#SEuNBrouOa9pSj3L2)0`PMg!+3b)GVGM|FqA8G<&gRFj3UvXQ zZ)H)8+%kXWbEVCztJYA=QY?QxK`c1oEh!j)HB1tY*5ws%og%7U<(aMX*G=Vk43JA*|Ml5u_c)-ik)*?M!=ngP2S~Q z*4&|LuFj)~JZNXI@R_5xoD*SIyrx5kI4r!&yP;q3pZmu5#yiQ2UV9YE#Q%7X% z^(F9ERb#Z*olrFF>P=Wf9DkwVI3}tNf3(N?&5xRzEz<{a2*j0#IiEif$R9RzB1O-) z_$>-w;xLR5XRfrtGR>tj(P}b`bM^?<{9W~Ga~G}L3;C2)VJ+&27SVmd3gUP$hZF}g zwohoFWFfIrFQ}7jmO`|^_vRBWLIfj9V1P7JgBc@h$Z#Nnye@>sN`=ar54Jp#5CJU) zG?D0-Bq$CgWSMm#IxTvkc_>W&rhI6Kn@kr5DC^@Izhe5IQj~CI2_2OX;nh<(qq0g`G1H7j^i9T;8N(aDdNbir85V{z|#PZ4aH61 zOyX!;JQi=k^d5x(>THi~1NtngFNs2rxP5VxYY+Jld_&ku1+Tu+x7bV7nDZ`G0!HVx zX}(tKdZ*vTY_m^uY3V2_3uDX*2 zaaU7Iij3oGfkf0t98pqS#9?mTJ0mjR+l)Z%V~x zUthnt;Y~A&jCe^-z_V}UAn2IRooBv9z^MJiw*<&~-g_QBz%8vEZB`;ntF}@Zc8fz^ z{o=k3>z&jNcg6B$`fzvbjzfRsyC|FnUO4g>DD+OldFXl5>3ljt!F;j^{OQE={CP0) zLVpy(q3;GGcL+zPwGBp*ihx>O`NC()Ir)lD>GCs8A+<^|ENY{POy?) z6)^4Xj0$lzkcH{^eyGWnR983qbzs_uuuTwkl*gE!74i$I|J4rzR50h5gr==s-Mp_z zsPFB^vi6XU2zvBTpjZSdNKB-cMFlbK+~fzumYHC>g>>j>svyFJBcZz8OWm~C?drXO z1b$fGwf^>O{CVKR@nk*>yxACz=A!_OgUNI;cY~ojTllB0KN$}_G!K1m5-x^t8ct5< zqv3cy3r44N-#rW~z5Pq4B>OhM+4%jGkOKoT^4NK!XBC5B!&c|1R&lLI=u#VKM@q4m zq@pDEuMrG?Off@0#DR2eofj>0r)!ZTC}X}Isq;#ml&Bplw0|iq*Ca%_g014T<#26D zmgcw7sN~)Bf3@4r^6irXtAVPwsSi5_ynlLR9gE%JF5J2)hrC?9xyYL}gY3Y_&Dj(x zp$)W3BfE$oUN>1dmkZ(0eSonlu_3C9#X!FZ#J%mug#o0T=lOF^UdbC_h`k1c79GmR7H7s&i+{v=drbTbTy1W z3T3|(?X40VlxbX6U!Br%4yevvPJeRrJuy%_;t48Bn3$JB&A&sce3 z7&&CtIe28NSMO>|Zz+PIh+S@2-kL4rg-KK`avyLQgTjtz=!N2cSC-UlHv10ei6c-> z3|Zv-Llcvt-!ep5PEjMrvh`}-TG-?bQhmt=)PVg52o8+@s13Qb6qtdYFj4Mh}5U?Qcld^4l@W)_P>JQRYb zM%PDTOG=<|7DdM(CiRQuxXL5gJ7UK`R9w-)01Xt_hd-O!HsovNHwj4mt1et5TuOH( zmU!o=HOTc?2xvAR2;UzT+3zyPSGxzpVoT@c6}hP{Y8zTGtVhu#n?Q%p)LFS`UW=bO zD{hrOR)2nfbqtbCa178oVcTaoJyyP!<0887xTq1y<-I(uY{qj96Ybx&=@HM>W3mvL z_c~y8ooB1=g!-SuJx!wIK-Hz$dMn!w)-b8torV-G#!-#AOp?-UZ$Abfnz@QaGfdn+}6e=?%i!-LBl8$ z^LwXBytCucuu=3`NM)Z06k6?)yc3Gpm2uxm!=60XXHY^}F)v4v!7sszJjC*r266Fg zV^>lbAH4W)MDvfh2MYZ1g{pA)ARD5gyH9&x7zlp~+rvQTgYOcfukvQe7s#V;8L6SR zQZ!Zdn`V8Y49`)PgK|@;LfUT1S1y8TfUk>IlxJRLMGjAzF>m$>O7IUXuB^u-kGQi(b2UjF) z@WLoODgHOoIZ;gxP7dJi2LBsL9KR8`NTrzGfdzu1YX6c?fk>!VdFWe`3C||gNBlrI znM7`e00b0OYDDY!F|@X)batL|!L86bA+mCh8n>ptn`Tf?)F(8J0@Y7;66GcM_Hf!y zZ0{;`KmEbwEJh{$?38Fb|Fg5%8-fvS^o!dW6?`Y z*N_FP{&8PiWMsZ4et1n$s=k|dnTU2pZeuxKO(O?1c6wD@1k+@LxT zRJ~U}!zqC7IzLwV_2sleIj{n*QF%hZqimTX`dh7lpyqm4MT?zbbp@o47+F_zx-;y? zpmIm#O$AuD;2Wc>=D?e3FD+tkidXk{+tgLPn2I-YJjc~>H-S5wj_3Y-9=fM!I(Ea! z*c&1LbT;wea1ku{1h^;|hT&p58I4cp z>$V`sk5r2+DaK{8$U0RO=2Y;OiWikJ)V5`DfK!}7dM~82-1#B^EEnv??-Aah7*RUl z79kdYiDI!?GLSfEFS_{R=;k)eUg+ndebZVk!*TRkUxO(t*b9~>zH}&I6#;_jN~kVs z#$9NLJ_sLog%;gD@)9kN*`uw|D%eI+KFBIn%+)qTH|p`8 z6{?^-?)p?fYpYXtcF@|SB?20teAIQRJALF;X^zyRt;sUb1|lAPJ&F>>yYcxE>);p7<%C(aA)(yVm6uu{xm?N z#b`R7%x4I>o@q&hCuHMLR#HS=g_)twO0qIdIr}dlBsLP z_iu0<>S_cWmJ<}u_M7Tu`_}BH37+cfJ;3h5Rz2Hk(x2D80S7{V53mKi4zbZ~rcTs` zwV-${p6x=8X6nlN=IG-5u{sB?BjNxY2T`WelHr_ekUCNeH9Lkuke`00D8#!|F-&)x z<>LL1XpyIgk}M5sWxPa1I@&+`y&oi5|Exc9U3c9-?o0Pv|Ez!d9q#{e+*h%=MoX{U zZtT9q{Xa^c6Wyl{?4{sDR=}f{TtbOzZYtUg(0ZYgTmTeiW?oN5A0^j@IWGpp2uMhh zMUvmB_IcK`5|Tm&${ro?jj9DCeXLBRXd30;xMV_ckZu!|E}eDcT|_Y`@JvfnOvoKgCn#=&uIW7u>zHw>$q>$ zV&gMgFY0#OPxSj?{+d3by(WZxoBN}6eR}g!a`{^uH(f(^sjd-lP#KlH6w@AWaNh3y zim2#n2PUE)wunlplYL5SohRpmSp|iYZ{Zq8xS{3%*CBBN7W%nZ^~I^Xj6=^81~0ER zqhtQ>#M;TWNr$=-Ny|432KO}u0w+piGWs#vAA>6q9R4hWk@`WEa>#$F=c zIj_SyXY%5VgZ9OZS!e^t3zDv-G^*_k3AF3BSTUCD+7<$O*TpMqitGRxlMr253Xhax zRdhQU5vF;?3j)J$UMAGVXeVv9f-1LqU}9Oq zb|;LM)h`6xJ*6+Kl`j+$w#pZBC0ff~*hwIa1Oj=3d2qW~7U|(obsI-tt!zr?JKpy0 zSpI**|G2%lx)alV_xjn@odcv1&VNwmcmf|{0Kx6WRlX4T(64`=@ zKQKZAZwE@&I-eg6DH17h+HgUk*6&1R5wqp{Rv8fx#pOZ;RCRF7NJ1jA+}8)a@;id0Tu8EMX?oq*3DRBY<26cb$k0?<&C8(?tk!dRtN?w zfI=(^*JrYXDi&KgG&Aoj#^wSUu z=MEpN>yaIPs^m`DAgrm`)a_XfaxN^U-uP9}b7}Q+GT? z?#!D*cRoVn#bh{})dOOxn8^c*-gy*(YrI@B3a(`({tyg=xV=p?bRp;kS1I8W+5219 zkGyU2M7#2wb=Vn{_2as(I~k3{|E}v+|93}I_ix^4=(?lH*mwQEx!!O(^#2Cj$4909 z$tZ*A-`w}^t4iEo$=MbTG%%C-@rD}-1doP6EuJ$WMP z6%NF*=3k#Yc>-<%81uECMU3`(z1}k7eO>M8pwYxAQcFWp`_j!xjJiUWoB3n`x*499La&(6`h{NZo|-k#Gr9|c%a{xFkR zrDwxY?o->Wb@m#M!UJ7Uv8Yn9sB%)WOLsB1xSYN3xL;qDq#pHAt?g|`ZrzCab9D6 z$}hc$;BDvN-MoU3-jP|1)S%yU1#q)(ukrCBgjh2@{Mt!)BmDj9HK+55@Vt6wg76NU z6_CJ%&}6Zdb0BRRp61KQw~*<*U5xaZ1nT+RCEA7fxHDyeFhcq_GJMH$8P?2e5n8XJ z10}|-Bv`v1R~>vpcN@cSSM!gzZXrro@rn3ch^$mecs~1 zcM=2UadNKVUzFgGu1S66*03>FCP4eNt@DyWx8r>9@Ixp*EKRt*X9rVM#6_Dr~<@yKE@jwMdujs*H$OD=q zi@UXNypwf-d==bV{nGn1y)$jT`^}T<*aP5JU-u6{rrh+GO5^_UC&;VO)bt(?a*%)) zN0WL$NW)@c&6oLOM;L2VIo>Y{ZIMJJgDoBg8!$>rN`t-NqRWv011*vv6=s(yc>|w0 z<%7-aEa4FVB1|kutjIvPF|Zg1{vn$715%TO0RL0U?BvV05#TS969KXHBY@_#k2d-6 zb4>8!Zm-AZiV3eVXHb?P?q{F9w`YG+O>GckB<|U=v(1s61ZQ(x&)u^559cAQzY7O( z4#@^>ePvC1imc^gbkSC&c~AiiltHNNmB(Qjf~F0 zpS{A)!g|j*r{hn2C?g6TW`&7xnG9c&kr>u}zdz7jZB*_!2jRdkSO!c`$GUJ>I6jpa zsc^jQ`h^D`LkWwCnusY3bbNYG=lsX2c;ZI6A0g&YWHHwHSwbVtA*ISj-U!!`_fZxK zVZytGkw(>RJjSB=AAJn{sWtA39EL{ZPl?jsV}9`$5uxH|P8TMk@}K5EO*`Xm;pxfC zVwcjzdFGTERf00o4+SI7%TlVV*^@j=C}o-s>t# zbI3?=S?)Jt@#>rh#}N)ai8)`^5jrqP1-d1B1)}b7#wfO%X{11{OcV_5GhSpX2>`CmqDDJl^Qxw2-#& zmso;?B!e#v5*C;p4>OH;8`@EmK6V@IGp2$BW4s4X{YT9BV#p6kYx%KwZ}`x@bE&-w z(Pif|k9J;?K$m_9NNd3)qjVfGpXh)SB@>l-L3Izcb2*%@tGk%b2CNHRd3>{cpXUYH z!no^^Zf_1yezRvV4z=DK-ueu5xt2{Uly%2aLiac(K958=8VxjN8pB#DKtxT{Ff}8N+`Ov4r}cR(+hsN4`nnk<2j##}r*ZOrYZ|`s7XD*Iwua%H+^%w#W%It(`S-; zsMN`^>PBhUmoiqflPzT9EH(3~v&1%Q#Kl#+RPaICbMd+>2@nS%kORS2ZBqe&NdFoC zEWf@y$o;6ju_@0$ecJJ0{0|eTf@_31;}EPHXhi%cuj!tSD5$H<+t?#B^B^;3a$RJH zD2=O|7%iNEfbPzA_V7s%|v+mpJ?WZW6Tme?L(F#ll01Y7lkd{!kj41Wg-%$0ccR;d$ zlv!Y3{9GTfhmo!PX!!A;X{W(v9G_o%OqaVC(~1^D+)?BLT}?`qX`mXKVX z-^~bRef&-~Z5#egOJD5&iR?Y3YA%1V{rRzX2&(nqt@GKmzgau6tw;!CX(+>8+S@X; z;F3B0m5W4bDtya_$7A~QNI%nh6eua|LxK9PJ?y2m6;&S6_Ne5jHJhM`pw4S>B<1lM zAOf#TKFt;~H)x-T*;st245Bp47yoRvRv&mjck1syob8Bmy9Kfan5zUZ&}9SrLEJw4 zUmrXvvlkgndZ&({Ec;*GhINGEZN{2+3K$DU+3*_k_q-`}hW&KB@JW$^kezW2|9W&X zmKHEI?i|FQA4K4g%UWZGnTB?^ZPEfdi26?=wa3 zD}z}`Pp>UAx8x*Xx6kVrIz}>ri?5Z3n9>iK>Ne_99jL1c~Ae5d0@0%7i- zNlK#6o$lOG&Oa)lKvY{nn(YFM(X~My=m=|0^9tFs z{G&Q;zNLPvb(MIX)->-}73?IX*>hO&I&rp~NzaIxZMu1G{3cgB9Q-roXt@>LuBdF? z;tR-F(*ZZTCZF2Wjf5$A$xx&=5|)~1>*|;p@l9&(A!1i9Hucb~91d0X)}cgqEFfL8 z`gmZfsclo%Gpi6O4)W-P9i1(MPsEjB_??Y;*UsH&pKh=dG! zAIgu_?AekX4bcE){2znTK+{N2((hJK9BP5-4J`4YcKR2~LkL;MzabZ`#^LO6;9Kaq z`uOB(0cJM^plKc9%4EDXmc5gm>1YQPDdA=HT(Tm*8Ld4;vS3pN*cBn=Y~$u=SxKiCXeG-v@QO$n4DzJm!b|Nw?t%>Lbgcaod-{idqRno3%Yg^ zd7@wt^DjpEN__bnkG4QCQPh_v#M@DdBEKb<27xR|_D*uWKtNR}kW|>W&Kq6M^uF{i zDZd%_N6X?DUCVrGdt&ogY;gn*%w$^+o?VKe$OmNlW}9@s#!>^Ntvm7^a)!NoS3u@Z z>`jjRU0{2u^*+wM(kU(ym=d-ixz+YR2qR7%7)3D5S3 zhx#;o@2+QMs|eKM63!nQ#Jt=12M5H1LsqprWXQoJ*dc=$-M0Om5>{<1Qqv9PV44F`J46ac zWO*Y~PxqQ!Vp3ag77rq-seOprkQBDIW9coukQB|@m6sEh;?sj5%dQjC1QZQn>1}-F zL*n9L<=&m>yP$A|!pJ-A;h^KsQor={kyL1uHi?Ax2tuac zyLNVKwrdeC*j~LzET?M>9hqmCw}8QZy9|HKI2(7(om^=X&898sEfvu)&iJ2IM{G-Q zYoPwLMiZAvI%3IZ1W7_+GcVhu?KX4p8p1r=_?rd9%|o6RYrF|X&jo{9^4P*WjcA(% z(iY*HB0Q=gZjx0iFQFvJKGis#&?uU%dIi#w8Z1uwo4drtBA${OzNdD(PRK1Am7>e0 zSrz3dF$FIMKhX!UCWD#k|9&`irCc9H)JZ4%m%6m4n zxu-Q(nuU08QYV2>o+r2?VZNs`h1KPZe!*m=@o_AhH&}E`S{ei=-J}` z$ZHc$bwfnM=BT<-gz&fQgt*V>PEgsyoE(@6&4)?+f)SX^&^E?A(-VOT7?E6- zTYvO53z>=$qg!bELcRBCSw#YLMF6^VgD4 zr|KFfi!ZgN=83@ya!^KF`-uU`igWRr?wC(DP8t)k#obVGAymi{v(yB&YBy@r;JMPq zuEbgSF-B6$*>HhN$n&h&WY5ZbN>8oJu*4X2i-)}aZ-$_)XIB=sziWSF{_RDDl6c(fi$wx^Wha4HWDm1ads3-j`C=f`^0Rikor zX)Y}#(+JPh>Qv}bv*S|LRpOvPQU>diEM23vD>AsB)uM#;e4v41;Gm9rFO!;Q-4Dh! z8@UjxY1dl)(sw_$f)O>r36SXQDfNGIO6CuFP{HsKwL8ZS7uG5_Nz*DmA{lDIMOl-C zuwgUCqtT2h*kZH|Uo^Ixp1^MS1=7~W|L#362f1awWA_Hj%d6Lk+^5D&f3cQvv{aHg z(PQdZ4ojBNW$&oGZEqED((Z0Zu_vYdIqTOslf}C}hAj1NWpg;T|EI05v?ewAGW|TC z$DP+x?Bzu=f%ke}qSm@g1i{Ij0(GD{xpBqZoF;y@RiI3nmow|Kd#| zQ-A@kH^2VHSA26ta8L4)dH9ycXUXh`ef`@vPLS?*_y^#h_Ia>Jf}@by3=y3J#M83~ zBVh0jz)8?@t`InG(w>JCFdFMR1681UDPlZGJSROJ zgp=sK+aGtUJF4WIDZpXgD~WS{6?~&>jJ-UTayP` zz5bw&obinfG(6;g5yN#vSDYXoMtS>WKg4nz?r%mSK2b$!$!_Ktr_ zB+)WV`!DtYy%_Ss?|C2jSeV~Xk9%UthO`zJoWnVfp;P{86l6w)~~$D!GH3kJ?Q2_UY#M-THqEcjR)cj9Da~k%D zx6FBUK4{ZMENWRhHE-|6I<12 zZ5S;4(9Dh`QP$Ybk%f%^(3zE4t4(6%BjZP3e(1Sh6;l(@%;(^Ei`PY&hL z01O`DHdoisqd#d`}$zT4t{=aC%%dO{NW}i8Ym79C!q$3X1wL^4wMZ>+4u; zr|@mC=9&{1DC-;346D~OVP}KgXktjYx_sMn2Jpu{lQ2wy51$PoHI@z9GkchG>z$bv z$VBBCWoGh3+B)~K%2=P7uy7hmtNxWq?Tew;;IYxyo;5t>S88{!za%=Xf>huB9__rJ z|H_rFS(jI`_iu@`;xv6ye479Kx5=Ji;D)2Mw#;H2rY%e#+8}bBI{>8{$02jVNbmQ= zK&`hjYaXWCKbGfdYyHkUYL5Cj4E9`)I`qB5P#jX18r38+#GDk*!CV-Kjoj+TO53Uk zBe5q6)ss1zSHX;#upKXFtOb?NyaT3F$7wnNq_%Q>8Np_H2`A?kMhlZ3y14||HHXOx zp~+_~GryM^N@*|79)VAFT0-WHl-H~*3OKcPhcVMKyVOndz%+Bww>{dndD#2YMS>L@ zfR9n(>Sv!M!8A*Dm9Kh~KIg?8^XzQ;lzATA;+tnYi-d}=XT>;C@sQ^tJVk5Hibl4D zbIU`F!AN0;EOKZe?}2862T_M;V8|I7O_HqnC5j=&Qq+q%mzcQ>WCrq`YSy6nz>=rp z$s=uE)*T@CG4K@pLLu2%U9y#y!s1t+U(%QS8|~lRvti!^o%`=@H>bJ9%|#P`vK2LQ zLb{V7)F0|D1DlbcZOO!pdvRK`(^2fSGpkyYmPKG(dEJfOy}w1YBoThkS`GzkjdypH zgyaHBO{C~(HtR_f&0x~K@OaWCnqsEfxJ7~rGwJ29axQUmxxB2}mQba>m|AxD6~351 zSk9OY3F}BRPnv28X=OxqI4mX8e;&XNTBcn9Mr?=-T_-QJ;ZIuLP44^7lYeH(ex~`Q zjRBE}-~jsd#V&xoo0CUHPTBg8zHlZhxbMGmY=&hN(1i}DG|>K~to&u-q&(*cfD-CE5z>q_mmlSjI16PdL)_8cn1m ziU{u}(H@ow<*5XjqpXPptXHTG{b{XbO9_vDvrz%d-2Af;S^mdD^~v;7qTJq#WYWDk zU|KUXyIxGEb6+u>uy_g%+SpRXql6);nNncrf@E(lK|~`yga1~C6=&KLADex-b&A_J zV7v?6ZD}tw(}l?+%D2xzjbZJk{!?LKyz2`~^j$SxU{ifU@I+>MjeDiLCbc%(84IG)o%x zeL}uYYteQhykntVHlX-2JK`D|(af=;ks8C>(O(Sk>kNI7p^;x-EFqaYI)4SNv(iH^ zw2|={mW>)-TOqQ_)m(tiS6#~~b#&dXT~^mX1$}~pA8vK`5?7j}>CAFRJ5%J5=+btk zkTyV90k3J1XOL#gu~ewl1W4kW5SJd&=dw|=-%%~94@+EaWf6(%nS^J^5IHc0?j%)i zJt|X6qw`2dKUPg9fe}#cp_B#5)=Wce!UQa(qde)|cxSb{76?*D$j&gwUTO~qZ zw#CMsS!=b_a{3`7PK&KED@(qKinVu2KHAi{lhIuIcv?8Q<~SyDErI1v(poZGbZ2W4 z8;KpQeP{>-vI?fJe6umeC^-i^;yo#!LLIT%kB_HUiGiaUqv?Mu8pQ|jXVZ>cm~A-z z>qW&c;DFw`ald2mdYnCp#D_#Y#~}sR;(>(YP3f*Wf$U?yO}39$2SO#iwW+WL{gDIx zE;~Gc7Z@*{thvAjP|)IV)TovPUl72%U3eu8p5&{}=@Omigvmg8 ze~BR=_g*yps{KiO4=GbwcSewgM1PNkDd60B;ayj%#1#6AYqw4i`baeckT*_%`yy%s5a&IE*s+V3}J-Io&#Le)s$==|$cc$&p zp`TT*sZY1q9oLmRA+ND7;$RzJ0hipP*Wp;{k;>KR@zma&ytegi!rZ2dCkPUx zT;q@5CbEgtpmLE=_Vp|))+n4jX|YrZY3E z)9IJX*sCCa#f}B#3))@9g`2 zC&b@?5`aa_9R_B?zQ+5jQVZ#rHLeeKaDuR0Tj*>+K>dsHw%LCSTI<=7BsHa+F;7^R z+iTaG%eA@$MI=QvuDsGK9st0 z1FD0RTDB)Q@)@#wDvGsQ3vz*Xs2>Ee$g%1Decu8=9*-v)bpJhc0T882e>C8In*geYhLug+Wm z1Y1H#U`-70Kj6y7rTYg}ADYKkNy;9%83~*l>}|r~Wk9u-u%?Y(EI((??@UW(Iyr|NkDc|UyOfRCF9r?;`VH)R533X#M9xlK5uT?b9|Z(MJzj^)?n z!_j$jgNfIAP@i6dahh+mek4&m&iXegm|CB;hfDb;w@r-Ra}?pwNp|C}8&!`qApgz~ zRrXjkk?z_uGluLe#=&`hzF{+t?EPT)csBsvJ+$0uy-k=9wdCxdCbYVk1@nLwRW?EF)wmS{kVZ)>;x%RU05Yk!+HINQrOU`_~nS^7jWs5z7bRM#2Q z;r-2J@Re_Au}h~7q}IftS`KwWj$*i8kW*+Lq*mYR)nT56A$ht^8!PXcK{8`TEkbal zdDMo$@D*~r!QH%h!=-)5w9nmR*spKae1S3FUP8tmrjMt#2*~Mu#OL`5Qml<>CaARm zcn}BjiOQrU>e8GH9V#nk3WxW)D_^)^`EolRH;bm@M5d)za#XViWeEy zGP6GfEsI-eL6GAAwyA(;=L8TUCC{O$7l3T zQBehTx_p4o)VpI>@?n3ioLnHx6Ruf+`R!9u6`TKOS?F(q_Ovsc273bMLmg1V!zP^5 zu)zA;95@bkbmmtzgFJCo*c%C@G7yss-d9w>`zYyV3N>~dX69GH89ZKEx52r`&;Y5Y zzl(gN**;M?iD(W)0q1=M@+KtQu&nBWIj;*|#4_86=v8LWws8sF%CFT?Y6nzJh{7j* z^F$mILM|A-mVk@M#pA-_$j0HQ++3LPLoKQIzw=Y|Tqj)MW~t$NY2#CdtkBL8eyQ(E zluzVMglFsyZ$@w;@e)Eje|z$a%UijN~=DjchYJ|V`RwBnvpt@4yq zj{mk&U9G!9c=N`+@q01zJY1E%k+iKLk={!0zPr7=_;VVyGH~V!;SDqgUp}o!2X~&U zM6}|(BXjf#JZvC^Ew`KbC3GAA;vjqlF_j!cJ)O&4n4LNTbn9WvahW0Rpw*5Qe|F>) zzj!~ZSCy%pzg)AEtJ}8YMWb0u@y@QQk}_eG&;{v_HeMeSw@_f7ldr9@b=-j2x;|EB zY3yxvZ<1eKo-Va9lH6~7ru|S;vc4ZuH z@aM;Hl%vS-ibe8LpGcQ*ZZkFv!7i z{J7q@w~Z@Jz?v(FNZAi(n{-=BkF*AB9?Xud1q^aQC4Ld?`(t70HYh-qYd!D#k(($J-0uI|`;Q7FT?N@`lQ{0{*ok?Z{QSt<215$wMA{zvf)IfwmaHVW`V?|Y11#t8+-Qe=1)*puV8MR;GB<3@B^hm4as$W`8uY#Zxy^iyEr2M%dlS9l?T!%k(OBh)Y zM#tE@@Q;~P7w&}zihFRkZ-J1r4B-;3Lw${0ad;s@dq$;aOHxVl3GS%Rv5CGzpn3+3 zQsg0$x@*xo!CyU5Hq$`?2pfXEf|%*%3VVJ2fY0+w4ou833*e{8>)p(w%E|Ta`D2w% za9;}e>ke7E{Vtz?=l9F`!ABcKxW=uXUQUnK{lU-VsWm8uU0z@J-YS|WX!jhA@(VJ<>dpoff?mF(J z8SbK4#v+`9d{Hl7GLziPpG8q){#g9Kt>(;BHG4k%YvK4`XSV-;Z|2L)d+a@Ns;1B5 zJ-N!-b6slOx2;WHIV+dddMzu-7g~H3(I@UvgT&Jo-9iz?H9F)uHxk^!g#Ca zHwpi1|8L^l1OK17*<cD|T_EXdd3%jQ0*% zJLTS%_+JKQuYC2*>beq^Gka#QT+MF1S-f|0ivI)u4SX+i6X~=9s&Q5mv9%v5vZX48BCvrIw8bPcph?tH{Yk2z zWKoeNsHD8inRY4~0r`jrv}0-yw*Pv>Jcgc=f^7vY#tT;dPgSXq)VwGOurJimv9SHb z0Qb$yB*C6#U>=2!269ySmgdWqQ=f(7!w35nA~^@B$A|G}dH9VJ)!@VDje{qCdY+c1 zq!PRibmnSwe*! zK_uoqaGNLp5O$dLTQ1bJ>>Qpi8)bWZ%*pX%+Y1ugQp;-o4gGq<-Ku_H$;T<+2bAXJ z=I!;NxXIOvK$=9E-Z9tFZAHefve=p|Om!czWTehn{R6F5JRa&v_Z%p>IeVdrd1QwW zJpVYhR6>fe*@%bnGoKV$4v)8FKr+UfyQF{#g$PZ-_hZy;Js}b*PzVouGdFALfsU~j zH$}YGZZ(>Y?djSO+U>5LJ*)GoPMozW1Asl;&|bwoBjoNL2@Tb5Y;it zu9~V1Hxt?}#7aIawP2Ufq8hxuwgt{c4@xRLov^nu^lkGZ+vkPn=~eEAoT`Ulhtkxz z8i*HMgQMfKsGESmV&IU`GyffO?bn=T)KSUf>RY-LqKzCclQtvFFAxfnGZ2(fVFk-t z4hj$gqvXtT;tEBrKXC@~AX93dk*kqQX25aoW zU$u-y87-N)n=*kWer-(HDt;pta|R(4!({A0f#??uMqF_Ir>D}uvab|%Jd5!)jT9wQXLF!6ojj>6`6Q_tb%lyg{t* z`SbF)F0jzByc`gr$QR_+^c%SVHox=SGUw@KKK7xZ>c{P61#fV%7b_N&2na~xsgRd9 zMk*gNKz_t1B0(G@4vx|{bC`a5PqtJ9slau0xc$bjAF|XOJQ!dF=i#I_F(dmJWBOss zC9g*{9nm$Oo0XqNnvKj5kRh1CLN62D;s{U8-9kTtUHjvQvh$jObn~FmX(8f7ULh*v z(qD$L9(Vmn`_-Ky*kBUrw1&cS$$VM z&WR5hDFAvjX1SF3m~zWLH7HEG#K5kqSzvVitRau2aw(JC0$^f6yp3sIGlPB4`Ch&x|6v8snOT)dX) zk0ML%t&hDK2pdY*k3o_=cwdaWFHSye{#mWdkLJQG{&ti~ z(YPGdwVQ`)#QF{PotnL1(y@U_mFQrKS;A5+L*@5Y1wWB+6TppQlF@fLPtz3Id z()goo6W~xp@mn8pJdR=s=G?UtKHKa%t zbRP!oI;BIWQ1GvTABoHM&p~h|6Vzuwkr#PBX3bB+{R%((oi(%zdS+u2VbjbgEwv z+(fV$1U?mZ<<;G$5`Qt6GK5_Wgrlvf!O2-j^HpTwA%9L{rJ{%ajtWGpq(Tw~8xJd> z!I=;Huc@J}?Yi^{UQ~5FaTeZ?H9mf}l3z3vKKua#D2;=yW}x;EtgCA|Ayq46HDzlN z{m2?D4foPQX540Jk%#e}pRB~a-F9VC*0!jGHE+hi1kM&y2w6v%_i%KL;aF78@AO0K z7ULZ6wZbKDzrww9_K3y!u&e+9f5q{ety(fCl0GWB$8jZWS;(!$LJ`7Jm-+wXlcGd&0 zI}{RVjm19fxpO}irVl1E-q#jLIRv*Vjn1d%tbX#+beHfSq2Jr#W071SXelyZTcfn# ziphl}ar0I7R48TFy6%Q_2%(WCkbZ=7vgkLZ@}_|o({zxg?}TYbYpg)5v}n@cpgF^M zSPo$SK$iSv?aId_p~jL~p440)Qp7JxEE_ClO?SMpKi%_74Xe!4@HE%k zO0uiN-Sm{qQcRCZ_KFl?$AbBIn?53`uJU+HTHNMv%Wl1`;^1+yf&C{4>A&PvZ#Ofo z3iP-+*@Q?w!|#8;Rs{HS*eCgsfPsJzonRvVW~xA&?qh?MgTdW08Q6~y<98kcw60O@ zY|ap(q-3@Kk^)>@fVSlsC#K9AHb3lDopu{vx}ZcQUluGw?JPO{&+T7Xc7m(DmSepY zl4HLMIBoH99$SrFFIA)ZnO0ggu)A?EaxE=lN!u8nHJcdSmo#|QX*_x%0+k&KC1_V?-d%Hs8WWFq?2ez#A6=dIo! z@s(9W+Tr$ZQ@jFNQ%%qZ(x8N`FgIaHqvcBXbON zyNMi1L$m$=(i{bfhAcd3bu(D=Dr;?G$EWy!ZB~z4 z;n=DlPf}P}#{|Bh#|F0UVp&|q|44eMk|b$VHwF$ES%uF2NDxzeEVwPc^5Qgn*Kt1r5sP#B(xO8S z(Vo7@sP=8nV~u%97GLmdB;Hg|7yHmyCw)R+CtcnpS2G4+sF$?pHwdSsl9xtmB$B+n z+blj56(vd21z;^k*ny4^R}Ll+p-wS_i2bQG8d)a$1rpXk&!VN`I+MbtHP?ez;Jy3I zW{i5;#?#X&hWy(tO6+Fa)8HyqstxQ59 zyxSy(n8h#cAYxEgV;RQ{R}BW3L3KU5I49I9Owt;4hIW%@Jr~h%H;*Y7`CNA?2?g1u z1hRfsysR)tQ*l>N^kB=hLME*N&4oa4^^Oi}XCMNm5v5TKhP*&+2NH*u2VASv1|x}1 z@4a1&kG+k=(Q)+{VXRVgAIsiU>v+pjG;~e zW)+6@a5RHZ;wkou*g(+8yM{I1T%L*pXEFc2%^B#_}~h19)QN|U5!f%3@- zZT!U3=GZvNIm+JN73+?(ki?2{STW&{v}Rc3qha8tFj$HjvJm6cC7K+OgS5d`IOkz>%RB6= zVsyfcgwPkAHkN;a62(p6mBqkB*W^gS;Av!yrx#7|en=(J1=YlAhS@Iv%ZEXOVI0k; zMlQwyIWLVO%b%Plj9?@Ot33Y`mq0pEDHbSRFWWHqGYyXJ>&EjEysec&Xp6oe!ZPF! z1{j)FfN(OQIBPNEN`J(!<#{wzn$p@|ozyp3@X}+~ac} zM_DH7+4Ax9xiNv9l!tdspnu)t+Xl1(?hm~vXxFCf_jVm0THQXp{e}0tzX5P{aQFB; zUR;k%otbypFH}XF&+X;d|5u0D$wK{*0tZPrWy+yCd1t~aq_Ta}3n^Z37)zfiG`hyZ_O_ z{~70nvKQb1FmOLXbAs+kk<+uclPVu?Qg}7N@PgbKj;2RL_9l*ycW_+pc_dNdl#;dH ztC6a{^?H#cSF?$8)v@w>2n$tCjnydQ=bt1)MVLx%Haf9n#?lBuNtX?)rue|d})Bm!`| z-OZ`2)LL5?v#@QP+=$8EmH6$N!EY3y)y<0QbA4#@0 zaI#0|={>38Q6&w&Er&KmtMa zq-|>zPN}NIBFMWb=%}>df+hmq3v4-U?qDY}#*-lZA_wosM4R$7m8Ay=NaKK*Ku)t# zyx6?#oV+v9ZN{^-F?yl^5L%P1?EsPG{m_mIw3^+rEM@zBvo7jDc8)DI%deIoXHSdf z4JbLPt?nF+#b;OPx)PfaT$?SnS?rY5-=kdg?U7{|WivW5S=RP83~JHr41L2UHCIF- z*y7MO1Nf~6-Lp3Rv1VX;*6e8d(L3)pg0AL6D8ZXLd0Rbv+$Fo?HWtrTk)6j*@60(6 z%!JJIDPGvQsd`nFGYZ}8*=v~|&w7r!%Tes8b;pq}3;~|SEvF+%ZAv(l9x~GnCXpAX zBW7oz%NBZ)wr8P`3t@a`r^r33F)y!moSsu38riK{QBhPQ*bGqyYI=ZXWwwPL0yMuD zaqi7z{oHN=0Z-u7)71kQ7sX-~3E&PbFDG|*Oz1!jW!pX7$KyqrTQP1g7k9#(0%|d< zYN!XZ4ncuF?>2|u+tU?b^r73R90ZTMD3rf~gJZElRN_g0G>CWP5md53oQW1M&tCTR z9k(PXx18S^dnbP_vMFhY40>j=XQ_(tLkThq!LW_14^3v_`$GhWW zML|9{X^CTwVfVK8yZ+I_`x*zsKY82Hn$( zP)cEsmyah!z{ewQZ))o{DHX-1hUX9K&k81N7LM#2c;XoA{s7oP_aEs+ajCaJ06 z%lDvL@R>*JBB$6ehrN-w=>XL>Jf7~44AZ>6bv|ycIXm-XclR}eMf`LN6w4494?qdU z82cioHM5mxJ0cbHhOlbc`2jDz_(zj(cK6BFKeiW+G+3fs5t@BeGSyRx5XUeds-oAt zz3mnDdU-fK{l1L|`UJdy2P-F!YYfHL3{d|a4VNnYY@(0L+rj7Y`NCs56oFo!kA(c5 zuB5`=6+wR6tHXk82{?`iSIoGr8;DV(DWp`bPkOz~_cEFPMUsH)L|*TmYdSq(Nj+IW zZ4*fUsFDt-xKFuc7Vs6w%$uZ>NPjusUF4_337|h);yd=CCJ3NEP)Wb5ka=4s^LYpT z_$%{MIsLj~>ZO@0c-hq3%8xpK>g6A}Xyo&S+Q_YJQ|(k$(5)<^Ur|ZFsE~PHF7dKz z3UKkvy*atBTl~IF;&qkE?IcyuO)8_GP)R?oka<`p^SnsnT}deY2X_!IlXz`a^8Z_Q zZY}ws+VQ+?>T$u$>-sCV^QVHodeFyB68(@$`a#9i-Ba1t@a-ax>v>M+llCKvfMsM)8{K;0Au2C6%g9<9fYvOu^j!IXxysml~ebo|26Xv3+>pKhR)aGiZ%=vPO z%Y`!c3a{bDiSxw+mo0nVl9SwJ5|`^lc5jx6{8X86`b5Rl@v>?4h7Wn!zeGTpqvaCE zcXjd+$R$oS`6&8umGq&Cse|PchYKgpFDis-7ntnc1}vTQp7XBt{8G}ArQm0{9TmP2%Z|tZv z6~yvHcm7|*(2caMBH@#Y+mO+H2m>J?ZMR;RGiEP$%r~oTXX*dr?5%?8h_-ND+}#Nf z+}(of!X>!7JHg!{Sa4Zra2D?F!QI{6-5m~l@0a^<&&#R$tE(Tns%KTt?$P5LWBxO7 zU1RTW5URfZS(bjLfgVkmg~n?Y^QL|WpWo}-cQ%uX|AxY|^Xcxaw~v!8POs~Sn`1sL zo=ty0uaB&=4$sn@MDJ$&7Udw$sw?3*iY#j%Ggir#EI2sfzDtM_dGR5oMmHpi97}n^ z;DR@=`3i2Zu^cq=84 zBBM^h5XJRx63C-G0fufVtPq)ua?@KU_Feyj=llu19D1|G=W^lR{5%7{l$xZv(zGL4vxl z76%XYRV9;|o5%Mg2zHWtniQ++p`kGFKLWuS<)@Ksl@TFekjsw}P|{$`AW0FTXF6_> zuPW-g4bBXTC0Ho3dbL+C-yYu>PggF#w#QN32TdLvh68_^f7)Y^DK>$KK=bC-Nt~X=b3u?^{cV zRd#Cd8Z2y@lvZk@9U;*s*t4jlFhEL;QP8OummULYA&29P)a>qgR3rPSI?qFWGrkF0 z46idYexli_MF2_J1)rit&A$TfPb7?~9bPGkdiW;IiApDiEM42t-Olx$qAGp8OhQ5b z2b{k`LIbbVM>qX{%1}p6Qw}d&)fRHBJkrW$;j}<@y7n`ti{ubrG{tS>&?yh zGkQXSuak$PtD_6*qKLY5b!bLqkh#5=u3yK=H=@`-qwY$9IH_bXVww_^O?+G-bSp-O z$F5B+*v9PbKO%aKaQ?1=p)g;SV$^L2pcEsM;DK=nBQpn#!Ex0crqF82#-+wD{x%g; zcci5F<6n*m{q1LH@Nql-)0h#5VK+%ZOI5#zUlMG{Nn(?$*UopVgF89e1qUxUtM=to za&2555k_}-x9Ml=Q4>31SeV%~#1)8E@$bpT(RL}%T=l=6ve54s+k|3t+kU-e1>+`* ztA~=Ec6&>C{XBkAO>CTy(Mp`(TIg(CjQ`E9X;f-~_}-Vr;xA`s5$D9ZjO+~K z6OzTc9{YtNzyb^_e2ANOYPD!6{!S>bQ!*b{r1@}fT$ z(uBZ-A!N|oD|!oKEWhfQnJH_MklE`<6!^;H!Wc8E>U0Cjk;qWpB-*&_j5nH~cY7>e za3-!*#Xe2Obi1{b*O5CsP;Ka|tS@;z@+`r_FM-X>Ck81DJyNh~uwuvpWEY8G#l7#w zTmR|W+GCh7Jo&m+!ARm9(XS<9Z|RMbmV2R#Bs^MjO7;;KDLXE>{weq;b6R#$^T<%H zn3_Tnz^Zd_T0OyGdpW#_kmdEFAIu~N&1tsb~ZoWYUm|&7ItKsEYP`scHJ3W zx|B|2t*Co%R@b>vT{aN}-KnKsL==7dMY?~`lY`RD`4C(Fp7O&POxi2WA?GRVm{M<8t4%jM# z<#sM#OuSL(O@oH=fz9*7RbaZw|8xCRK_bzrpL0ZAy{=jZa>($-`Zxgs8E*tKeBTVo zGmtJ6FiF5WhWEUYYL-|y>FT)iJIys15)MWhpB1j;qT1GY9Cey1RSn)6RzfJpe#*j} zgXJ9W_HQ=v`}xk%+pp`RH{?${u-qt%=aW+m22}B{29MvqD*O)mI6EQ1-4W=(iXsA| z24vFdgAiQ|J?()O4$UZ-$JCof% z<~40@&GtX8Zmq;dQui3B^(DnnY3~SypqhyPdMljFf{mKMVlqe!h(tr5-GA$hEXt5 zcrMJmr1}Q5^a2{NVKh!$)YJw9E><}FOE=BC1EeBnku)a>j6WS9Tb&FX|v;bxJquTqn zB?Z$t_31S*^a4%R-)dW9cSYs#ZK?;h`hS0815!k(Kd>^-W!6Ahvj9g>VVH}wctkvM z&7x!NV()D)kOMSg zfH`2VHp{6rq6H`0l2$GhB489$0&&#Vv^7P^=8vFC9I1yCwU^-?)94zt_T0aWLws1)xTT-mj~=_U;zq%PjxqNw6Q6GyXh_T(X%m&sm5olznUOd=UQq6!hSm=i*iR(sw^^0GIiaUDZ)^=_qWjRgx`uWX0 zmIxV`sg;ZI#te#UtiATbgmGc&PA?S z*7Jg#iC$lJwcz&kj#$nO@ua(!Rcy}jq$iVd&w9~7p04ij*rk)ityAq++h;H0~1G;Mw0xl(Xc z&At}u&N@`qOp5Wea-@df;^AtwH0tCd_hMUBcu7%)6O4rbRr-|vU6o=oh>5s|Lq?ZlP1)_9X@FQwMTf-cwh*;xFCaJ)@Ta2ABg%@4&m+!cVHfElz zh#BQh?=rM7B`Y!(l|~WrnZy6yN?jv^OHmw0Gd@69`CKOb#JOe+wSNggxrlhlc5JOL zT+U}QDvIU9lZCZH1Wi#X!4!Kpjc+x}575+?z@BQy96>oZ@7~8xP6I`oN-xoJeq(7o z!_wqmDH+o%x{8dU;YD~=Na4Tiufjn8`#UMgaDl(K_n(*iz36OH2be&j+HOk>ykO}9 zzD9Ht{#o{ibHkmfHUqgyZjS8gn$PLNJn-sBPR{IbpWdi4f`4zU^k>jT8p*-neTrl! zy2^RH{i_;O@o(q3+WqwOb%vpQ^$V8G(kE; z*)hXXY5v+bL75jz#`fl#J0^JGSo`}|9`!$7axmceovhzd$7=QX>IG6T-=HtOK3M9A zhjFRuK7!myl?v88Y=gZ||7dvzD0aQo0xm^_sT)1cPZPpNes)5VLC6Op;sSHXcJ8+L z^mn(sm($gs;n4cnCc3L|>PLlD>{BShSPtCezygKEOzl$&d5*QSP~ybEln^DUC70IF z1JO#fktIV?bOr?P@=5B2t}A8scP%2p;||v2%%JIuP+yav6kf6!Cb={>7Y0Lj#i>%N zz))co<8L1SWz1GK@64EmuI5Fj0BCP3i)^0e>y>Z0k4V6k&_7S%h< zJM6pt5Fe~0LeXb6u;|1M*GPbSRm7=6xTU_sCy06$kLb=Ns3pDq4Ei^We9Ji4#@GSf z%6h?ARDrF4^82J#j$>F+RgW4CoQMX4RbIYlDrcw`tovVrnOa^b2vS^0@geSR$xWwo zz5O{o<*3oFRjS+v28Psb+lprn)>k^j-~c^!`Ms0VK!bL>p@zK8bK&&+vff?;=_N1G zdZRfRrGYs$Vfxsf*yzkBU>UO`To|NX0~r>PX9R%7$xT2>EfD=}9a(A&k;D0!IbyEa zh^rlXy)(p+h7N#1vc_P+4#G1BLDLult&P>__a4@fMsY-A(}YZkeILGDIau&$s$(<} z#purt2eKJ@Qzn_Po;#eJKHlznu?0Q6u8a)?`MX+uq90@3CiQ=PPS^i8k!|;C`aF4G zwa~a>^}60Uc@tL85?J-G;2)esiJ1!94L)}t{%?QF&zS7pL*~f|{VYSP%e}kj`BC@F z2_Ztggp?WYAUEd5P0IiAGd>{-+_0nl{*0zySFgdN?lXK0LS4;XA15L0p7$cHVT&*t z(hi$?PPG0W?jaKov74FaolD;DC+Ek*rzw;A9sUvUo|5`&y^vA#l*MNWYE}5dJQi-Q z%L}A55M~Y2qmu1D=Zo$h$COo<6kW{V)r%PZzx#XjILiK*yH1xgrO%7k0VV5z-^Q2{ z=EZ9}r=@UEC*5dr0N_LjM~cE>5bC)BGB(R10VohYy=WwQJTgu7yd+cLfhce;!a0x- z_jcy6u)N$?(LLaU1(@jf(*3!N(tT22URA`2f=UUv6YTH$)XXP0MgA1%-8;}-D_8{0 zzlLH>ESk^~yn_7)#U}!|FgWt!XUI`TW^X9hcW-;xM84Fu?!DL0VcCNX_khHd zrcTHaBE^qcuzhQ_%Q&a7B))>Td4-+L2)MFJ89Iz^N-Oga(@(*$S(L;29tNECL%=?hT_NKf|e`1P^pyMNFyJQXs#Kcm3$G=3>hweR}79P9s z_sd%_4-JB6kFRg2s;#m0K_Kadk}bLbS(|ihn;stwo(bXjy~6T3(Q*9I92k?9l{JR- zT2YLEgo4u6JTMjYa0nOiB7}Ugd^{;ox#2JeHX@jWD<~Di5XMw-_?%f~^U+@CJjJf) z#*K&+JqnzSGJ+H{Ey)m$Gnz#nmTFcWpl-U}1B9o5p`F2}63)d+yOH2E=1Xomg%j@u zBh%^!fiuvRDb8X;O0yZ(8d-f)B!!B@gTjj}k%A)2v4R2q$VXo-Y1fmq1VWpVWGF7+ z=e5eI(Ey@F048t*sig392@EF5M)g{>_hh#~`- zr~y@p%8ov39}my%2&8wo1^rLe?qVlCjLncRxTMa#EX;;ul80&~63!`J$H=(?U?Q;L zNWi2bc83oe{Ifd)2E>EHu&4oN<_r+)^Ya?6YOX|5#NWtOBucr7-Pzq6(|r5$IXbt6 zk7{}9w-w{%XTOzXS)W$Yq1xH)9mUwwrkgaknnc^WA1#6MqfCjsLJLRu@WUmoe0l?` zZ3mUrv>qf{dB3epz>P?;%Z=aEZ%>Ig<{pFgh1b>N5%l_Ra2X%XXHvvOO6GR5!!@x)+~>Z_ z;b=LK1m5e0);pGVM;4Lc{LuiVWHwwaXCferRx^XZMpba0?=K?)1U@9O4GqUCH%TpH4X8-& z&un&mK0mFa5>HMlO!)J5c)m)%TKYU4@AN)1SLweOcX1I5(Jjg#WqC=(#460~nvDDS zJKsMHp2l8AJrY-BWW-k0CmKw2`oAB*LnK%98I}yKXF4h;OAkn|6Q-F-dz)Pg)qa@} zvFOZyM0%}qD0tO$`T@!x?@Kj|sYRlV5LtdNV)q*U+UyV%c)g0D(~JrAwWFY24M(DN z!h=kTg56+%(-m?JqWMdiw1}TcW|5PeVB$`@=@#Fa*UIJ*d={AJZWojCtI4z`Uuyw3 zsE3M1IIeCNa{1ek46D^yet~5IS;bg+?p?!W8+^u?#&YQQ z;`SGi9BO6T_u0h7rPO033cb1$43$F}Z{m43S5H}Edo?AAbi?qP`lXkDYT{$|jrB`2 z!C)mo=8&s9Kd=wYuTav8nQ_ zJuY%eFu#@Vc#{`Uby&aQ1E)!Cp=p~4tOsE|RQ$cweHFlgo+ZqB8=z9P-uW|QPm^OX zGb0uA;_Ktx|YN)k4JFQ5URpa6*$x6suz z_~xd}c2VQPNW2>9p65OJh7J{JQP|dXeEa@W! zM|a|19<2Y0WkQ9zb8IC|8>v-|>beKiNbR0(t!W((y#t^{-u9wocm7IhKFpjt!@EZG z)ige;K8PE95S?$hA&?GriA8q#%LfkM<${6$G?Z*Bb4Vs}Sn%368MhaPk%o1@5V6y5 z_qBSR;kuXA)0Kn48+9hv8)jg;5=il}dRaf^5>ysNPkWOHuTR5m;=9VwCPB>jcNpunK02+n~JXqn= zIQ`dQDbpgkMY(~mbC!)uL7Fw!rfyBo#815TJT4(ahjS*F@3#L!YB0}?3C6jB3rkm0 zy-Ss@dHdKuP*zwIu52st>jA~}Q6&s`1R&iU**guh9L;ok|5AIRcXWS$>MWPf zR1!ErB2LMLs4%NHK5uGKTmmx_)(S1ZN|^S&Hs{BT9Ct{1iHA11(I)Z{(_cKvX>Q@? zHK|)IG|&@A6RgTn801R^`PIh@IVKfWSyupA#|F_@G}G6Lp$f-sriCR59QGt+Q&#=s z61zn~&8|0}LcOeaLwwu=*!#2he$?!resBHU8q9ug+Xt^@)KaxA2*GyYhVoxkWidtc zGnY`I*85P(W$I?Y$z1RrTV$OLgFX-sz z%z70w$kWeZzJ}SITjNbOWN0q}RnZW!m0%Mrfd1wiVQ43n2X%j`h>;h-V=)cw;`H_+ zD!*>v|8#x+c9)&9-P>^2>yYV#=e3vx%E~fFWxm8o%>57)c)owwy{kfedi+ci6*`I? z{@j6YMSp!y9cReDQb{%aiB<6W#PFrRyLAP}Vs^2wrL>Vs?%Tu_&MJF^T9ErqK652Y%}f7gu@E`Iq%OP9JMJV|>ee2$W5jnFyq_n$nzww_qy*e<-d zRCd7AQM4DE*Y}aw(YEg?l0hFop|3{NyWMf7EKNZT;)yD#$MeqEX*BZtT9VGQx=uQq z7RQ|Bnzu9>jj+vdtco32TE^-+o34oZu<%7*T%biN)uu5{kmpsG=p|eXm73uLRNU^%s8q3kHG7>w|vi!?Va;|Y89c^kG-cC-1o4qG9f&ntPhv#(cig${a)^#-gf^R zzc#cie%0UpX}XMM-0k={PEoM<<K&F~@V&-(mMuJL8nKta)X*<+Z{4>mES2@xtQM`_?*Lo?$us=}!GszaS z_F6tnzS`W%Z<+=i9ay7?~&}K0swU! zxO8-E0)uR-To$DHT5bfMO>P{B>vuTLNKKX5yh?av)NOXBdm6tNsBC{s+p+#wpTly6 z!q(w*U4M}CHKoblmYPSBUsRpvycbF5{&IS`xO9kqdVw^y?hrs zq^Q@6m)=-D5_+x)G9z8bM;_1Rvc`F93TdgC${%g7aLM5Y!Ah3eX-UoMd2-K4riaOC z^p>}?_eGVn*6Wb{Jx6*8eJC+isx-^do?9YIP5q&~fJz0_SOLe)#`G=xE@P*H=gpMG z5>@)5{@Hdt+jd#i&}E=YtaGU_(SW)T*7ccZ@OF1G;_>;!aQfc|Y46vl-{n_vtntf_ zzvcP(V7;vC^L@7H^fue?*~Rx}w*RA3-Ce&pwKhey_tRAQ_0}m0nH@fE0y11|ScE&b`oRL5SN@_*PRZ zwa$7O%XWuTa9X8SL!jMK#oM)ba_`6!(O*a0kzo?)7n+r)D>`nKHth80OP*zJ zr$0?GDddfsaWu>dmEbyhB$ zv3ksdrs6H?)E5jQ4l7*>pRtw23^F*uVCFRA1@J-kTVXUrx(2ePrq(N#VxMyy^Bhse zM)uH!$eekv6FW48o$h`#>%Dv-VKE}0T_#Eo&VOUEJ*uM4Nes2{8(@BPg>@VfKY{rz z?BS=dk*u7vM;JeXl5}KrR4g#avdzw^KH_)~Lk@|ZH74$=H5`mbD3Uz)M;zGII>s_1$W;C@f_m4^#&8FRPkm=Fk<@9X$;i7+}28u35+IUh619N9uY!YeN z=5uu;-c>&uk>q}ez<+zSl6VmFcheYa7L;N|7jBA@Z23DGghn~_0O|7p)LtW$JI#_r zy_0GB+!Bune(4l&4YHI7Qw-V8cQH%_dYrfWt()=jJOAzaXke8OV@twvP0a{7R7dUY zTu3R5zE#1bT5!DKKyoHt=exz~A}}3hXeamQQ961~4UoU~Pwg1as~39K2|DmQk=&M@ z=isyvOZvd;k!4*R$p2B36myF+J2ZM>6eI;O8H^8QYy?C001W}eS^0j8 z_d%!p_R&t`>71KSV0`mZb9YP8956{-`P<_$<$3riV+C^#Htmf8fSt5ETI*Lz0B4r@ zN2tKV=(t3@Biv>g<-NbjB4usNShgaP~~L*PTQ39seeQKuQsU~PzdYX2E)263599~CA&B*^^h_Nh znnb(`y#N~eV5Mg-qv%K-R&Ia^MaGR+CUQj`&ua0Awm{!#49FL=(8RvIDVU-UTa$11 zbtu(t;wk=w;K;ApwW>lJh{72@7GFy9O__f^DBWCiHeT|Fi$sjYDfyAxG*|_qGaxkC z#dCbYuZmx zP{7mY*^d%twZ&$%wseS~#Rie{Q^1p5OPK>eB!H27F=R>u>B${;AJ}?ut*N?p;RABO zvN_+=5br-nC)p^=AQ7g&pg}{`LCtU)EPs*cHq>0dPl!L@Y=no&PrDyG{7Wyu$+u9VjG`8*EL*{zr$-svtOH_x5qoR)D^hB;O9) z)EON6kL@X3alxD0cm;aiU*P6JeO$e|+bz161CQjB`r%-rUHnt)^ zu~oFPGY^up(lfK(-`<}y7KQw(2&(-3?t@*OpC8>1vnx0JTic)a=TA`&FrgqcBf1;M zYD#EQwXIIs2R+9r37CSdilr*deQOyqBsfpHHZ;CW#i@*aO*lqrpNg#+m<2@gEP#ALd8J~B3Wn!a53wRWZnSZBQ>x$ z?gsWJQ!B~?C7yC|ITPUW6u9cG303Q=-moY0MPt0pce~{60Tx*sAUNBh{Ak!RI^6NTx8ZklYBu~Zkm$WT+;P3P z;o0K;+qBI@i*=%GVNF~QA*pKN8|!CwCYXu? zv8^Cfh9zi{FtA8c$(lron!swc3Aj=6Y0cKkA_YeA@E3|j@S96VVmS0{Te;?4YEJYT zmmYC1H#@#p7Y;sNIdBAp^4*y3(WMKBrI((P)1c;>(@D9-=V@2+v1KF{{DQ7YbYcn} z)(Zfk!~Z3eaGzdMc=Jirk#X+HnV)~aEqFzop&kjf#^#B;oIUVg0HGPerE&Tw|f+QTT@(|7hNGtTSA zUXrM}^|?>wZX})OG_(-3Ko>6IY^!JEn%t-$k81dt5YmvQo zwZx|VbYc|vfIg(|c>3zIJpZKUWe*DIx$^xBL|s$e_cVMX$#8F3Sofh{ehllX}T z#MYi)5>LYKgwsWZ#ys4^SJ#KE7w{WWHp4#& zM?xuLTd%Y0&v0<+2efP17`r~azDti-a+iOry08~9xd_~hkA}sUyMzG=&W(-q*wHth zZAtYTHJPe$&LPaLJj&zZs|1rR)*-D2Rf6YQ4gL6*4j5F?JHqRYuhan^(3ILV=my)P zx|a#$MM<36VVKQXsZ5Y>n&EQpDY(g|vXKC%6C%0*9no@(rk+c#iM6$MZRX#`du;tb zo4P(vT|NiNFrnG? zluH1;0Y8W0&+^NOB_JWV?*~c8%;6IbXs!i7#>I_X#oS`{NETmy^H-uvWJm~=8)jwQ zQyt_2QAMKv7zPz{PKUD))q2G(i}@N0c^j?i8!cJ@@@jWRb=y5SS6M5sA1`z5FVF9& z78VPuWyE6&#G3{kEl(b|xBahNLIgsYUpe&C#v?te#|`PTxJs-)_iM31$NTpBbI~p8 zz@|{9|L1O-`&Sn2_jy6P<5JO=<0=KB3HI1VcW~T8(G?oU*vvu~KOEk_?k91@5Smb~ z75tM`uH{HRQ%RFhNu#DVhXU_Cs2CISWRG@ITHLHxP(m2f`NbzOF&yb!A`W+`A|Wgw z-W6ZIhwgS02no+1rw_C=DAy4<54KiVQfLVo$ft;v33zZ4p#FU4K-mf+H1@w;PdSi^ zhlc3-Sz*SHgh-VZ^$a#s^QuN%tj*IpJ(FPfhd)?4A2c7Q3ed2|rA?PxgQax-lPvH% zV)hZh{Oyg=!)kIs3&NigMtn9UGS9lytQ4S@sAeLyvC+k_@bIF>HJ8r~%)?K&r?2I5 zA{CVqzpR)o(*6U!Z?F@h~LyxZ>)a8Y7FksudkA zJTF`+M52;w;7~PH(^#06Q#-woViaF|09n&&dlN&Md})*fkAAl;o!qs;qq^WNJw#t^ zDBTZAX7ip+0-qLWROuPqOLs1%Xkk)ak~2}t%-MhDL(xL6vB=p=SQ1I}(W za&o#_ci$a)0HiW>zFuqvFr@|i2mXQcVW39|#2pvi=H1^iken$!G~nr@wmD>eJuLGF zv0Ufcpk~6$)h5|)(-3BE8N5Sh!n9cidkh@$K5GE?Pr7PLX#JI3)PSy|wMe(jwZ@j9 zH(Zj-ylb^dhH=9iT+h?S(!a04{45Vbc@+2gS8!wVka&a73f9s-TV$n^6qg%gqQ(da z5Su>@Ye{&NekI_O(NhVeimA9jeG7L2j-lz8u*A%Y07*DfdpH2np65hQDE2g5w`sjd zR94wR>4h{#SwzD1+$@Md%v~}}S;hG;Z0cvBA=FP(s zde(|H2fmN5yYiR9(#_uCw3pV-L@h$pqV|fs!(BU(0&jp8zBRxkTvw$|qVX76VDyVz%?k7{Fs`es&3_*W z{k<1&3|L->-%dNR_t)BvipAJ@#h9l> z<}JrmHm6^RswEQXspkrEM4{L<#a=i%pyJXJXiz&TMJDjbED$Z{nZGV!aLK@Q?p`6N z@rp1o8WCY42oAlVX@O|@Vh(xJA@v4tu(;V&2OHJ&93?@O#aWy|K;t8n+Uudw#&b)6 zZ?Si2sk@C|g&I=u66$m-xx7t7><#Ph6~_SDdNl``-qL&QK#rrEp(zR8db@Cm+TRkb z6&|IBrBbf($46Oo^i$Q6z;Xg0=p-F7Y)D;h@jGv&9S{AN8}XTh)sLTwFQ+ddTvaV0 zcQ{jR7@O@9xE}i^KQHNh(@^WkV;OoEY*&-RhS*FOIk1SVdgDuk=bibFxTPdwPFl0f zP6ia61r!?e0AJR2=}x=g8aAD$io{XDL!lz95;Tx3P}78z5tn3SIZ7C@{GZ@r-=Fu# zgTN5UcOu24fKs8cH)p1c6cV z=wgZT3ETGGRJ}v~6Ks|gb1O4e!h+VcJW0GHHri?4bU++Hnu$@(SAtIZOVPxd_*JWD4U3a>yEn4j?Mu$tMNO5~kfjUj$#yWKA`= z{?3HzMhZNPGA4q+Yu%zlfDj_|57$erag8w2tJ~1cmoU8SRl&+Znis*^qODe8!@@(l z8Z=7Us@N@hA{Zq8RUroDD0Wxn`S^#mvYz8Nsv%Af&mCm@y%gj2Bd_6%78?j`$RN42 zXHNZOfMu9l1iZg0Q(Jc$zh4-G<55Kjp}UV-@R{VQ$WOxjub+qPX7=u)q%a@%m8>Kz zWobXWk|5JaA;O4(-=<8$a-bv%y+bs_o~aUqA)44DE$Kfv5F*-Z-|9Evt(UB@1W^YU zUutjgH!DI)e5ATeb4(|M&QAvkzFtz|!0*rNe1^!*WMf~o2?W5Sr&nt4b{NA3j9889 zKZN*-H84o3T^DJ)H?3l?v)1}h;sXj8Q}i$na&LsK<0f1}?awXzX1O<7xi`bnVlEkd-hN@HqesC#&23v@l=xLMmb)t9Q9Cur1rJ#Z?EIG5KDT^WKif91CbErxP z7u0a5E;Xb_BZF!pY=|ljU$D}_`Ig;4{ymsMXU}%pd~0Uxz88YzSqnzGk<^2L@Es_6CAR%*m#z?H^~Wn%Et{VdjlLbCDGPr7860!L4xSfv3>YIN;OQ%>wa1RouwXTC^l6M$Lsa8`v>ER{h`>5v4EfEwE zb^33uGSluzqFH0??jBq!NT=|CK&WGibZDk(^qkB9Z?L7W9Y$Czd$b2k(OQ{`La|ek z*S>{0vK#4gk*lfM*20Y`4>)Fel0>nI8nObq@vwy`+wTy;Xi0?jvCvwgPQnwwhNd`B z3`1{pqV=oz`_M9>>No(yYFLU3;!p1*sCq(#O(;Ib0BYikMbqDfshk#NER@YI0R}o* zWM%HU)XWfY{09BZj=@cA#T5-Ud!_6+?c`=2XXmX_*!jv~4M_cE`1l{7pHxpOB@iI` zkevmD2uv{4Y|$~6Bb<2(_9Qz}HffYAwf9(!AC0^f+?{u_Aw9=PD% z%jjLC_;|8xrE060>vaC|Cv_Qyr2WLMqniLR-Wc{&nMB-Id)8mU5mGGI*cNp8sj{#WUhZ!@)3jupU!47h~{q=@jNDQ|H+Ea|e63$C#trk&P zH3)j)3?M^^x%C3?RBH$>wUhzRH^72zI`)^?oaQ6JK^lU{zN(2NmdSd3yF!L78God0b#c z+|Uc!DN2b(k!l#87);%UWhRDT-&glV?z1x(3X+eK=q|;#<-kqhefK$qOPTn03ppp0 zGj!1Nxqp3sU-YO^Bx%?h7cT3W)LhA5gPw?5T?WOBRfehhRvfvOtIl_yd|o zEG@|Y?f8mC)%+L?wiJ$&ki&Nmh#Hh9+za-+{qnthz8*hajU7BB)+Y|s2XI-*kHOS$ z|Ge^J8sZ3p%AY+FY!8b-jA5R1Fq8Y+BHgz>CLtZpmh|v$xh3&aX6<|yJer-Vg(Vmx z%H;c&4arz(pG9&Ay=**|WaVC%ev+J(*4k(+9w!@mdll}bg2ARfVVC##W9ni4zYbCT zn!}+CS+cHe-zijb+-)Up?yb6!--vXKox!Xn3O3GdC~xBFJ(|W&VSNue6*RtoaTEW+ zV}I`S#bOBQfKdm~Vs|5&iG(UB*EZXga{T-Y?_`nMba?;Mp#gCQ$^*tS)E@p(+zBIl zC_+~=X9T|SP?pRRC3(v$?sKfW=arAYB>}OQRVGi14m-SFL=x3Q^gT*Zr#4h2$t=}< zo4FZhe-`SuZePsISLxf8-DOMX{OYD&V0?=D|)IW=X`1b2Wj$WMu#){WxVK8Ov z?#TQ$YV}L-P5OrOqIxpYUmZYTy0sBZyMG+HjD$k@gex;Erh@`=<#TfZ^UWy6L}{3P zQel*7AgyiyRG|`!B#B%wO>0JfKzfVu019I3)}T+BQE?qNW%E=b0`q(3%QPU2Nqz>Q zZrfDZS>c$qBtXCVIx$6J7eGcX{9F#cTLZUZ)*(wCO@;V3`!1FL^YW8w=ygyii<$J> zPb^-Vi5c)JYF7OT)WIi{@Q4UuN#zJ^LjL^27~+^h+n}e@UPv!~-P!CzKaUh3?if50 zYZ;p?`nKiOw>@ANwNh$sSo!6@=IX3ybFGuM7P!avFm`@+Gd1jWXKGPSegb=pe%q*A zdh25Zn6%wR?AzfK)d)wuftcb*i*3gjQt@GQmN8QQYhR3U1ZEUS`5*9__X6E5gtn;9c+N)78zOi;e6&uRMLUzb2(IJSmtlcoW_`aXsF@C z&@0U#gm9v5yf$1g5LoCx)OQBvzjBDjA@Pe$q8Bw$K-3@@-}i_$1ggB7G> z8{~`BT(<0`Qx^1phlJiC-R5V)!Mk2Vwu9Y-l#uU0 z7{9sj#k-3r3iyxLKbF8a>79Sf&Pz#sxObu5Kb3$^yYvL;#~5oS8?dq($vS}$(@xpm zT+}HY!J^z9JS`00xNpIre*Lm%(n9o;iDjy+BiV!ZC*JyOnV8%JtnA~NW9k=`9E-%R zuNY;eeU7-Mc<9oojN`h}jbzNX70wjj;}^5XUVDK%Rp&gX#Zsh2;9|+I3{W7fB>_y; z5i-AV_Soz21Q`1DJrP5|!xYg3{IS^+%gy)>E^cmMlJv9}SJ6I*#g=aN3>)0>m_s~< z;leJh7>Pb$5LxyU_l2P1-Y0{T`Qhz0zx;vl#jmBRZf&%;arb@$>CHyxYVl4^)4Qdv zuE4XVh-`|8*%ijSYid#JXeZ~~BaJI?qo1sb$vnBk{~^k{s0c2U_KKaQ+lMW+2iBiA z!?--^lH9wZ$+i^fp1qcS=74Cv(^2kuE5NC|+LTNMM__2J=WDwW zpRf~m0pefLQXVQe5}opaU^vzPv|IQcvY)goc`5}d;K=|iEF2KS+M8C+^8V*gRJUT(ziECA`d*MHo0PilI- z{T~2lK$yQwbUdHmz#y=pb9WP+N8|K;_&Q0V#tC$gHw%Kr6JbwqC#_!A&WozNEXY2bOs#d;xnlQ zlRM;Md6%I;L9-tklqpYC {<5r4Lu<}L_=#^{fI3T^IxAYSPgli@8rC*-i&jskuc*dCf6LOhwBTPen z!uetDsX#Trg2dy8X@;N+B2Q=sm;M}+Cdh2`@eDJQ3p_$D+j`t!Bc)R(9;QUdDsV5b zuC9lYHzPaMn5hA0s>D-}%o0ESN+)V6j?}i7eEEGIhD>g`aR-Z?#xXsrv4zZl2@~(t zTp`ibw^K0sSs+{tc!m4>-+vqkt+q0&tV|bfwJ5qByUO6Sv#Z?Pt2?{OhoD4GbBnsA zw3OSfZ^^Ib=5o!nl(+Ke{Axb9%NW-DwmjlqJ}}IUs=(BD-QXT3NF2{M{sVH~;V+1M zs^Ll2cI468v<#;)Spt#g--%!DhAF+@kD-IO(K4K6QSM#9AX8glazR+IjfFXx2on_9rx-r|&6+OS%B{bOn)D-UukaDc$F+2Up5t2Vi{~kdiJ9|Z2_1}MG|K?79AYLF zQ{FlXU1^rGQ_-uAEu$zBph2E(nEH+|)WV+pQ;hmlTvq(T`|A`{_)$_mI{2m|MpQ>2 z9Q)xzOVKPyCFl@ycf5gme{kVv$6^x~irIh?>#{C{?im+jQqcy91X&tUX+r>*+m-dm zM6oG&_N;O;PNFm`PDSyAAzzA3N>P6srNnoLAXUCI=jSD{G8XtB>U2fUTZx%7_JhcQ zLBX?Bk&0n9DUiYd3T_mCD&&s>vrCvw`k)(1AlJkXO7Eyfl$;eV=3X&_Cq%RY|NRmu zeMOh#8YF5Teo4H+OCJTLRIMd`XqA*v^z_SBg~d|9%~YUJ1HaCY34`1XvLL=x*r}WI z>*{jpgI7^DVb+(#$Q6@Ey0Y*L#7RUfl3{sv=zL^BDo}&mwv#U3(yEcNAQdp;?la8x znn)3ln1khaAmua7K}kll#uP*b5HGG1lw_s5tn%{D?Z=xIah2VS@mfhUJi<#D;SbE( zjd>NpP$Vn34~QCv;bV?skKs(CS(xEN_QUln;38_lzZF+4U|Z*`X$!54b+?{A7IKx= z8!^m{iaYTALfK6je+uGT5D^cYcFsTdjK#~#$?Zm0aQ``iP5ggeoBBFc9OTMXOV0mb zm2+LWZWE_K0OZAh3o{6KIKc`%&Rqp?JzTKFZg^321Z{(O7+0>pFY1whj{Tb%mI3wGAMD0bTma!wKddA!!h zmA`N?63<16ie&j_n;JKeA<`FN=s)>EK)4g9aVp7SI2XA$YYzVtQ5j?r zJ*TJvLln%Whzo1wyJbGWqQ}7J!GB?NZX@qDo1j}-{l7oIU`3e~KQ8&L^esC*Q?Vs` zmX&u2eg6()L>nZ?QJ)m>3@{VR`aOg1iC_zTKdFvfVhJk8=$Vn0LYyK>KegWJ?2&cY-IWijG0}m$gFH8l(T&hO659yaT z*PmaMY*2C#C~43iuzuCy;XR#Ai0?{}A_{Ws&rt|c+AG?rdi_~QRJX_l&jmCN$rElwb_%F=yTs2C&0(i1+JdN)oZ7v)>1P{P~Hw2Vz3omUqn|33zFE#)|c zF(@#UD26Hbb&)U@DOHWbylY3`3PJZ%;%DeRW?hT!-%JpIlsHCSjw9~{K6p@CTqU%Q zP3r#>9f8qk^u3=0r%Hv02r+a;Vj@f3Rz9A9SsaDnGYPIT3z-kYXGXYi!K&Z?NiLW0 z!-ua7JQ)+1V16aLM<@g^5Y6%rgi&5+kn@ox?YVw(xZGY5qu?HuS)N>gqlX{Iyh`;4 zv~q(&W{O;YMzohb8Y!b!oMsSY)7VSF^Q+@`k`0|ZJWsh}%pu<~3}|jmN2izr#xsrU zrum%@JCn$Fva4vrWl}>frLO&dBKq+aY5gM|vCqImBq=KKT*m8&jmHZ@p&S_Uv$MFW z^Z!Zr-;{s@tT${5iZ#ZfK7nUIp)2hVu{7o|38Hbj;o6wPWPq#hSH}~t4odXUG>%9F zd^R>qXBwB@aGJAe{1r|xo83R(nF2tzb?A3i#!eti`Lf&s63vxtfI1d9B^D)I5mFxG zJmyZDY)*z_4auC}<=2-iH9`FyS1#4~bXdS#HMH#lraj*MGUjmii}`n3%*+d_Si`NF zW>Qd^@}PZ7mYtwk`~$1{g#JFB!ta!*si;bh&csIsGDZ&3@@%1t;IxJ69Oy6Hfzmxn zt{pzgUjeS^q6!LKm4#1K3qM^*JV;8*y5iSXU6vLv%Wq3pt*_E8Q{6gJP@xrQP$fKG zA;mP2`t-vE>sAp!=nuSpAA9*W&N#bTUp?I{@KU$AriE8eG;6)%ELWlKXSj_(xdnmB zjUmYxO+~$|FrFpSVOdrqtz)xAZ(r+^Mcxb8iM^AEksllN3%o9<1|AQ%6NPD(K%WEzUh5E}@yz^iETK8Q zh9AH*^~WIzdxGWO!LyL0*`dy4hX?rAb;-3%Sa&Ia9Vg_?O@g5- z!7%eB{^sz2|J8tG7R6BzjThH3-jXLC4M-jU+yO;{1B!v^HYz68moLKSK`IA{THRw z|6K{~laWElqJVjvq&t{10+Y;70hf$H-bf|9D(26R10SX+H+*4S8w#_;r*8)+a|YC& z4UbkFW3qpC$qgZCAs%sWCy~~m>q-m(DT~M&M42NI93)Kf$e$9Vm=6vQgns1n>c>J9 zQ>CxSGNl4Jrj(LNpvO(xoM_tP@9yvK`=$5gbOGE|nO|F_U_i4+q%8ru`Ukmp^U(o# z20kG$OJ^j+euA86Iz^#NY!8Gm5k+JVR+AcDM<76O&fFYGya2r99Y30-7_u{oe8Ex( zpCNr3WdH_g1pE-61;oQ+f(d>~ZHZEl%t94!sN|;M-!1zwMKdO?XD=x$DHUBcRK&JY~woDaq+H{N5+=Zs;ru zMU_fHLw@HMk8K z$BR6tW|ROiA7!4fi4_!mahB&TrRCbaMOlM|>`5;UToh(Lq!v^xjwILX;Kr^?4)tW$ zN$@a-ff-q*gW@5Isa`vpjk)bI=M{4`3&_hBhDvvS5M1B;nKKbCi_im!ukNxKqv`G0 z(RDaC3YFD?t}q#;`o`pjxYHOA!P@sL$LPlE%g3kw&QfBiEnB zAxM1}IZ#N8A!xOTL{L&^F-Z*fissbuXa=6#*oa`v#Jzb*3BjX2f6WM&>=6NYCK@E7 za9*fL>UmB;&8n~nXzvol>xQ39EFvr1&i62t)@bQBevljV*Y7kNFEKXK0+%i_=5dJs z>thty*DxY7YN_p=t5VljrqjAxzSs2zwqM%uRk+7#hi&Lg}FkCE&JS@V`)t-+*Cd8bsn@|g({-Y9&(%1=& zvb14@|0_~^ag7v~*nGV7xV}juS`ix2-Srci20}0u3nJ!2pG6=}Xd|V`;D8(wW0-b~ zBp=JwGm->nIen2p7=;2As3IVI=`nNKL4Tg&7JDrLJeZgR2>KJ4<@1V}2YmidP*_Ge z!~25)W0`q~*(f!!gmKIR(9&(e9WgQ4iQyzq(CH^>CaftzA4gy_yiWau25A$SB5E=o zENJXwPB9?(-p_=jcbKqau7eoXl6+H%KZh9t*Vk_`-B`&!js2{|I$gngQkTQwFaWcB zC(?P&@Q^C6V2Vs#LLnYOw_3YTW5L@I$v43F8D<)Zc`T9bSethUOX+tg#p}qyEF2FP zBD79htK#sQ8@e*RAls1mO>=K(WMRtFqlcKJ#qqh?H>P=6a~h1mXWzX|QuvwE;u1>N zEW-t7`YKL%A~`GqR}^;C)dQlx@<` zwhqEPdchhCq0p?iIZ=ak+^8#_Srs2#z_RMlsp~KEsBQ3*#kHG!UI{^6*X6a<>6LqP zuE&$*iSi4Etl-IlXiU{U>BNuo@B%?}=dZ!2E$5eb`^&hc9LKJ#66nq;<**ysqz$>E z9OyX#oG2tg z$-SRV2+wgDxjWk%9EW9lBggYG#E2aDE;mOGbfe9Y*M3|b!?R}xEIMvlT)olYz{K|k zGi9_%jDbf~xM9YFy0|DtA!gZplwwdUS3!{xKQFMT+T9+D?Mp zw8z)HQ_l24VhF*Irg5gko~)}d$`EtO{BU)C&608oCjy>=(^q)$&XPd5aJxdTpRV7n z1Xt_UBU1EfJ2l1Y+O^m37OU8;W32E~b?q;I@`nxQprqCr|Aw?#hT%g8OV3HP%& z=-P%X%d)BK5qtN*H+Y5YaeRaw?8%QDQr$f~Aj=3jvPxLv2u3=8akk+*KE+POc- z^X1Fny8}YG^Uw!GkYKl!b}&P6;HXicS#pn4Fa(TE&ch#~A$!gg&Oa8PIW69`Bwsbwhf`@*M(D!a9!A!CYZCP8i!S zUt0QK7%pLPij4vQ0`5%{MMoC=E7vWEV@&{*Qi!)e5y}Xl6b3-dH{J%IC?f#S7yy(d zz9SBE^P*dx!kiC>#8fR;?1Gy!*X(B@>awhn@hpEs8#tb$1dfr=$coWjg%R!&3SIH% z(jG2JzP@26r-fh87X9piSE;M~hr}oi|NHkQx?j<=^8ANEu+CZE^sG4lWkZ$A=f7gf z#{T?&l82oCEO~O4EaHft_4Om0rS-$&I+0WpL_~BfPZD80pjW7QVmcdQcARN1Sa<`M z%j~VkKMVr#_#b=+zNe9%xyl`et|(%#NYvjAM4q8?ev#y-?7(V(o1iIE_;WU9DKsox zUW*X_$fRZE{?DBlHm3qB_P?SkT800YRYTeD|EGA!{=XtSxe~lB-wZs=6t@In**)7f zaK2#LwlNJ(E<~||LK~%>m%wn0z&E(U3-C?hPIL4!XA+8+W#*(7d3a$s9yS|g*Swn2&;sV+!Kj&(gWWt<;w)N><>sf{}j(k z`k#lVdo=p5s-|3{|CYR`|4;EO)&F3kR@ML!1u0n(*SW)6gVu-L@2sQt$=6x0QMtm@ z6jVi#W6-QZ>7>5dLbt*z5ZhnjAmVOaEC6GPR%X%9a2mA3%4wr`Ip4y73Pt+d$)*v_ zWk`ylF$Fx@@f5J+%B2L+P;_toG>ei23%MbP@Ire{Whvl1As0b{H>H~F>Ly3yn>0&chQcZKKz>@@+& zYlwG?Fm%E55DD-KAcwUtQ4sjy_(SZ{&%&U2&=0_KvQa$HyNEIX!JIg|<<&_haJ-3x z4fOm!(!*ZS#9?imL0+G(QhMw1<%@t;hvk@vh=ZzHf{X$Bby-iJM+xYsvt*1we-^?y z^aE%IC?A4S14j)kg;1$ze+nNy6z}QeFX1D~5GghytZV$H1C)mAuwu0L%;=sO{WoGp zSMq<{2z-k>z?J-;R=fYROl{BqJ;g(m+oJyejQJKU)&7GvCXTI^<*NT8ab-u%KlgVK z^#1%+MeEO3Ym3gGeHJwS98QzI-{ldO>Y9AYHbhwkWJ#IN*axDQe_kas98s2LvIo97 zJY1&zFJrz^_b+Xx{LiPa++J73e^DKjTV~UV$>_ri@J$v7Q&1hktWM&65A^f&SK>$3 zuhJFD(M#|ga7OGu=F)%6d!UyEv{Np60OfJ6t({fZGEHsPnk20*gSZl-3g1(k!D0-X z7Q-^kS6>04BzqeLE=qbrJB`CuT?i=2`qYn3xch1B(lREj`F`kt(W-2ggtZWC)%39} z7TXFsRcyb4^nAl;$5~FLu!MmJW&`phtw*1Vsi`4B_juWCk?--^jwiqplwzUi=q2d& zy5L@Kvw}S#dJ~xbh!#b~9v{NPqIY~UD!pR}y{yoyl|A7%r>uU-a5IN_hZbo=7yiXO zY3snt0RCM~#8&cu%yZ{53Vdg=85g*m|5IdB(JT5tMKSd~|MwIR(f_@w>G&?hSRc%) z2Dec3t*2Au;$GQg`iRv$$4&(;#?) zexAuaCj^J!Ipvb@@Eq1U8YPX@`oh*HAliz&eu(jcAlkyJI7lYHIwLhW`AG7iUyh6@ zYc!}~bE3B#N&`hyQ~`E<=vSd94nz${;bT`sMR@CDyTQ^CPmfNEMyOCTPdV?i5q9yGW<+f=~$lcTf%UdiJUD{>|OuJ!e6&Y$v+Jfp~^`f0DoZ9-WVV&5} zXd+c?b^Dej+#(EGv8rDhl`q0- zoquY6a5euocOE(ZhoZ_>)&5VB_x}G+^3?qQFN^T(EE_0EFSltl0CEa78w193XQcrk zw-~$pcp{qDgDj4Kb0l* zAM;sB|1krwmVi_b_ z0g>-;mXR=(#Ir@P2BIcJEd9Y%6riujagZQhb{YJ#g~MQ53v2uP)u?qHCdmwnKa)TB z6ZxdLceTX7*yBPcH9=(Xq-3J^?D|AN1+u^w%M%W*BrG>og-%E|okEQeQ~ z|5Q-kiUU}2{>z4JR?mOKvi9fyQ#|baN8q|4hdn#Q+mC9lMQJ#UbDB*7|2}k@dP~2L z;jc4PKfsul2$Lw168e;(w`|-0*~FI)`=8L=NA&+xb-Bj>Tl#+gKgmr~jXZEOc|BmOH23`D_tI%;v94N_%e?)r`I21a?6+hsR-OG; zEXJC%Uyj2g`T7Z{*P2}B>c{Jeu6~sv{rz11@*eCx{Wf{Jp8t@_T^q3htN4GbdjF#; znzoPs^(2qL|BLeV+HyeIl%TG=E0^d~h%4lVl8T^Fe&DBb?dYrt5{GS=gxlv@X;3Cq z8mZ}Q8g)IL0&neD09n2N3$ukyWq=j?U)NNnYX4^%d;i}jc{Ygucg^lKt4%aA@~>gbry+XK#R0(CD0^GZz-!g!77UqI4*GRr~W@n?TtpG@BLm=D@|sY6dF|z z^}ut`WRrv^vNsMQ8wNe_P0f<^&!UR|U7l6^Ked$~2)+}8Tfr5glSHtJ|5uf2{tsQz z_WnOl@=*Stv;JAcv$|EBWuowar+wpFcmVv6g#|)|7QZF^+t{C@aCPptn%7K&6;QiB z4%hV!z5~Z`jOhUtKZ>3dS>KroAG$7KL11vgKjq;bzpyM(tVTm#*ebsLyfi(%yd;{E zBeLX%BET%^H*7_;-M2jEMf?fJDtt*lK(qhTTFNUa`q9;Ma{tn|dJ3DXT}1bUv5#S9$taiM2XF?b@#Mc*-ra$UrZj zLeWr}Im6tcMShvWR&EdUvSfyOpf`5u$n+v!x3=WqK znOoljT$?Wp)6(75c8k$`p|%oE%YZGvyy{hHLIZ$J@2fiAR@Gabg^lg5Hyb=4Mc3JA z3n2NWF}&?cIBkQuG~8@$HW-A#ciHnYjR2SE!bQ#SZuE!C= zsEW;W(eO$Yke9fjE^Ctde2X6ljv_oJTim_?-%O%36JrN6==gQoddK&iN))7WKZe;P z1@fV=I@xNaeaXk8hw_*26 zfmQZDmQ}I;Q#H%l^Z!rsk=C!E`DgQ-;CR$h$ z)J3Jjj2@Gs<hYjW33-HaH3}n6UcMTn$i=Av%4Y6P@9FnjKL9x{FIa^vW>v9bQ zwK$2g$ccg@aC35b0F!Ylu9J4qxFor}qOrD`yCi|0BoWR4|G5>aJ=Rhy02WsF)K5em z-=J6W2&pk=f-08^Detgc!?ey>;!lYZPy9sfZUtN0e#1P{uubjAj{U3<!+CbTaVW+a!fl4?eT$XZG&P5+9p7Ho2;ncyow) z+cnLWDc7~h`M<79z>4!5yh_FijI)0i zx#$R}hKUb>3{BbDCV@M&$oW;O-i(`A*u7TokM?w=|2*>D`pUl!^xxEL{J*a3?f;+T z$?1O{NO4=`UmjMmQT4~aHYxu2w-su?a)Fq3s8L=5vE7=(^lW zN&*+JZ*GrI-<@3?tf3zif>HhvwS)QU*_Cck9FND>4B`b0LzhOV7}$O|NGIfP$szxw z0YWkGL(dQWY_S^Y9V=-b@mZVx=Y8z%46=g$%a&2s|5$tfk0*KB?7zggx=(5RRfO1W zH~p#w?rk>w%DeC=R$ooW+#}n36=Sp1;%hBtyyO1oL755v$3ma(jQ`X1s{fa!8T5X`!L12+W)Z&lfz5Qy(!yt$v2#2YN>Y}eA*@^*977jPOJ zfq&5(9U{1M4seoX@ohk?{%&J(n>dn(GW$4AVyFC(ej&WB=nvxg0ivB8WYc(%et{P4PW5o7)&BLO-y>VLjI{aT`-{!N_uedg3 zF!P-rdM9D>M!!6Ztv{B70k1>nY-+QHB5Z49%??Jbiv@DCy|w73xbo2f81 zq5nIU|5ddv|7+Hs{y)i6r~li^|Kd?lm;ZB0+#vt+Z!6^gaQO` z5rz7EN$g6f7suoAh58j%H#st$ZEoms)yF6E%K^%qf-07{f?mzAg?EM*V~}d*BJD8C zh9mV)34-qXFjyRsOm$mZ=5(;dSvtRe9R0_?`?L1>pU?5m^goKFRpb9?>OTJ8(>!hZ zA2H?AQ|f<;>`!ZmkIniYQKH?w{-=q}d1U=hF*a*^{N-YKyRTnSq*I@ZlvTBkGBBl% z7O&TK_N!_pw)gtW`!RnkSHH?h|L6{X8%wWi)Bkmie>&*@HMJ`Lsg|<$|9FyTsr?UK zygM@dY20)YxqM>^zAf~6dwy}lr{n&g$Kl|Xq?X)${6|GrtMMNc#gzB^|0$j}{*R?1 zeM;7kq$3r$zID=^e#ui&_M#YtG_&c(iBSs>pqW9*8@u-tG@ij^t30eCkcI{iI&mEH zIOM!W119v-8$V!?uK!)t-TSBVtU>?Tt{B|XRl7U+U$LtBzcoeQ=l^<=r;Yw|cOW{~ zfFA-d4`EResRKXFK;$)w)(0?jNln<`U4$tq)jxaw>dS?kGB=C-5qDyG42hq${e%L4 z-rKe1{dCK~KD@8#u7mmP&zi66*@XV@IR1lXnN|9)%lcmaf0C!>|GDk;Zv&MqZhzUw zrpsUUX~o@dsZ^J%-%^F`f<3HZ_|4y3|9pM>?)~Y9^Ve(K8spLXV_q2J^|PzHVm1no ze@)zS$$;Cx^Ml~}-p`y#xwSWESFb-EpP!4Z_1<6fgd$h(Kis^&RZ1lkOYJLWU+&8T zMeQ{wx~7BKvM3&?G2R8uA)nr!UC#9~X0+KaUkJO!qS&fUv*^YwZ7AO}(xLaOM6t>;Auc`=6(I z+Vp>)_+;-y1IS3ma=Ia0gEVXR3Y@mo@8v4Hnt5aelaj9Q@DVh8LZ3VPbnSHhH{1W~ zX@FMge@v}<{_C2)xBq{VCqMs-&9$utsB!lcI-vY>lNKodxIzz9Dc404RH?F#F32#4 z6>SiGv$Z~`5K69JUmjl_-@LynX$=0ew^td}RYreEozahH=jYd-&TdZLmS&ik0k*17 zbfP{f>x~{om!fynrRdGNlzJy`U;lJ+{^9iX>BZ}tPw%gOyuLlV{HWKKQyqR~?En0F zsE%W2R>rRLsH|ShkFB2BiEajEj=+K3kL7v0-hgawGLXU`ZTK5=zx_ z%=XJp3MGUE4}^IV87`QrC}-6x{l^2;T;{u>MrOUd~eh;oXSL;k)mzHai!;A2xt zyh6^e^7ke11p2jU5Qj=*1nh1y>vFuS>2%vD@``-A9NZ3*=+eQcwSZq2WwST{&pEim zk`lA+4C!`+bf*94Awx+BgR?M0i3c5&?oR)w*X;jHd2j#yB+pv(|210!AYTOShrlfL z!!gYlesX;N8hroZY&H3>FS5cSymD9Tlja4Q?LWM()uv=;mXM7JnkZE7ZkYC+(C<5; zilCPvE zzy0>@@4*Rn-v2!D*ai+D%lE$`>$UhFimvYCe?G~xHvf0V630CT_m`&_+Xe5(fUU{- ziFxt1=KHEi_PzqHPaKsx&nJHE!0`zPeiJAD6ef#nmh126B^V2LAUp+N?ZPEbP(!O% zu35feajCD1Z0&7xSskGYKDCi5e_t|U4JgzHuAxwe7OJyeYmH|x#6wwyM^gGU1o$YY zu4I{i^5JEE$aA)UD?kqqOLOX{*BP{f#=R%%zVob_s_gFuB zpzLT}+BYY-D}_MN0;SZI*}xZn2bvo-dNm302AO5~tjNQ)%VWF^~Dp zC>e7SQMPg6i);P=WAFXj+qRK~(f!+>0*6iC+C3Jn-?Du+`@XJ|w!WJ>zOj=&=XCc; zC=!ymrU;gRCp&!T3&V->~c8K71%S z;Z+W2@q3R0r=M+LE0_T=4Z>TPMyJ}#?MMK5N4r^36;N`ZD|G?8(!E+0fONH-!kkwx zFGsEPL(^;wj4rpgk4wVZ+LSqDt|i#aivF+r>}>zb)?usUFT33T-8J+7bw|U;`yU?U zX>9+yl1?Cm=Y2X)f_V8wtby5Dxem@^s#DXSC~0HrZFLSyoe2v#ZFRaYh~^gZBwL5g zOqKUz+7nPxM8H1$-Cok`cn5mVB(hawmi$uNq&Wy>Zwdnk$~EP{Xw_be>MC6n_2p(|0h6VV7e~_dr;{-UQ|}bqLYUbS?SKAu zq)v-$dDp?#-DBeoQV@m^<6lq&iyH-*N?-K4_^xgTU%?>yHIE5=nTF6~p)-n#rTJF@ zmWc`~n-@$_&fJTYeHD)XsWotNa`IE`nH$8)KnYNsF?nDga2u+^GrV%y&J#2Z5)V94 z?G*~iaA&)cD9hg(s!B0ioantB5$-JirIvi}=YQSFaAMy7(i=Yde?838SpLfcl`kRj z1&!58eRX^IITGL8W;T-cd+KKNj}rM>`&B8fesw}JH5j}O*=|#@inAnk3e!|(M;sn$ zr&OZW{hUtmKMoFReai$zIy3-v7(UmmYOr!sC`y@Ve6JIb6&2${ky~(I8(%-m5kVnJ z^r<)i-p@BTSJ#EXwBBAShn-(ogmJilbetB1WY}h5+^(9mGL-J4oNKC*+`RK-g$c|r zuDk=V&(l@Oj|W1I@;md3g4O8=Jp{c zYp9get=-Cp>LG@;wTmlnOUV}~h<*r?APr$&kC#cdN<}#i`a2DITk$$mwCwCn9?WKO zSjJeD1EhVjj+CWxU7IS7*GwyX6{K@{9OU|X>RPuhXigIE=u@?AGF;uj5L4cEHskk< z@-oItU7@vAs0Yej;;f+gC)cRh;p{RbPL5Kz`(0t3KrXJDdeK(8ovo%xj2D-P&~3!# zEQ%;UlqBK$s*P?vh`Pq(?8jgkCmWT1^>_MtkEMA1$cY-UM5g?0PT#g+V-nanX`s^c zP%+?ZGF|I0eWl*w$E@R;9oAQkvHX5F-B9b7FBRGLL=8aHS}O#h{*fidp$t+l#Kfb= z4yGL+ubp3S&aaeXaryof+?-$S*=*NkiL&z+WX%I0D+H~LvO=lXSjK0cDV3U#xI_`N zi&L@6?L%C)GUQV6@!+87qk|;QV9$R%1>>) zjel~i68*E_CT>r97gted$gMFJt-YvMAYG>oTQmWu`ujYM_zC-cE5MbZ!K*2TGDI*a zSY{F39A{QpE|ms_*EHldb^L}mZR0s5Gdb?6hd%B#WIvkyw>}kWYX5o5cWjNUK-=Q~ z1{MGB{&+BcwEsNB!|Xq=AX(+9xNL`QIoX2ZHXo70U$^`0Y|Als_=@>LEaNM-&QG6m zt7`e(&K-P>J9O&UgW+{u#Om$cXD)V5;5B8-|<`Qw{$1G(M zK{~wB4D~nfTl_cgKfJ;nf%0p&!)gvOWo+EZaod>b9X7^HcbcX(JULkhg%ZPQ!WdA2 z!&5PYO$LyvBC@__fGc3$!VNYM{|IJrj)~iMS^;=3w(`=X3zGOC z!)dtfKZ5ToK}7qEi8a6-`$Mvia+OD3yF}3Uusz2#GH@!e55zyB+S)%IORMTcXd4^qHE#TCU zm#`_YwP3CU<-5T&iEcX5uoY-(M^n0m$Yus|Hexx%sA(v(H)3n%%4P-B_1EI7;G&*u z@2@2_D-cuXt;#)#?k!Vk3_BB?f#QCy!hU8@DVt7dvoz;cAqs=*T7W#MumZy%;U31?&i2`qwgXe$_wx{~4Zi}|* z|4BSO3Smx;-qL@s8)p9I&o=+xUf=Zp>Gyh%`9B}zvFZOXCtC7u>FrVkw(RWeQg9PJ z9TLpR&nStsOt*?3kE^imA7i_GO1Q#UV}(4ekgE~HYgR@NIg6LEL-g&RH)9|1wvB#+a1nO|NLEEM7`+|)tL<8?sbt{^`=M0V=O=Sx4$ zkhKa;`O^vS?6+v$ukJEbChiqt63@4r2j0(g2H;4F^yjnaDRmx?sFhdn73k7 zHdZ)Ct37?2$*{UIm^+q$R^L!y4s#?>CqE`5+jcGh?kq3`mrgR)7m$E z?02lIx=2?rE>@+aIab|QN3zP(L?N+==-R7cZjZ|0*Zl0H|Iu$pZxu`0z54%j$9*&Z zcYoA>%>Viz54&UOoX2UY0UkVqKM2AcDajt47r!W^afkBT1O<_gGbjSMcQUyehUcy6 zTv=8tTJiQ6`|F;T#8uw8z?%FAic{bn0J|ElJQF`0Hv4g^f(y_=LC}G=iz`T>91oXtyOO)jdu6sq#|V{g}I*nZ34Auhg_|Wv6&}tS4AboX&m9ka#9( z-M)?Cat-ryw9Huky+8N--ic?i#%&!@Ur*&AFqlFTXiZwTnw;S;V0c>$1}40{O|#)B zlYMrKv){%=S+M{x8BDnp*(3@&9hs{x|GD=Kpz+N7esC zymB+uPo8nm#V7NhFoLPM!k2v)sWF|$CYE>_mCg9)6o`M8Ws<+MQ=ZI-cwQ^HJF8V( zsWqx_mO&cKVbqz5O9kaw&~=%VtjcDuW&F`+jBI5XI#&F)T$)_o&u*z3r%Ahzs~}3$1)4$Kr^1ch0eQ^J*kXE zaTVbCk1ka&3NuPYarJm(WKGh1IxL``g8d>w*z#F!8~7*9m*c=0H&X6On0R1(uV_U= z)Z9WWO|$dze3gb^JYavu%j?x_7QY8x$FpnUd*>`;4hRYiW~(IGfZta^63=2PD6))A zh`;wMg4>6~5Adf@L}%s|d100$!O@Wp}}*t=NV1wMsfg(;pG1PpnBZ9U19PC^RVq_uuU zmg_zE6#OVIg19GItAMN0TcwCWbFz2a>5d1j%j#x5XL}mjDR;>+skI?6&AhMp(-w0t zg5)&Sz=#GDnApoy8qh11dD)rQx(;L4=(1vq$k!mRw%bYsVkIghPWhqG9VvM;G8b!x zmtxx47Un4QT*FqNbX4Iu;_p&3&0&@>|N8&*fcMsG&R=A&Otvmm*0V4~tCUcdKsiW# zPq0?!(pbHU*;X&;^Q2(f>`7X!7zrvagarVPmkE1O(1j2?K0{d@TytV0UW5Y6%FyI!NLOm~HNViw`^(MmDbO z6wq{DJx-JV2|SBE`ao&wY(>x%rAtD+*mD-#Js_+T)fmeoBNNlv0Y?{X&gLCvfUKFLa@G9pvr6r?F) zW6L^bZ`s;{4U=L%_43+Ki#87&BmC@v{cN$1Vw@ga-uCY`A?>vl2Fs+Va zrCAev%@`_`fhUh}^kGbbsdW^~npPsUe%43VTBPYn2fL82yQSTRzN~L2WIH}}?e01! zfrGwvjJ8aWN$utr*R*^Y+PA`QIuE<91Z!ipOvSPav}VOv^DIUsPbn_}D94#ySivt7 z5hKhOGR&)E`oVIwIe|;ZMJKF{ss&KX{gA|%F!R#ByaY`N+{Z-=d1b{MsOW(AHFSvqyX76KD^{tK0+nQSj4AtSxo`V675;a zOZBD-mCM6iQZ;ZBqPIvlJxvoUo_3Zt)K}BscKRwvg?;x5un5~+a6=sXM)@}hX z(bdFNWtO*yCNaS_^-ODFhpE*jRyg35(J5 zD*)B8U{P3`#UeDwTzR6fmGxG?HCcNS=iSy_wXOSNw+_hn$7)3bHa6>My9J9?8fng6 zYfPwiBlQ*>s*)~;i9Y}>YN+ji2i?R0Eg9ox3kv2EMd_h;{ean8*eYgCPO zRaL91=6v60cGoXZcX=BXgH(mYsN>j-2+NFhHqM;b;A+kO&hF!i29mKtPlDT`>U#m( zq%*8IZ>;C!R_CmA(;T;l@pL5>&9QiZp)B!V_dnVp3az!XLyOjcVhZ`m| zkSYS6Dtuux>|Db#JDCB9P^b#GaEJgll2z)Eu1kZ=2Vv>2$5@z|MfAQ!rWFNV(gwXk$yOCyKg zs1(p=&k5FjJrto6p1Qz!luNY9jY}F4+)})%QI1vHkhm|L911)qrJLnq_KGTNy=;@h z9-tvMt#Ws&$||yluOv;9k*3CClAo<9Is#8D4PJ`}yE?R}QNfnly;H++E=@YUqDH0+ zUkB1EA46+5rb3D}y#krqZVIF(<1X(2>K*APkn5eB882$kv`{(>R);)gCG*unI=2%@ z{=O0Z7tpRc=dKh~@`%}b?x2_=XM*PnMHZIARP{5s~aS_P#IK?)yCx>lz? zJyWx-&)@6$F*tnG*t#9K#& zN@(eA#NISGj-E8QdIw_1$p7;B^>=LUpp*_MolD(42yqUcle>omnHvfNeK@|eqjqj^ zA?Je4a^|#B9;}&8yHm4jhF5^ktaCOyvVB_eda@3w_j^J-WBM% z-!@wuW3oiiJa}%REdQCtu~b2*c7s6KPU}{Z29+(vX6~X?_sHD=sa|VtZpI1;!(ihe zyLrTohJ%(&9C&Ux8BFC?7F}!VL8n%+!g{J$I@L#Ufn?Y^rV&%qijkCqC9v*=+n&)g zpS*&Gq4k=QEf$2gW4jAERzyFdU5EHW4$kiAOEnt8<0m!m`+YJX2NPtX$+5hyk~CW?q;STZ=j(GL;8Jy*i0~Kl!}MY&Ii{dVl4DH$L>O@iUbidYOA!h3bCD@ zX0gR9Tj(3rX#>Vl;1Jc0cztV4Fhp~7#oWIMiE;=k07O3Mw0_qrC}CK--j3d;{Uogs z^4or;)xz4{vZ-{75cVB8PajX_$QhEp$GtlR?f0KOkieU1R&VL>d)&}J({1CjzJN}^ z`)z^OjRd0D;{$h6n)4SXMO{9RTL?YzCqJSL8qzA7iTWn!Wy_93;I;CsC%E{*!NS}t zCT?}(qh!mi0iiCfl4$P?;6WY$!S4swrO-7=`&0Bi^nw;mD+obr@eZQ;bf~l`FHJzd zHf;Cu6a0IpD#?e^Q<}8{WCuTpA}TtAP!2?+u6T&zwXam+^E$@n%sF<5VWE$?Fl-Kz zV_A(dkALZ)w|MWbdon~D_PDoG1vXLdE9x(hLm9uEV%!={Qt;!__sb5O9PT_9`Q+si z&*7To3fsk(ri->!i>}Obg5fA+!QwyQ9}-8)Ppm&Da7oTdoFU+)3xB?6xfKA!SHH>U zOfWBjhwM7s(#6lMYWQU@+CbJS`n&uvjh`r&o1FHh((Hr++12`j`hf=i7n>AQUk^BRk6^} zW~1Q22dQ{0;6@5R`^b56NQ4OO^_P0ox2>A5CefE{m02Etr3ALTnftfLP$a>hQ&iD# zLTuT;oJ;)m9I-ta@N9N`?Sb&xzsVvj7&rgS$EtsR`i%XdE~nZVq$3(}i9lo4czcz3 zyHd@_Iqpk2`VCxLWs?;FS8|~uht&Rlwx6LHI9X9Wr87mYEQ6pC^l`Q{v7%vrgK_99 z*vJIEfSWr==#@d9r2&OhVZ0AV?ojR+FOAmW+9^s^4MH7x^z?dFd15iM-P7fBw_|V6 z?c-VaGI-(Xw!-cB>(y^btaN_pC@abW!@_a|VrEA-TcDSHU8|7OiIvP{ zMW-!c)b1Repv3xUKwHfnE#hj*lSqrWpSONeaIj^~K;YQ29S5Sxw0-U?zvKnOz2ytd zPQPDED~2g^-&aec{i5PB0U{WOXp%otLZAGoLPn`oU2O(hY*_a&rWEYb_>fc)YMM?=cGEukI6EPx ziDF6}FIsOH$KTv-YRMDdgFD15tPJMC8s= zfi2K4h60M#kuYNGR zgd<%^(k47MtPbo`Ce}Pbufa7#EcHM1Jc*7H%~%m+Ezz$YBU)Z*gUhAjxG%@esK~bh zF4>(i1q?eK{gs1F;l)tPU;2fXV)EGQvOFS=KM+-@b+Z z{HhcuwQ34GU!{9;WYm$*5W{AZj}fYrnVsE7q*1&I5>foFeRUZ3Qp>7kI6?glElR{~{k<>?qQw6^1 zLX3;u4E=oL4`Dsye$L21G5_BF=Ca;**`n*-#Fceye%G=nFyZF5&67>$7|@Pf_WAkA zrx8i4sXPC2wvhY&@lXKC(vo3rt?~W!rU*T*7<8OK!c6xj{nUFq|MGEmK4KymJO8lW2+ML- z&&|7tYAxM8{;b&dSM)0m*FdT$nQ;JJ8Y(4{)bqF30mQrs@SNI{1GNkTVkvx+0CAyl zC%r%G^m~RJ?N&1qvzSomfpatF;@4;#@izO!fmyu$VfU(WuMP9ZIJ>aVt(dFZSq8L< z`PSX|v8WY#vzQtX)zeUq9s}*6xT{JM7-rh(y)l{H$7Z*v&rzua&(m1a%08wCF0LlV z9SVB~M^^NX^>~}SBV8IIeAQSnV%VcSolk~B)%dqZL8J>?rixBd9-o5JMQ6UUQZ@^d z@%(_9XcF&Sq9-^dAe04j9ryJ;Gn&o#x3qv}Fj!NB#!*)Ua#YshFI2JJ8*Qqa%cm)s zTIE${C#wsx(bi^T-H7vmu|NKN9hpr19$Hsj$pO+hp=B(+vj}dy-QYxP3h~)qEm|xx zGPcAfz{EQ>d~1!-qqFJ*F1kPtZ2_u#R6>lVIf&VXQ}2QUm)Ie#Pu*pB%C^&JPeb$C zOc1g;NO*PX+v{1!vyE2{wnd}`%sT;uo)AffD!3+83zBK|_Ecc!VQN98)F;$o98tLY z;L?AoZ5oGS1EjkCSc+v+UhKGoWuBFKlFME-;_b(NKz-!BkN~pI{VOg`YqWRKziI_e zV<%sC{#o9a0r-XnTgvR)B3ed3cDqhy&YW!QUfg@(MVs3n4!gpEmsn$&ZTrp^oYK68 z(21LonAtT0 zVAK%xM|pNzfJi2S5{wF9A@|pk*pgAJn!8}EmcjieghD|?#BuIH?ln{>yFj_dgSc2Y zAA*iI=oIxPmrySWS`2!s^~|sMy>!F0G1GVma`Ho6B_s36Y^{o7>*1xy$m-Q6)bpjK zY>evv9(7b8!hKzn;;xmHM>T58ca-~WvCFZcJb6Sq2q^Hp?MwnSiG3qTr~!8VoiYJN zgLx;v8}+_#On*^N`@?-Sn}$~uxzhj*$5!}UF}ha%6z<(9G1b^}0IoH?O3u1+^`L4T zw~xB=Ql6uAQQa9$A3Dos^2(XQ^F^3W>@*A(N*%BosG0GiHVCzc`QD7zsszg>%t8l|A z_74$%p*xQFa!*II@P=H#4Z(c>W+ixb$KC`cDU~pfZ>Zi2wsH!M~Ib0c8T*o^})92Y$ zWHFa}q0@IKuovZll~wAsEFL+~;7^&N6RqZ!ggRhK6SwNAsjJjPFH z0*=y|#4nooYIS3N)-H6whm($;-b2-VOgvq0epy**7k9Ne={iJwtW!Olp@2M^Q`750 z^j3xA)c~tg@I+o$v+Vh)nRc*o63yvge9`d9`u0C%4l#CXAWCjF(B^K6Ph24r#`$(R zy2<7QYri_f2l0mD21@iXGGaoY3&IEzMIocS9DNx_)PGTMsM5TY^(kgg3 z-bV=K{D(=?45<(sa~MpfJ24^E8ITX22(^B1BBXoXexJ>ZLOl&5XS4O@c9p^e7MZVte~1Oi&sCNpwv|1pPMvELq`Rhcu;7P6Rx; zRaTogp=}oVD(uHPcB95R<F@2J;P3w%SrrC-VUcdCo^}#BnGXU3+yX&C?Xsf|l`@2bX(Sk! z_utU8z4UucB?PEWo~ZT5Kck`d6QR>u@uX`6NulPW*3{E5`lnFznW#z$u@aA=+bWLx zhr6AQH#ap7{!NQU!Rc)Jh&4qJ1E9$JA;be> z4`MgEqYjDp8V$em_yebd2ncSWzaGze1^)oa6HW>e%o0#N z+MK;Jn5Tv7{wKHjx#6%@`|^hS-CGIlko9HH$a>?C<0=t%_j923(R&t2MZUJ@v|F3!95gn!jt2$u8Fb_#ntAX1 zU?VyOUDl9egj$ovzu;EkpIObK3LmSA)ute5RfN!Fs)5Tw&Dos2)|;Cu9k2YfoikP` z<$U_d^+H=17OJ*3pO@-qN4}g^_j*p10q#v>e3uJ8fV4qMySldxqVL`nysYP5p_@6t zhfr>kWc6PNe@#*II@-LuTGJChM zl{my~^CvRP{$4!+#Lqn;hH+tlZrvj|L1u7j1r?CBnNkc!U3= zRuBSW%tVU+3zhp1w)Ci*$UBvX19iNhxlREX^>?z}-U#S+9D{+EnO~7_D#^^p-erme z;EO=PRMP2pLM%G>B@7&AuqS+>MJ2EN$;u~sG-r;%q>5^n-#30J%@5lbQcwcyw4e3Q zy{Q{kyu;n6Z>mVHxdC5&ibmwS_Fwb&{OF2#N&#?;^7~Bpho;1CF;nrwJXgtK-<4$< zIhr|gcg9?XF{;zwKI`eDV(}7rY;mZ4X*m+xAl1Y_6|3{a*|KinCe1A6P7Hq2Tbtjo zkk_QMbgc62-YwmWna?iR>-+>LvD!w~RY3>b4zPPb6roWQjpU>CGX;;>Sj$p*BiZ58 z3nXI!NMAf;jt_5Ril(=Nh;%H;1Ieh){WT+i5ag?0?Q^OOQyM*Wr(7UANyPG=VV=s0 zlq z)^8(~com-?y6MYAX))%eC!%eVg?JdF(5c;DB!@n@`&{E_*o6NZSQjV+I z+b=nyH7JIMBsZxEm7Q1VecV{HrM>@*a8L=L6q?uTsuE6!9{CqvsuLi33aN^4x%pQr zC0Y4TTG0+~4_1#HgS40!xW2R=Q)86fH0|>Hw`-y6Ocb{~2(x5X(Km$3*rb80Hx^yn zvhhV%^y_p$%84X|yp&o}%6Mhv-pzjWLVWliSFE}GKtb^C0Wsbs0C#)NGyZD;!Ty>p zp!Oc3A%Jk=%siau2Bcq_`j_DBua6nfk9~Q&=La-lQLcaRV*?ap6u-t~K<#t$f5$V{ zYYhTDqQgLIzFSSeV*1Thc!@YD1%f#jqWV4{A-YT{A7YSAkTRCadSKEq2{!XUa(f(= z1)`PAp2^UfT22X$6YrPI(*-N1(s%sp;f?at<|d=S?ic@fX5> zvy=xyxe)h&+F^1KL*yc)Ef?oZhr}L2EG^yk*8Vd=qa$2n12M#d0!nbCN#v%zh?e3a zmDZ$5CGc92?jd&G<}XXW3h+q``bofP#@5yEx^E^Su3wJU<3K-ZpI{>~06`qVgTKJo zf-XSg=!J~}y050R^`Eg6%cXFNG7wEhP|eaj zYQtJ{owkMQW`>FaMX1%lsj0#?YFopup)sWaVJNkrtn$4-@kM$2$r#cEb}6uv(EJgK zy8Q0OLKIJ{#}U?nz{V$f)ZcKx2xzK!98m{fK+CApL*3CyN~_Lf3x}! zaE(Cl1c3C!{^#EjILu3T40A8LwC^_JBy)Y!J<^YxyWSL-81!o1rV6!c-AUc2f7P{C z!*0YVy3TiXFSCtxKpJWq@ktz~8^AVNrEj*AcEZDpF&NnWtZ^u~X85%O?ulLcaEu;6 zck#1Hz)n5w;Kkyv07Q7g)hMvXL#G=ZET4YOK7 zFz8n08~;}z)rH0}&_R@*A0JtCIeU|BKekEkXx<@Z4h2rUNF=|RG!h{cm^G@zlF|^N z`DiUyr1~ele0t3RZm~={vj2_1flFv#P&{lNKAsrm&^Igj@4DzOM7p@hPN%y$kS$jz zZf&Mqxggf_aCPpclvrhDwjO^x*|R&(y3uLC7r1OH)5Aww7<o+y%XRpUbs8;#umPhd-L{?j$7}~_3r)snD>VCq0yr`8FwmhPoZBbL6-j;al3|@ z{Nr}}g}-Owx#y*{|LW&eYrah_~tvwt-K}d9Y z#D3SG)H;R}dpy?m30_?QK2I7a@^X7U-jaHw`FmsDp9Id}ynLO%UL@i!07AL;eQ(5) zCyYW50tyekmseL`T!uZ+3Lz~^T+iMly*FP+GZOs<&pmI)IJa5Pdp94-I2og+^_k3k ze-3FVDXGVp#nrXq2T7XEXI^~a=7Cpl+&{kLTX)Xz2`=YaDBWC!uYDPWqlAVOqCKOX zK$Mf+Qu_rI;h+6KO5Az**PwGS5734rnm+scb1P@~H1fQwKQ`IkH&s4(f3KYg4e}$v z!@Gs>VY3DEVJ}5ntgz*7r5;L{U}H058^e7;feLRx|AhjhLc|~n z<`g5%wJp>9g<)(M1_$YOio04M(136`yJP!o1In`q;dUCg7>L(|v)bRLl?Qo{$&aAt zyKQS|>x+-+i;wPm?F!L7;)_nOnj8DnyW>#s49WII(DvS|L(=m767!8v^_9jtU4sjH zL%*ZT+sWzualHS&ABHir!|(lly#M+3M0I=myzD)y_762MuSS1i%OSv#SK-VqGgh*8 zPx+#K?P-?mZ)mmH;w++)h?wXT_m@$n8Y7oo3k>np9zLymWPr~3T_mDM`E&}BZdeK$D}3}zK9!WC!22qZD8RH zHsXyESx$Pe#lvdTyw7Ko!N;Wa%&$AtFWs@1h(0hkwq$mTDhP}sL(pzK4D3&Y#Fn|{ zu=rOsQ@FJ(K6j#2TQURB&TBap3JHOOZ)wx!K3_9480w3^{Iu3@30aMG)o0iQ8Z*~& z<=mU$knxDd7wgPXG7^Z@1uBy)5PnZ4~ac`-MpbH`#uT>dD9kZh^y;6n_2ln6D4|d&PSsGIC}!mszpuYN#414Ip}Ka z-nyma-neMML-olcf^AN|R{fp}#ay)$0lDmG&g!wAd(vU(=&3(_fB#zez@hmM)gHY)C4~^N9f=+U z)&jyR9uyO>R=mkrYyefv9kY$#NcR@GB>Y(0N-Y-RsPuWOzEt;kfXfx=->RalEC4^) z3damR{TiaK?iVJli8LlQ9;>d(R!!pupGK>9b?4U8sCKLOlAVsy*}Dl3wVppm^LA)t zO@Z52eWY|N8UUYwgJm;1ZYwmaMkeE`McuqJlzC$*d9B4aS2pv>lezq?QRM$^&-t*a zr>oO|G=|Nr-?kJxFApuEl)*Q9*Kw>gj-@MHyS8JamN}MM$D-Sk#?JK%3*5bOJP!IsUs2O zXUT`0Nn0Ghm|)oojP-&IQ_4Z<>OuFvEw;>vD3q%j5RM#$INOf z@f!J-`OL^-%fyp9HHob9utBL9uT>Q_va9Z()v};fyXav5BxvSu=8powb$Wm14q!2udXeGg*b~qvL+2LeCai* z8K*bfFN9&FaVO5{Q5u9Nce&G4m>e4i2%{#hqb5Msr)_Meu|JfqsmJj>2Sw1TJqW+m zyhUK^a4myD*~yfVUMw_m#=%Ln%)~7pq~p&f*sVADO!xAzZuN7c`nDK4VFfiLI_pz> zstbMb;bOsSkMUD%G!v3Jl@v*HM_T)QP6(sa6`F@^dwji2eMu2Byqx&xhQ=oGx4|)KBh%ZP)4Ozr8a`= zP<9x-;g$**ThTYov@KDbK!3uhbS`!PUGd6ib{f2$z{uJKAC94HO}T*bopP6#At7@0PrH(9^egSkbjRL(3nya$PwRJ?C~ zh@lG`lN&}3myd3oj<{+$O?>6t?4_;NSNXi99h&CQru+<(n862TsY8vNrb6DBlTJ-w z0=MBN+fShs)1WUA5A`N?aU0WD_57`)@0-umx)>xC9{D^yCwo+g`!4YNsD|ma2Z~Y) z=cj?b_puxD+oE}0CcgL7{BLB>doUe8i(9CsE^OQ&^)S@sr!J$efpze#SLqb4FEntkx-NEGWAe5^~ z9R#)bf)_p3y6!+$6>O|ukg(9`gYyn%op^L3@V-`?>Ur1~?~9r%rLyzkDg|t2T$%HH zddN1bQ1KqnbCCpNJN>)p$3XUsfihu$>(v6-m+$#xkFj|E!q9n(!(@Jw zuxD1gO1>D^tKU_>75FUvPj&-#&Q0<)+f@*yTu}!P&Mz9#*@{-GPG^ zU5_f~z50=m3HWo}^iJrBMjbz&M)7}E(1WDmX<}YPEijF)uQ`TX!J+e(yUF4vkQDf> zM?)mODE!Nu^~~@vohct^o?R(mI4dn?hpWnQ>vrW5@2Orzw&mVxkZ9&l;FYj-*#Y0= zKQpaUXt4S)z?MwUW!oW&e^=)bL`50N@wvV!k056K{WR8vi1&W!O$1mRUWwa^Mp~kS67Tol#j8{+S({d(6c_8VBLDeloM#2<7M*LXerGx6189bc zLM1U-gY0QN5u3F8!WLz}BAK@Y@}rc6Md7H?@OlNiJFS5u)MLW`qlt}0q^dD>f9j_n zlduJUlf*bAk&D0aI$X|UT~K{TDJ|KTmYU-x2}y`IE`oNFp%1j~VcA9v6yqi1+Ttd# z;%-)KUfauEb5QxF6OCWUJV+rDW* z4hDq|g_4RSiHE}vKlMi#u==~z^(fsk$Jp31R%C@6-sxzB%E)u$&(?pWUMC9*{XkxGiB z2eWX~|NWR!?d#c4=62v>htuX^hl3q02|Qn2yl`=E!gwB?g8lndzd*?C(9Q#=-N93z ziBgy}YDMAB>u}EDGIiOh#{x-DP%30iP#U;*z^dq*y(lk@(d@(nIuC{9hPq}_nMIAG z6sa^KS0oK(>AxvUcOI96vl2K#V>P=@V`b$CcQXHj& zIzvS6@@FKe-;^EqVb0P6WNpQl`kW;1JvdaxO0l)*lKVNo*?zh2b_%VQ~gt#)~>yHURlO=rpfhMv&^zr){C;{4<$G+A0JLZ z=w6Gjd)t+u`}w?hSurx-t+%g<3&i-Trq6e+M`Zu>17idWtPuJk*du}vA~+ULRz7U_ z)z(>@Vu_Q9$y^qzj(xXO41!ASo{&%+0qQF4qfd*6{uXBOrQ*+cPOD1=5jjqW>g|;h zXwQhxq{sAd;~Z-}a*eYK_OkZZW(OmK4Txon25?+mM(Y_7G(F}RvrUDpG`fqQnycoc ztwfKB4Ik+gtElQ6HImPBC4lpY_Z#BZ8jZ&#dcnmhd0m?%2Tnv;&CW+fF7q;lmR7>g z45eQHEJC2ioSI@uphSCqZ@)Rziz20iGYQE5QU^0*G#J5TIhzqTUbK-|z~ORd1q}mT z$*%@o>El3MMRCQfc(&?j)PdwWq6(sYjSW3y)FgL=5n=_eZ<;UJsFoX!h=6syW{vr}?hM%jkDEFxq$5+7 zAaA`}2~)`9Gn#{1yE41KC{;8)pg=F>}0lTm18(D zR?Bv)rWPZ1@Dp|}7prb27NNqv3=Nebu&jkYwS06J8KnBR@z-elZfn*7dNTFC!Cqe4 z9fMWZGg7;hin#&x=}8KUd#+AF`eH~(d^^8~pURH)GHIS)FOCa)OK{4YY-uecg(gB9EE+6(NDj+%zri(Cgt14!!Ur+M4%@-ytL z%$kPswV+5}ua0W9>zW!TceIpFe3Z`d4cpRtm`+iJ72S^FZ5c-{w|!#`-A-Gym71D1 zH<{s-zf5j_jsDxBK>|=~Rn@(itE)_^PBL(vlES(P4b?-i%E|gCIkialL>L)r&9OHg zx5&(=EL19jm)39B*7hpt&HlG=ZU+vov*>q@_ShKhA|06=A2z-EGZ&F2Uy^jkhGT|e zvhCuyKvTcD@faVxlu)tDbwZ#`KONYl^$x4Lp(Nw4>qDmXQ+l(4tjL@1e^P~CYyTol zyxAQiwxq1)@SWkK=)^A*@}o_T<{@?3;bGrfLGaI|67t3FnvS;=a6{U8z37nR;ce;Dexw zcaYo+>v{tZf%4ISEy?Nc9NqqnK$BOeWJc61%E}g(%#&yf1cEhu>}XmZQ0p0CqIH`* ze;5zwv*r zyRwSA4w8E)#FvEEITT=GTjKKmKE`(#=mvePnsn60p`B9Le=}r%80Fl%#;j_NGD|IF zdvGxJ7eXxdF+M{^dbwgwGwPC(y5&c2Tp8QA89KV;a4cI-YN=qawxop5+*WjTFw%`B z3p|0i9JZ>^wGe`QFU^}V2sFz+F}9M339^tEA3gqEZdg4>Ewdk=7<(vsFKmP!X<_M7 zv*%n+cGZmR`^uVAWQ}~r&_qH@AEm(*3SaG1;brv_T=!nPOS{|ewi8uon}E*(&Hl5g zk%F5i*n~5%$fAMbN-!4X>^{tm@f{AiCM*rrk7hJ&9mqcNO%JUes6r;0;g$v^TL}X@ zS9ZaS{T*8vIJ%&fCv30Kw5bg$+W%Ahn}b3rD#Csfi&lMt9P z>AaSnZjJ-HBBqHlT4O)&w!*@~IDF0Z?%YqAo2n=i_*9d3%$YuR>h1Yg-<%!mH*}(VXdqQpH4_xNhrmhEcrTRNHGQSEw9t{jeZyq?7uFR&^K#dWP zh~c;co4+Wr2xW+%8`s0`C-<@DPlZ6CFoqn$4hrB$0cVrImhJfv>++H&%c>CF3y7O$gSDmtiq}^Qk zg4G&^I>;*a022T^=X^kI_hp|S?;dQA#@_oZei!;Pg=2_0U|&GulyvjCUAaXI0r`dg zL+(Nx957*f@#FJ$^>ln&plW-2+sDoZ_&lFO=;{Vfq;c$~oml)lkI7#5xZ2vfdbqsr z_TN};FZY)o9L+Cz7hRKv>jew`En9m5nG?9Ihi<-*8WY$C-V&EY8%&f~N)+?+t(vqQ-;4yl52zEdh0LZKG_CdxrU>ZgqeH+p*)ra z;>z2vk}*y4LaTL9bEP~x>2^^XMpG#2Pantl0cH!}MxDQ&xK8DS62~O3G)0?V=1EG| z^b&F3!?x?xwYAJ|vE-o7{M4NT_u5LgN}59b61UfbrS7{VZRQy9c7pMCRX9?x=!_Nx zt}X;p0>?OrC~ZUh9{7KLeO#k3%u-X?F%3?_I{)I}$6ztb3}uw;PtKEh6*QE4afZoF zPEjC2J0`%gNG`!=2PFmtfk;;tkDq(Q}F(BZ`=1iaX}U5~rht;WiSe+ha`7ZJ@8Jj~mU7#E+2*Y1Ur9 z6s2lxfag&;S@`BAI+qZ5TyTCFvwxHdOo-pY8t!8kx0o~5&~wVHv~hs(MidyDTPeG- zpPEDqS`twKZDa)vvKFoZYzWS4bq?HaC8|$?Q7l~kxKk_MP?E`?Ue>RYwOZatYTc3A z?kXx&+=;xU!6nUj? zGeIP6!Xx@ZG~~qB-n~P>OP|k7fL@2}r8k5r38zht`1Kl67iN>~9Ed3P=LB!U2~)U( zDFA-CxX^7XPNuSq&!51gMRzE$BHiPC1UC?;{R;TjcSL^HxJ55hxCc>1`IZ)Hdw6aG z7xKm`y^^5x0oS-|P#ad65QfIwGO4yB6DeUY)x6BDrbXFw&w6_dZ`}UC<(qc;Nr?Ym zbx+zTGBJROs#Y@HAAR78WDima8tK)`<~EYnu}tJ7aGf3v%5^1d?OVH{ zg>hr|B@vgtB$>hI*aMR{jMon zi9hxcM3CNB?fu4i#JO=@o=3lrq; z?5Z`ESSx+U;PcLXLCeS3aper=AB|F`QbeI1;4WQ!RzNWm)va=4nNuv$P^01Zmq+Jj zv9NA6HBgFJEAKWA98>&G!x$7VysPm}fXE##VQ_>h3QyWOM)Z1=3c9Pk<8f>2E(*m? z&%ye~%H^jwv=@YwQADS$V&_;Ye0`3isi9-+T-!7%E;5J4S#Nn1O!=3Z@u!}7wo)b` z7mXC6eNJsv0IiRBcCqc6X0S_hgby*A%av>?mxtGHc zWQoN2wOna+ZZIct#hNyjMsbTq&X|8A4KTU=TG{hk8MMfMQ5!o)pvE*N(;qhMxw5~y zdEwgVmh%ZnMhfD7JaUXAuTcMyjVE&ExbJ3WEybR?x#hYsqq-`i_7~cl>f{i{a0^NA z$NG?@yCe=%br}|&=F{sJrM5{E`n5k&H*w|b>82^`4Xq6rZN$ObUx zpPVD5g8248Idco2CqP%K?<7O#f;r<|XC9550SLOF-V5)}>b#k;vtfhJSOX}wpn0+6 zy&J!2&jA@oJZ`< zsgkNJ@mY$nhF9TYTifeYBQ_<#OO$=?maEH}DWRc$8bk#qoLF(4Mx0RtLYSg^rpv$N z#lIZ5uMoWF{&}ok%#c&`7ja;RI&f#mQf!^E;^HF2g*E#5w}GnvoJi%1QjZ51tAHLN>?LqCT6NvX=87U zP;>DK^oq5HD74*0DkU6Ey-)8Im!)#(HVMV7Y@6Zo*XH0dyW6cpS0wp>-FP*{OrTBN zMVS)@ah7yW!iu$Nd*U5n77L7~JFR2fC1#w0=L56EIKQsYK8L13{L;rI?dk$XVX{bC znN*mY3CbSQO{M%~i$UQ+l&0vXX{J`JSZ)r`c*E_;Pb>TlWB_p!Sf&N(lLB!;D33|k z{9CxPmP52z666F2LpR5zpE~PA2uw)nN+LPfLTuwT{(Re!l!HX|!I$jjc^zYZFCb%? zmA1WkPg{0?tqH^{gFhIWv`)Jl>?+tIT9gV3aYm&@LvN_9;h5ISckb8BoM)+Bt*Iov z2GlrPh4B>&&46b-_yT8y6l{#x4Y<-_&iC_+2*bFNIKbFuw~M#foE|1w|4A;2pn`EO za#pT*lj-~MJ&4|Vt2prQV2+yW@$JSAn`hPGz1fkC@LO}AjI48fg-r-M{P2`a{iNlX zUAK5;@=xuEp6>#OEVV-(o&)zNw{NY4Q>$g8<#yBuJ4_MTmulUUexI^oS+COGySVN0 zQRD)zFnkjJo5c&yyl=l#Bh14+kbPtQLq{SHH&415|2w0CE@=afT=f(V(A0j2L&QQ; zIH5?CKXw`!ym5k5apX#q6qt!>W?eww0_5Aw#{XV2k8#=e4dH6~Z;5Wc@)uwnt^?C$}Is@({j*e-H#kitp)QzOmg!HtLoWn08q zW7>3k*ZQ(yx8IDCz==O)4quBKhwmx{bA(D{GRR2WC-dI*EFbnO*wPbukL}|Kq2ny2 zV7U#kOtHi+_9IiLiO|)~+(%3V{I4LC7Llghp^QtYBnRLJ^PMr0z&{#M9J=D*BXgxo z%&<-jCN$xiO*3SSgVlMd-1=>yL2htu?)BzOhjFQo&uOJ*b66o*vbcN{xRhkat>#_B z2O=-3a6n47T##0*$SPtA-%RBcmW2jLNY}_AH@(DOIpCa=@XItAKWOIkOIS|B(lJR72_M ztdy>EXTR)U4@`uv+o>}NtT61|sS^v>XE8fPT3WCl&krR=Zr=%P&AB5-do z8Ep;KW{$bBE=Ac4Xlr$`rpN1F7(&@@CBU&F*Bhg(imV5#5it9tS%<*c!>#8S)WVn~ z<3WhhCFuXlFrAUK!nL5uq@oqoe=LDKSs)fT0)p2FTY?leSxB#0XhzfK5JF{j9~arC z^=}BMgP;D6rqrKcFq&HCR#4=RahUof7K~AWF}+zQV@x`MiE9zo!e{k|`*T>2(^}+d z-%CHUOnzQIqvR@g39tOU+X4s~I&{)9J2!2nN!Y78V_3+#_iI=6b(5Nmxi$_ zzEU^47?`3KDT(IyJ?i7&gz=X@s+qf4j0{g!0(a4$ zcZNw*YQ60eNvmU@n#d}1)sRi*!jw=C!r>8O3%`O$w8|+qRegCFFh2;~(oYB#AIUWG zFNDO|moHEPT}D0jFw_h(j$<&YQz@XZ$o&xq@!t(p0*%^2e!oZ%$1LMwzo&|66G)vA&|W%COCp5fO=?k2Yy=_6Sw- zkkJiQU&o7gYz!a=E7607Q~`M~%XR`0^8|aiBEsFr?pn8tIE`)yf1DoEI3wz04LIST zl*VmPoOY3CD@m8UXR2G>*;WHJc7a zSAJHm45=QQibDP>w^;!~-LS~kQjl^rots9Ojz|}!V6(4Zy||`DR~Rb(lC%TQe&B;3 zeL8E;d`pK>_ld6t$a&s-mfQs!Tshh_JWI{Jk`BAUA+M~st-)#|mBU>|zC<4Gj=H00 zFdTGYGzojra4>^W?>L%9z20Opos3~P9nZqSWZdfwrs1#`4Te$BA9TZEw;v3TN26^B z$sL^7UKc~TWe=qnw{fBhP#?qIf;erGQc$7XBeHUfGoF;pNAT! zq^i23DiqyTfxp*&8B=7BydF~7wPqTuc2Tdxf$!FKrM)c+e;N*g(RkVq zdncn{I30#?6pkmeX*cY5PiBMT?qEFX_uw=d^v2PwA55b0@pRZ9O;5t%@pRDL4J*0) zwNsL9i(f7Lc}mERju?gSywbApL2zL!<5W#ts~)=81={CQ>=$Gx$=)j%M8D=SfiKgL zo3_r%l7-Q=j1lBM-#*uQxlW423T4_q7nVyD!9u|ne%gGvHfWU>x6z2;-TXhAEoWZ) zsKlxx@@>k)jt*@fA2`RN-ra@nZgiKIt2gIGF+0c>j9i^frV_e9i!ieDB#4)`9nQs! z8FcT0RHWEo*~L;ID*|?J`(e2O62|l5JMErkjZnm%1)&+rLs;27bHTvANzW;kJ(WRc z&HhUD&y+_lF=boY@^iT*b2RAOFw?0@3iq7tv&7D0EB@$W7=LBTzUJ*M0vyEFSXWAdDkmfwWGBh z1`+dJwve}E%kfO@RK;^2P#B$ZA7N<)$Nw})>g43)r??0l3HZdIS;0SKXL9)a3Sv_9 z$jY%?t*W;c+N?pMEnYy+)K|d1n6dK|N(h~IhalRd!7>gxf5S0K#f@vyyHu-CT;%rd zQ1dS=D#P4jOBGY7Lc(YX`Q>gf!H@%EA&vUYjB3qQ$`0{h1ooAt57?6AK+{!{9D)>8 zFP5V!4`c6;90HbcMLGjmdf*=Z)zq~hUkkfQh|+(^#6`@c^iE@m?|eanRF4e+UQIj9 z_7}70cOK&_&4W?7q>J>5bgRyC8#*wodeLO-P`b}lSvf0S@t-*@Z4T^!UeiZ`7I6X;#X@^To~_6{MW4b1FnG* zzk*N&4qs$JSepB~*M)-c*RVVkbiVj1QQFcMOFCLngbvRaI|pH= z62TFZ$%J|HltQs^;bAbBs;Nq}wxu0z%2Q0_AG}+*@lHJ%_3Isa8IQDIZaORl^3ihB zDZYOCyCJ4Uvm9={256x2Z=ggOJ#wqmykM<5Ee3KYUD{~(3#)H<5#-FmXSXO9fdO(m zCmW$Vb6T~?ajV_=fj>)ju(qN&ugVUNt-pj(ys}yirI(8+K@jkMflHKcyprAmK$h7I zgZ)=$zjUTScnc$LX5L@|mj~)Dn$4Xsl}M0_fB;%c99*HuVucZS;`pCX#zff+oD{&j z>-e9L0%~{0LmS zLpoc}IpbDvnIWFJM~s`TZQBgWiTaABk)it4P9nbq-|bHOm91TY?$^I~C8A&R#OEt# zVvw(J-t$%ZFS6nVvR~`ee|E&*J%;IJC_3937H)~rmZ{71`Yi*#6<{xRkHxOkY93~- zfVg(2w0ZZzo8h0RqV1iI#>a>9*Evfy%UveCQ|~3avFMi=F9Q-TyhD#&WTe((FJ5Dq zi{I*9Cahc;+o=1iN#uaUPEy5H(Se)<_QK5lX(vD@0A3ClIvZSC2HO3N=OgrSywh%>vp5`vc~hq0M^d=Mrq3Kcw@HG z!1t!Cy1iLjQ`KZDy`kUpyVCC_?4C?U)4_Bab&ug>)Q!fY-VhFsPsY8VKMQAc0=h8l zN6~CD9*&L&(QMYAMx$ZS9rwrGlkHd)J~w%c*vhVRtUu?rY*`kB#gS?mB}J%AW>Kdi z!<=y568@sxhuTFJI~c`DfNz;}<}05$fE9vWd7s2$7ZS8GDKO7M~lGV&MT2;{{V)#Efm^?R*mI6>Hqq+|~rX z+@n|Pgbj`v0plHcTn`Aq&o?($qNemekSPrq4bbmL^q=b@D)vAL<&br3tzzRC#mr~V zzRzOFuezmkjZ3RuHC2>0T)yi^R+|+NTPrrS7Tcajs~dS_@6|PEm1N zgVjc=8fV{EGC=kwJ=i^t!YJxRSiOXxtAhj@|}BQr*m_fs<~fRR@TC2Cq=UL)VnwKg4Myvk_2Oepr6nzE#)v zw`wysc%rS(09%Kx_*T26KdV{;c7*;JU`u!{e50F89m@^tK=Bp(R)-v3i7V^v-o?dd zaSmKX#0PO2CMy}198A#~iX*j1vg05Oi_^~>Msb}g7UTMDIjjGGJMtW2w93Ou8ZVZS z4tu8`yf9mNr{1vJ?Jm7TkDKSbQ}6hv*!y(o3Ey0$WKSi!aYpES#fY*RY+VsOMW z;9*BBAxE{?D!MkH)kGzQ04TSaMLrpMlw29+A{h`tAVb+I;rvFFFQT4>kYqBDx9Ec( zL@pq1V08g*{s4r&li}=kJ=B=`7KuGDpBpX;g|-Ok1qMMY+#Qq9U^$sEB^qBq~}X+mzNS zPc8=21QlmL2Fo~!Ejb6M4jE@)CciVPFHhaMA9@imcyYBJ9@2lu&PFyi9qO6|Enkx$ zysan@aV9h-r5&aGA-H1B;m=kV_v@WjIL>qBB zL-~?Rqsq$QK-(^h1tD48vS85L5--mwQUfwY5xjCF9?^VNWI65;CV9mR6huD+Nsxvx zXT17SmXlK;qGLZdUs#dWkHTZ2tF#jbwS99XRJoA@lkya{wJ;iHzhH2;q`q)wz7R;b zGGA~?bf&#%*fuL?q-U+0jNE0tvor0eJPs~7AmTi42YPhF=-kk296M!Dtn zYf5>;?!j&F8mngmFw4=BtF~o&N%n>9@ZXgH-?3;Qc_WC}->dW`*^}^HD`mB^={HWM z-(?Iin*^3fL#RG=#?Y7dBVx#J;ui>ubh(Eh;6P$5nHG$MeT}F&I*ZI_3W5#SV6BeMz>+9VZA1A? zrr9aSQt{{E7o4I9lhmm!Hz6eWH zK6ZjEKBB@tK|$0hHs41XiaP7w(Kkg_orAwua9Yw0{v5iTiN7#Hon8$}&ODzFh7?MK zIJI0*DD^v*Swt=QxmiXSM0UAQ2~`{%6O^F@%{SK>-4ve}nN6zb$%~O(HQL;cB*%^o z86P(ZzJnS3PMK^)o^=yq^{sBav~F(xTVGfrRM)5k1RzX6yDz`FwEK4hfNl;urTwI`4 zdm`~`oWq~kHCr`D5;~}MXA)&Y_CpDyjRvO@Ma`{kTH3L=!uVak-|hFhC%s{jh-MPN z;q18EJ02X5j$t$&Oirfb+3{>Lo*l#4aMqg+C&OvK-=7|LM-$jR=}m*~bO=YYasT9` z>JVdM#t$g=&XNSYisuW0!7HALKLQ;lZg27xJZJp{S2>~+x%a2Gk4SuWq+LFFBrSXX zGHMOEe7fCkcRU=j|GV9;`G0pf>HeuV?9)FclhOE3-QH;2AN>h*@1gCj&kBXkG|RarnHe#O?@51yS=?XCvkcU7CD?f^`w9(*Pf5^ z`O#a-sN(R5X{1Ri0DN&xcN+X%>pRViE&bH?xYq69SvPCL}*g3QM h$%@S%J#UZC2FQP&FB%X!V<{D8Qz>~)IZqxA6E+QIGgS^N9aSDqMGXy3c}-huV|z1C zHDw0@DRWypkc+N2w{`A%uJ*4bRYyJn@5J0;W??D!E zXQ{ujCG*?7HBJWC{9`R3@n|#&XwuRObNNe|xmqHaa6j^ID*B7aOge6j{6h)~{liDL z{OxwZK|sps8@`}HCccD{<6jMxBtS+pi>-EgK*Z2Oz9<6hVA#Gg24Q1A;Vbo*efGN( zksm)u`Xcb3Z|xOP5`T)&mm@d{0mFjtKDzcrS#m>+Q7Ah4kv=>v>(WEf`4Py{20Qvo za!Fu%Jz*D)oe(S|#Mh3l$wNjA*r9|YB2OD&UDA~%?g zw{t=UvG?WgCnMCb-hk>#i0oF#`2JyBE3qs>MQ`WQxF_6;c|=7Fsn?g z`arpOF^q8++rr1NK`K-QU>Ds5NkBYIJj^{j^|j0y#sUjqaE>R#M^z=L{3#5)_tNkdv z#nI;Ac!|~NnZdw?bM3%9vB2X5Al%Cj6!G0`fCwvD{{>YbS&-n{2b^~`0|dhS5LhhG zC}{@%YIso555-n)IFL9=42FzU!BHeT0vnxD0337ZTFbSD$}~w#WCw;bViUL`g0sSM z%>wshPal*K)eem{nr;x5!+3yC9#J8k#F%5s9&zj}-1lUmNlCs;pD#8e{XE$hijU*Z;k=Ztk>_>1*m*d>;8 zPji(U!LPKI*!>KEdf7`(Yb%LD7H6er_GehSf|(DW2#4}*zg)or3M?_2CZ#u z({G3Bz_kAur&-bG`idSVv7}mZuY;R(U%#)Ncm~-P7g=9TMgnRu(v(q z(2(+aakF#sKCrrbdOQ2MH8eYRj$EUFgrx1A4t4>z0Xdd%K}ej}`Qi9{cE9%#KHqhB z*Ft3p?HQEAhjv{X$tV)HG<41_z|*mU>E`#Pe`0uhNJcpuW0N50O7^-S8vP=KPJk%w zj3*XxGeXSQMbto8!W~=IAkrm;MnxLCpF{L=G8}P^JYCkT3Z1k({wx#||MB6zn;##trS{i^u;0C(d^aiHy6Z;C(RVy+MQmj^y+mIDq1toP< zemwaXYKUA|HVe1e<`6=orjhP!22aw}um~DV&upF_x}Ib!JY|0se%wimlN9}OTfw%t zh~v3pMxKJFZW1@_@LeU7LgIJtjv1!E(tJ&;ENM%%f*!gh-MwC^-J zp+eB)L0x9-F#7(_r0561*jg*+BjlhD7L=>Q_H?1?XC`eDa{gP9GIDJW!c>u+T$LDy z6GGt{auj0~;+$j~?d(et3$!UVV%e5D`N*4t2Hr5NBi3m& ztp&5eM?$Mf%DHs<&6)G3gJekmW`Jh@NMu!S(0N182^ynZT1O=@ax1|G4uW6d?_JRy zA1R3gaH_A<7UH=-EYj2{`4nHYpXxgxLQ~6T3TS<9rnHWqZ<=abNed^vn=XsW4z?)?HZmD<&ppF>HSucEA;a|@8xCMu7q3Pnadbf zW5Qos<><*@O*^6Ed*03K@8-ME@96%XwJqr!9OTflhwx=mwS;eKr8^gjUO(KO`ciMU z%XnS@&(#j-La1ieIuOQJC!j^$u1T}(j!ADh=r^p=H$-t=tYP<>d+Yacaz}70ZFD|p zJkBrIfv2zF=q1#T%Z8A%*lyi)P&sZP{-3JPd0(ibBg{ZFqJ%Xe!Pi=M&)fG~kzEXx zA>*BqgIjlG)#$`lQ#3g=;b=(dXC$~Ush(p(YtO5Dd|?zxFmzXpLFvzPrDuDr=<$yq zS!16&T7O+b3`29SS#jM$zWnGfvU5BAn#teq{An`p*gPC!z>G)wswHjVWUG3gB2r+I z()Sh|@#?c|_8MI~`YRL5Ms_HzZkC)HP_=GOdUip7UuwPIKAT@*zx(I8fnd>doy3Ob z<|QzWVWH0X)8^;yJNDVpSC#2CGa_j$4MZoBXEg>D6w_hn?x^q zLrdx!d{Bg+ESCzQs~2OKyY9s0Sr`ZmM}G=~AytrQyRLJ1B7zabtuLeFM)6ZfJ)Nh=H-s|{$Pgt6t65?cDDC|<3b$40A=RkE%%82G@lqxJ=D2iK+>Xuz8R{arbYW^t0 zdQ%;LDw%5)I_yqtZp)p`Y{Ff-R&3k#Nlu%PZ2BX#_}vEMO?C3AWWiog<{>1bSyQEA zy+Wap^k)sT3pv;aXTV>FZwsi66&{S_;Zeop2vstsO*HK0n zp#*~^+vH$0JEw0JhzI=fnJr!`YOxv>qnkI|)(l@{kDI+4#Z(MRWX=2y5l z2tcj1Yxvc*@)nQ;h@tk(Pwy%4URs0mVY^TR<#_r4foHY-ump%%@O3D@xo+PXGBaUdI!lsn%wAY!Y44~VB~H#6gDRrR^k&WZ@^xKMgu~`u zB}On&9%KaJqTm)WHqRLyJK)j+#ZUR_A2!aqjg;84nU#yycmG(bc|hhL|1Rzr{(nWb zqzyx`nYFyJ#buS--XUBxRm+fvGwS{r&2YhZ6cDdKwIEJy%VNPcR9X1}j$9Ljy^Y~V zQWS`M>Ybf^xQ+VCjKTngTRRxfm|a4Wo|r;?vV+4o4+7qr)$c{5KXeie-D=SkzS@DK z2hBh^Mlx31!?$`CUY1uW>GciUZtCI07nQ(KYu>SMD87|P>l^ktns|G7=D5{my-v=$ z1XP$#*$B>;3=v8M``oA^*;?d%+0mkX00k7(U0Y&Uix6KM095S!n*nf?yOp%xVbBfz za}d#=7i8p}s0AOJF{HtME|Y;UQlra73iC$M8vd)0>^&*^aI?{icGM~>tB+K?B1}{T z5+Zp`|%P9+RbD!x$0wrF0( zx1N|u!bjVzW9wDFEdAlEq6?tHOvp}_bY8sueVT*`=6zA~&sC@xc<~}A_@_4CI7k*j z6%r|FZI8JOI8exsWJ5&3`l@7Vmx{l~>}Z4Q^z*j?zPC zG`6C#!&JubDI)$(ad@lwAl&wcC-K2THmXt+8dnL@S;Q^@otBI$SyF+5YCpYB`hnvH zGAqPsZP?;O$-tQxM4hB4^NoYTj-HI7kjcUHg~WQY6GFS<5lx8*@33boqRFE(#MRg0 ztHBZ&dSNa}Iw+c0g}rj;oXSat6ajQVmGG?V@gLS*V1A?+C%8os$`vcj7K#Nb@yq%r z1)E%)61l%_s0q7(!WU;9U_Ec>&ZL;C+`X?hLYDv4sVyDsEaxMQs6GF+#la<0+=-by z68tNOlRt{8p~0g~{FhTVhuB$tc}mm>cYPBz8Brh0*fW&BYaLo(5^hBSe zZFjVpt3o#q0uxDY5?6OlT^t(fkT5;*ve0YXA-JgePX^|e^rU=rq6JnLdh(Nkj9Wr; z3#Ue7OFx^iodCMpy&Q_(*4EKai#HgXV4OdH=IJ&HGbJ;y_z1B!0cws()~&&p$|9cN z#-Ujd>+RCDCzO2|SrFo7&fBEojF_w%tvt0=S>RFjNDDS&t+4Fsv%PRDVC(%@S|JQd zlN>1O5}j$tB9IfMZQ(j(rl=M_D40ymdw&n^w5QOKR)QebGW-k>p8+}SoWPWY(A~I= zXM~j|8FcR+VmSD>RjoB(yv{*@h0R617~ctVT22{M$i)Z8bh;?HYdnOfd52*x-4JC% z5b|PCz(b!(TEz@E48Tp0o!eW9y#&7XRW9J$vx9?Ze3$gN+YVbg`XmdH# zH@t%xZahDvuvDT$a&8v5R^lJdaL^MEsm16}y;7INqE(=8+{B^I)zo5ieEG@VIZDIO zHmcopy13LrZ4Z^q$;h`owGqM$OfnYR^Y?a1$sRPz1Ob|Z^mhw9;CRkwL1s``NyoQ= z?X~DTM}qjjv>qAE<~7GPa}cTajAbK~$qp6Js7&TWStTXZp$rsNYP-id9hj_F>det< zG^Pr$wm=H>xZ(T| zSqulIWmd+Qg20-PCPJO$oPj?I3A_S~=0NXc&ew+4c831muntJo0LQ3=N^iltV|KN_ zHBrM9=?}eRd%Uc_8fc!3g7Y@Ew!t@GPF#U3nEnu(%6lDv`dRD$@AY)njmW?J_A?7E zrR^#2_uAoCXWn%1eccngZlYs9o8`Z<3BUV@6!R+BMAY5md@n0&vOEl8BugsoQ^ zHgk3>=jx@og_#APmdFdsBh?Cir!fRQ!-64-hlKPVXtH?RG6^eN5{EO>IB!OA_Sjtb zW30y>v1Ov%oLssOTVG75ar~n+UIJDv(~dM+w3CQ!->-c!m~3sLIV(gfM$+Xt^b60* zY3T0-W%pm{7Y{vQ-j`*#H*^h>(EPh3Ya;eh&&K4}_qO!+9X;Gd#86_a{FPX0s~j+igzUp0PQfxvsR7VY$9Lbxz+7@BZwopyl%ZG^-pi^8>kwgNYE{*6Boz4Cb=}jGJ~z86?HOA){uF83*J+w$ zk2WkVcB3V=?O-;F`Q{Ebg3q7+*9{dnPkXHrrh}y})KC&YCJz#=Xb-(a4P)}}gM>HU)_Vxp!r|u7QsK*o4u5IS4_A{V!*p$o%ZB8;URIy9ZyT zYEO;;^=;1p2Z`t*BRj2Im%_>`&6Ktj9df@asyu=|>h90)<9C5214Rslm-@^KALG;L z^+hCcYrLOLw>t?tt;*T=-uzEQmsy6}?aTI<$C3idD|rzvJHr|%s||CUUw?!MkP<7N z@AqETqX2)zCh&}RH97NiraE(}BfA8q(Wf?csUt$!(2`EVR=}p`)7i{QP8+K8)+x7- z!)v}43Z21;9Y7)I4ZldmehPjiL7<*3eZ4))p=-fSmm%FqPQ#D$L3SnZ4JVv$-b&`L zUhM-Ax;l8WBx6K-p7>iSxB#!htrTF7dsf=kYq<3zEQZrgW_LQC^1gw)c3fB&y_vOY z*U7#0%H)QcCQ|AWqEGy5-3#HMGBju0_LD=SWh*$8C6UB<**nr-iWc-&_crj^U3%b$ zN+}kU(1EPjqU2&!fHCwsvN?O&YOo#5eF|p&8#Vv{o33n#gWuM^kdy`l$a^J59PtR5EgM!d5X#D8v82p1w^8$BlXxq3?~`qFTaL-th#S zN%9N%)BB+5<<-9;*u zLzA6x?;?bL=|&NDCVB@pYDs2`agz>o1TFAEV)1Dc>Y=l#7^5MP+o}=+%x~F&)amkv zK>y!fr)w`69ugj@`n$%wt3)g_hNach&)FrWP6{%(InM|_3F7~7&$}H1#<*{2qAqBB zzjv;8zVSC@@izVn=;b5U-E#2M zFsaS>IN^Z)P69qw@JSs5jFvFuz~$(G^vYv`lP}LqNcY;w;(zW9%0mrfh#b?PF}5;+7w`kE_?M zU+RfXZe?K*AKGywrgx!|qei4Y)xC z$WbBh8hhLOs1lLw=RfPC8MN!wMo8h}3Bk4D0;T2{z)$u&>4UjaO07O`buvbl zCwaO%)wQ=Acaw~u0wuEs(SU65OWc?*|Jp5H`tAzu*01^I*?0Lmdae)9Las0VhTRV! zjmtE4Bpo;1jS%-Z0qV)xUc9U(J-xx+_yvI7#LuuV>GuT@J=j7~LDJm18hvt91-$^L z6sRQ>>b_eJ^eFL%2pp(p?#0ZFCv6c9r%b6>Nm$DKQS(uq-p>=up$Y)sl%M4xWJPU- zQh!O_p(%+$I!He6mzp}O;7D!=V~jqG zo)3d=pne~g_?2r{O>-JjW&Q27yU2XGwuSSR*4~DY@nv4o6}SZ1`&8XxbTlfA!l`&s zeuw$_l$-xWP1L)xP%uHST*%G3C@WD+YDp&!92|!D2&_HT@^z2S@ju#S?@;V_1=Ye$ zn(1Ogsx1#0^c*0^eJK!MtlI8P-#74oMgi1wguY0nYsbI*new3fQQZUliB-h#zGkz| z`oB3#v0W%hM*r$)Ji?1QpRCG@>e>dOu2^?50j^y5^rFWDA?H$>Y*v}wF@Q9fKh-2P zKbdJ~)?uNA6_4Gr%pB9RuJT5CiQz5PwPjh!uf(D-+t+nDsBXv01HU>;`3@Chu= zE&ekk`Ot&BKcy-EilmE5YC2e=44-3K64!KsKKhwXP0~;gp@!h)EBi-`hVWk zM1d614;Lrw zMDfh}+`muQh6%EMxo$e78(J#NdzP>liT3-%dy2#6U^mrwlxCVM8ABA~z$yEK?{nt)kDV#up$t)f0U7 z8;m}>rt;ZY{d1SPQh3xh>Q|QN|8g>)m6>XIX?mP`ZL!acKlRLoOKZcv7Ae|?_EJ&2 zvQqVzhoz1tP_1GdVI3!WZYlAjgfN=(@)h^Ko^orXt)a zy=njT?lXB&+|Su4=hHPr777E%e4acUfsV*SBGG0SGcXPykimw3#^6JKPE6Su>E}vM zZOL=rJA9r@a)e8dgzEm3@4I7Yv|&O>YdVR}xtgY~2-G*`oU~BljQ@phuF$@4%P{(o z30PoNVkmBRnTi@ze`fpmFn<48p#*&0r(iz8bo-DCu?EO|?5es=?J?TaqdfOtjy65# zixG7kQFZ)@ApRnOP!M@u>SbVIiqpt1E4r-wX&0JV1eV)CEr;@<%=3$`o$`z3obrez z*=lRAWG!*o-Zh4Z`ZT6I4?CxrLfmq)grVA+{A=Po3jdDpCx3+^|0dH>81Mt*`Baq~ z{%^~(_F}?&0|GNfsJvwxt<`X3JstMni-!Jdt@mVaGN*{Qx@W67Vspm7dzKONDk{DL zT*V=d5vC2#G$+;=fIv(Sx`;>}-QD73DUAxr7fVP4-S>&ql&Ft+-Z}aK!>BwO1W!LF zC!HhJS44wR?^6Z9&40D~aZ-Md(nyY4? zV=nKmMkVlbqJDgE-f?H6y5=?EfC$wBJIfJ>GA-X-fWQTI2WLLfCd1GuE{+jn0zQ1r zJk~o&cE|nsw8d|ml}_Svw>~@ke`BCh_y|G z*0gqJTh~tq(grBX@#~Fl%8?G)L+T}z6kVpy6!PMgTYYV<* zZj^6EC=*wpJQz>ZWW$;{fu_3uc3#8hV&?9L;zl(8B^Ua3EJT+QkP3^fs|AEcS)3H5pmc|}2XvYoa+2{#dom_NmIF!}Xb-jbfPfMLu7@ z-c4_AH0eJr72hF&5?{g3(>((3lJ9pLnt7ir&o8qDJ-$!N1}{p*H%5^g~<8S70sCIJ`67!c8$+{HH+zrg$2&~+%{jcGk~4%iq!jSse3iEvXx z8j2HAtx$~#Rv4N?D@@g7_f>{sg6dW6Q^@knM+U4sjU{fh%|>#uHx&48nVXsY`G2dt z3doSi(S+cR9iP5^FYP@@K5JQmsyB$Xqx4JZY!ab7 z9Tb|u4@c(Nx%D)sR_QkNTSLb`KvJ_QESZ0JK8l~`*0L6H_V;F;H1HBYPp8w=grv_j<)gIzjf;bMX&Md&jCf+ z!pTJKYwtG^DIOx!f`;8aWG-H32krMhLWw-~?=EkZe`^Z<$M}@L2ndFB($SPZnfT?D z|JJx9#?Tf}pj5m>2TkjuEqW_Bqe!5QbT&rT-n)xfV7UiN0@aD=T8*Fd-*+a(o=z~p z+2QI{gW$TB=guR%{43yt5cT?2A$!9UK!loj0doq@*^mZO@7^}WZ~<=#$n}us_uW93 zjBxC~!YYKuhFXgWxp(HnQoY-dd<_c*Xu-ea*6*O%%jc!;-}&Y zaqXuvzWw#ga{nD?+Z&pu+Fg05F?CDz)69OO_al$&2xW2~kD~X}ytPuQf09n`!cNvT z@#H#qyEuHo1Y!O-XNRLl8@WKG+DpLCM(L9`u}~`s;IuF|BqSox??w}Z6bTzxd;$zg#~^oO1Xc9f*pu z3@DBvr;y^1pQez9mc46`UPKi-ZQJ37wA)^EDb&+bRH;CrWBTKQD>ZH0ZsI)bv6#A+ z)8RN^z;!1+Q5vB6_xgf?NviSi{u>ZV0;8Qf(|_n&tLmxf;xI|EKH$NMJW2)l*Hl}p22_G z9YV}?L({D3Iu~f(twRl$|G4XXQq4H0gXVn9%N8$OjOAg;_@3|yn<-OeIGgC1kVcOp z-hOj@FjJxU*zg&|)bVlT{1Mlp@+G~dXTgtcF1~cxwlb&;OzA5h#wZ8^{lu;JLAxXe z4zXBjKcVoPpM}|_vw_ATRfA1Z^cH_2QH@b|vdz(>w7MvAyLw>x?P z$MNDNh>u8dMT0#L-}6!RAOU`P$vb><=I zXTRJvvMnP3wz*mwI@p#LZ4rfccuEbB5IKj{!eqMYW-``9mAWBc$z)?ymyDL{+N;W00%}cEgva8JZJd++*O%>kiVQ$~>@98@+@nO!dsdiy_Zn|p5(*A2c zt6I`l8@7oL;jj_8#!T`j>{FOsai7s9w|h1IjsDYPQWT3yh>#hD%`VtYb$75 z1IX9`B*_i=X)V=S@hj&zK1CA~_=AE&d6TCw4|iK=#>3=_%**+rmaotRJ_27@)P_~< z3#Rk*&j!?Ya8BZ>EXF`l6xy|a_2FhQ87g=t*C=>!F$8ya_4isTyP~n zYu~(FSCAJ9&+J#>ICKX#7nG=O`GWy^t4&>HqO9}&iDYpfJ{+s9y@7(~47=gIx$Xoi zs0u|DY(V6IC=reZ67xla`+VM$^Rqu-Pr(}R7kwnFd&}v0DheE;RH)`2^8gS7B z1l%l2N~jqiY1WKzYz$0&g!LE_7z$l+KB)FA03eIC6alNgzQC})P{~xI!0GMAl~vjJ z&gkNW%Zned`F0MvOL|P_*c>Ed?a4N1 zDE23OaS9TMTj~GKJk1q&D|@TEdD^4uvgx{6JvltzZ0o_-uj8b;&B67de;oc?%m;!5 z{fP!JtnV9TdEFbNKE@-0b}tYH2DyUcs)aD-4bbxGUk@}o$E>1cO`P_0`w%0544LkK z4tJ@gu2#w*hnb+on+JO8d2;cooVH2bP>P%Tm~sU?ACC6+IC!~*R{6Z{F4Vj`{9i9__Lo$o&{$7UBhur)22^1hrY$I@z$@_Ib~UHQD}*Q*5mWz4urdjs?tkEWTt4aWqZ z*zZtro3TNY0U|&^l5J#E|H`0J9t|o|M*G1Dmo}IrcsP1~>Ztv;0P+~=*Z5#|8ra=M zGff}ip0Dy3G|3^3%ps&tDRFvuADVD)!4lud+i zsjSiSZ<^&@@`G*e-2d2b@J!)U{P<^^+nzhA%J=_1`!8DOXubF;zPvKmr>10K>CV1s zs^hZK!195&LeuUc*-Jz5)Z`^6{}f>o+xF*?g&%=8G5s`!-<-bq*@cp2I4|G5JV>sN zMNLP{LPporg{#H&I;;0)XyJdv8aD6k%+>QNz<71fd`bkX(t2McgD`%De7+hG*cR;vxc}n7KSpJVmU(;{vfBv_1hN7t(*RUEkpY7b; zb4FU%=Hdnpe=uEDIl-mF*32&#p6d1}^Ue0zD*Vm%TMFX^#u4@ZLG&AH&A9f^ICa)@T^{8nU%<`(M%aDy|2wVY z$N%fz;JJBOH+AN!QPbeHoxXTp9qSra%*O5yCOUuEdR9&5>Q>qynzxSR3%PvQu`cx= z1Pm-6yBQjm^`*}KBl0#pRb_NtDX9EM{Qhx=i3``|#Q%*!#)5X{)SS;lYVo+!qQ1g^ z@fU0%e1$_%bQk*HsM5*&FY}u!X9$Lt&%6Uqm$=4^`z?Qh~Y z#l2dm?*5%M!_}=fD~lDyAmM|m#{f$x)P*21GallxJw%lJvFC)6Fus)ds}Aq1H)q z(^NArA?AN&Eeg(0QL3dR4P+zi3u*$vGC8OQfFZ)k%=|VAVR7oXV=n^}@-%efFw!Vq zg$~9-H~R42l{8=BOf4q)(v3X9{aW{uV=Gx>jhq$c5+S#%2$HK2h_6~bzr`(GBau0&5)-Id;DpLh`YLdsIGDh zfGFi~6Z#f<`pu{~6+hSi{z<_ea^k1WSqg)3EiC(Wr*jIfY|mFw#yDrMum=DR&%1`e zUA7WMKr1Pmi4ybo-AWa5}#eILPNn+CsOyr5)lyPT{{tjmuJ?MFIoS= zOh*r2!Mm+fkU;I@B*znr-8Ir4C@%jSW@6QD^%n&c{b!`@dKj57JoyM{Jp_UJBBm`a zGBBAk$(cxaoy3!Vke#{QbZmEXp;HKkjIY>6zV@}CfOC^)zIdk zcBqhrDyr031(g`PkB`m%*m8*xV-JU^YiW57L{Tl%iE&K#B!g|3`4YP_HiYX*gAaRf z?%H!|AV>6^d!H;P1FpSVQ_On%K##A!WpLVv(P9}3lHcY(wCe*Q2}RlH$A*z0AaoKf zXej|uY78OFjWUQ+P|r(sN#={KPW<^5A!gJ~;^VWGr)Hqwzugp;qU&XhD@n*w@W9nk zt>$f5Gx|?_VS!Z%Z~VjXd+8=}a90a`J-a_NW?Uu>)N30J=V38I2788xpc|rPhXaF& zhoOFh&OtZ8Wue(ifs|E&%!Mhz5Fa;_gs8g1>pzGbL!y4O1fx_$N#uoCAK#qeOAk~g zsj&QXc<>o&W7c9Oj4Q~4yrRw4x~P95vL2$Aq2eL#&DpFG0Wv5^y$ZzXrMBARAmAS@ zmS_lq=Wb=dlBW4t|NA5*B?NloRHoGV)rgr9v<5%5246UpX3E9{`?OZ`c9Q8qN`G{E z6u~n=(~TpPJ_rSFf3}mhPGyXZ(rlS4&5|Rc*>84t#9}czdJD$a-Y*(2X@0~H)(t)o z30_1Lo%jNVxVPBE>zv$+uH)RZB{HJnkW){N@cfs;_=Q9d?IK+t9&c94O zT0qUjm*JD}M~^a-v8>0jQ4L7)MCs=JL}X_Z%54Kmsuc7!_&~T zyR}KES>e*B-v%uj{vpkE1g?}NBHc7l>e4g=1%q@DcDsyg%n?=&V%VO)9Ac$ChS<-( zskM)4E@5B^9?D7mfxMlQfDkpB8T{KAY#`Ca=xk;dF`SyU8AHFxWnE1^E7`uP@n{J{ zSwuc%anYF8ppv6jm*A@%;~az!a%%bpN{j*gEftDFJW(EoU|=`|MJ&J=1b~Z_8YqDh z!kfVIALbcx6vaBz_UF>}7un@qSHq`c5CcCF{~Tj)j{q!Zpz8xhNxyjEcIt>Pct?q4 z+MC1d;o|vI8gvi;;!I!Geu=}>!8~^O+u5h;B~k2qb@EPk$HD!9nPGe9T=jyf=U3=I zXXG4%&MpsM&!W!dnb3QS|L$)%YEgqG11K4K3|wQrUxwK5DJJC+EqDl3WbZ1qMg^sq zBD!Fvvf#?_^7`uarxyL~yX(K_n^c>2I6GCUOuLLo zYh4hKN~!iR*Uj15N@>bwU=a$~Z!7ND1L{Z!muLpMb=IEYDcAAMR|d5YTwY_eBZ+5&B_j%~o{^uC|ESB@c$+1g>UNDU}7hD^$AXFv6_sg?0?Xa>DbC zf+>Ns|5heng!k64T~|CypYnO4j<#IgSN39VTx2$zKmwiA(x~sNU8jdM`XN$=KBj8d zvc4qcHZ;-Z@->2+tp`i(5vT6KfXwIR3qy?^KE|dj(^nyu=pX>_tssxwd4Je`M@XXl zJ8b>6j41>Y+ z^-}XzE#THa4~l=j1suf#-bAxAYF1?wC_qnTs!Pqk*|9x!S7BF%r8TG_Jum~ET8SSJ zGQ&ECiW6uCi^Hs3H4|euLe$Q$GDTln;H7!nxGhw3jf=jbSByfnw=UQA;|b4Sh77xEx#x;>K{(0vv^#8y&3T z(mDy6aH2Vb`9iSa(d(g=hZVFhb&063knbrd!KiY`b+AJ+oQ*?HpCm>)q z(`v z+(+0Cp?amG_Zx83PuGHDt&%1f-nkOVC#p~VNBU)G;L5k9d9~E!OBn%zZ zuxc+w3Po+O*(w@QC~{;`8+!}MYGFw6#rSO{es~FX#s8qOY_-3@D_ALd%PD@anB5oA zgQ}%+q=Lw7xxxN!oJT@iPTmDNqn?IFqX?K~WY9s{nAlh4 zeTg(RANUFn7Ea87Mrpq@vM5qbVr$MH4+OCLVqM?i#i^w>50g`D2XNYyZ%JfvH2sTM z!!tGV5jHidryr_}ZY8kg#B)p<4eq z>(^%7XlRddnWicBcBnr4iOC7;3(5)G)FQp8)g7vCb*Wj2VqO$swWodn^L@H%d_O7u zV+u_Ygs|Eecr@BB5nuE-))X`vK{btiT}=%H2*{vSM%-k#T~wOfSVy%$(KAFxODx?y zU1W%ysaGXf1(TY`(1&cM5gkfK6rW`$6ou81V#5dlNQS1C>C&cR{>D!%|3T(ZtJ+L0 zGQNU_fm({M`^S7)zY7CK*Rzf1uY9F}l6{j`A4SE}A97xoBwZ8Mf1R?tUbgG0hzrpgU9Ud0>RSbJ2t!F5w5Kbk&;8%r$^5=I$# zaS~~cE-i^Q6JMBlgibr~MNexk#H$KAn3}?N*kh-{xE)1?VGQW@xA`8!rKr#Wb5=B%~ zeMf2f)X+X;xeeGB)2{0lOn=^J@Kc*tIpP2(kz8AZpUHB2L6)dr5=XE?IO3^s#xwRH*hDeAku>D0$Ej zlu|lYR)zpM-878f6*GwmazMCRV?0Wc$UkRDP+|0CT5~{g=lr5Ch(6xFs!QpaW?5#k zuxPt*kZ6K{dj81Zga~ODHXGk zTKcHb_|dS7^p$2g*}mp#($aM?3M@wg$&t*m(Nx9?7}CYHY(HDYpk~lr2Qtrnw<+Gg z*Nai^^=`B_Oi#JlLIOMzXY>2P%bITv+k~C`-0$XZB@CJ}j@$aqPEGzVug@{}@0$(3 zUe50SO^&xS=B-)V` zivq(asK--{NeaOU&rm=H7UUwR15V(aBX%OK@R zzn6OMOBOjNXRUNEH)*Uty(Y?6t>Is^Ew04_q&ZzC;~BDk=+@C!{@5IBF2Ich7z0G9 zv&!c!hx<^G^pO+Dd z^HeXRa;| zgOWLo(B9o#oolXy4-%ok4pS_;0W6m(I{{2nXZL0fMrWO_fs3lgt8kCD7H))XLCW&A zUOGi3cP@Tc&3#T${6lHb_3c#&-h8;*5M@me9)$h2=C!Vc9MIk|RFI6RE)X~ip^PKy`tTUV>;e*Yi7 z-ZH3?-gz5lfkhTw+}&Lc?(Xh#aCdiicUv45cXwxT4zRepEbeX(_wWCHeydV5otdhn zDw$-uukOAA0=WUT{HqOg2{dgVgjB}a?T=Djd~;^4sn>iETh4LJAu6=#_hjMhcFTt> zS(j!HS8>;5779TVj44&Ad?7Ol$lyA4;kKN$thhzujY8Vi?32A1o%bsNCsSeMP|fZ9 zt=`@)(%p$GGbaluzGDY>rrdCOnV2%0;=e&{qQhQ#G83Kp#7V4rCa zkrrdvYv&nu2`c_eqLwSby^{T~#v>1b@Hb$XeSoJK$&$2L3?@6#_qP%kq$s)#cgV)! z8%k>7`!S{T#<|+YD_idE+~Xw!qP%?WXsLZJuxrcveqxicRv(WqF_&L$tJl-L>Al$E zf97zy`K5f^!_0O6!NigMW_L;+9?f_%hr(3cyuP0&MYl%l7Wvn5R(1zCCK*@*zM}Rv za7B|;A)r)|?Z86I%H(2llho964HzSU0>rsTh>`Y=e|%Z5eNYVN?$`G(MACdej4q${ zc{_6ww>E&mQr@~oR8FM21LKT*TrG(`n#oENgT9g~2lS$@nFLeDMoj{1BcnP!zC#wc ze12@dHID=*G*T_acs>s9Ltk!o7d}4L=2|Zi6>@U~1QIq0dp{2j4jMJ4Q_mTpY029z z8MtN{rV_n;?k1kclK0FR5&b>ycXNDRE`&XA4!4oJyThYvXvvrRCJY-^&7cF4=vgJL z4mv}CH>C{ED(P?KG9P!pYCB!V@>(+A%4a{^f8}*dD#VuRravFAjlHSbadk8)Jf=NZ zu7J64>`FWm0Oi>U-FlbetwKQ z`k>lfJX`E_qRi)7p4*|S0IVowSWwCOUNmv*!Wi$L`rx0wUoLYqPwsh=#Oo@R+d-xP zOe$p ztW;ow!Y_TZT;_7V*!?AnVC%Dj-MtsG^9Etxjb>}}9EHaq!H* zt5!}=W_JQZl?c+qm zB6=Ryil>!Mgb_DeHb%lsLe{@Zr1tNPS?VBY3D7EYvf?YH?auH8hMf>jCB|q&vFk_O zx1E!d=YFrm=Co)31C^MnSrpYbzgJUe8%j83{dmhOO#c&#+u{Hga~F0# zVEFdHd$HDa{{N3Db%sxB{@+LE?d{W6+tbVK6PnxG?Qitq!y}lxSoS3%B4Fog>Z^KrMWB9*or9 zr$zK+Nc*qv(lv|;cY|_t&Dq#znanI<>DXBg3kb-@&Ut#6N=Mc2U~{q0ot$4|j9hVi zs;g)I1>C`Jm;ji$IDd)iy%0W_j0>{Rkys-Jg~7th%m$W=NO0g4jxH;^EX>-fu-URC z+oG;#7D|_uH*|384n;RZxkvBmryJorl=hWCFFT3SPyf)wNkNlhCw73xMHNQ=7WOT{ zgi{j=M+o^ubakj-PR&0|KI0Erlz;|@ zs`_RFsjNgx1VvU~7$Un1jExa>-yf6~m^vn6%>}@j1;%V$fe;LRzIIxB*$b=7 z!0KvU>NpRX7NOLlPv8t#88E{^{JDA9D<-rR@&a0WvUFEltpTBFMk5^Fqn<5aEI7sJ ze)aZOftWcz_wC zaIaMu9nVi&#XwND5B)SmN1&IPhhBtv6+ua#e9aWK4VytOC{#eQv$ulL*#{ZNixi)> z71pE&*M?{u=T}W=ujOaRbNm8F{6iitpVG#GYox!RK@#@4mc zsihLdwh0RASiM_$!}~ishPM$43$A9}R#ax-Cp_4*nJz{ii&fp6#3BDGd|*j9Ww@U@ zCN9}{n!N4HUl48Qkb+)M7bln3!yP@h|ARI+r%?KIp8k7bx0mC`M{`%} zqsgn?wKVL-J9mUzgL{Yn^Vwawi)&YD_lmdU^Whs7^?0CQ|QR!y*( z9ryoG+PJUuNT6!|_mcboNoA$6^C^UaD7R%#uZ`+DVVkfe3P;Y#!erdO9p|o!KUMDW z5I7JpP+$m(gK$Kw1E8~K(;tf{WM=!W#J{Rel*!3{3oJ&0BMj~saN9%uyoQOB;+1r` zuuhzczX?$Ey=jq0I!`o{pH4ACD3wUVwP!z!SQL|=83hIbU3yk;G;wDF`&|x$S_146 zC5knTmni=tT<9nn4Ec_n$5ZyKwSFWAW2TC!hmo9if9PdTfh=|Scwqv_q{-VoD<)d} zcMzpOo9m_rOO-X>R(Jlp^@CLYL-E=%gSGVOJe4v&HzV-1`|YGws~UD^f4I%wcs!%f z6-QUZ#kA9>A&8qhSx?eC)YQ9>gh!XGESvo?jl@cc^99m$gOhIn#!pM>pZRk zB`}5!Ld$dM?+S2}EMkE62~PE62-i?HA-O25ncM&Dzyj#74^Ab$<*i?dZoeg(xlEwB z;|)}l71Du{))an6S!kRO^1o!A{}EBrld#n?>RYccz-q`wI!OKOsV6nBay>UriRtoU zh!L4)!=|m^*_{t1j1x)ZD;&tkPG%zhB3Xg}L(2yRx4O2?|D-1|?DHu11w@R31eJ){ z>57O%D2t8gikAhE;R{`v=SbpBS1%P%7}Lf<>}cdtc^qrX`sdbj#u=+P7mRULf11w> zmU|IMcw!_cQGvu@f5HAin83>h?TMNY7@b8fw~F~;m@~OVq5-F8WuTwaU`M8n`D=XOhwjd3Su5g!}#)2#+%RDW#2YX{CN-2B+a`jT01nr zlUM{?A2sp2GPzY#MLldu2!c-%Br$Pq;O3zvcwp$BOH8ZTOW0L$d5?;!v6#HZcvG{ zx=nm#+zP|ZI)FE$N4uj)5F+dZO!|Z+tV$4l@W1dkqu4?N*@m%M^A0R1DYK1ju%K^@ zq{Fc6d`WUuyU4adTB-SVHuuJ7BfdroP%SddThGteTMTj2pW+fn_On}1$Q846`o6%R zg91ssFzU0c-N4%hWJ)}E`Klrtz73d4TbM|8%KfB&vn*4^{YC%}>B$&J%Y9D-`7D&{ zp+DB#i>_R@(tk9b>_kWy99B~zj>smlCQc*U`Yc&Vq&>;?W&WVZMdu+iY-Gn#Az(>DBE;j8IGyt3jQEE$CVw0lLj*1E}VlgX< ztnbMQ?e46E@?X3vBsT`%To1~&Kyj7RA=+7LsR=?p#J6dF%?xS@M83^UWxI<5C@96^ zlvJ@iLZRd1^7*C}%VvpNmS-JUjd^y&fOh^HX~K-tRP@mq_L};e$)>Gj2bQj`ml_3GnM&UH+xC!k#=`ra6Jkc8F}zwRhnQDj zT1^W(4m0jq)&fhPQq+-=K0@uUw)G$Gi8g*R!l)*jSvKz_h%!9bt@n{i6$nX68;>ow z$}}~h-zzKmEQS`@dj?a&yX55&K9b_0S60z9$J{rsv`YT@-u27ly000!gQl`UbsGq@ z!MKBd;I9wI;%Mb-wXVL%(a+3RvIAF- zgZ%cA*1kas)>PCqoy}UAmB!4v=HN^Sp@h`1!OD}PDeEZSG-JP@rj>-dUGAnLUEGIE_4w|R1*5#2-ja|Sz5p=n8L(ou6ii#a zv1w$YA*LprR1>i^wL)Q{g{lw?Tdhc_{f<Vp6yV<$7JqR3tAU{aoH*;a(5MiDdPD&*} zTlri%^TfHHOj^|Hd;L;8kcEPugTxSR8I`s`07-Za`wue)y4V7_<>6FI>DCNAvmaFB zIXSaD&{u-4ZnvH2`}L5NU8fJqD(BdFUKZ*!Y2@k1dMd$)4fUA*!xq|vbb$m6RmFO5 zcemL4PyfAeq$wgdR2HnzdNvr!k|S-jy_G=M?csv(OTQL~(@{U!;lI#?(HIFXV>7pr zqa2fM9pA`slH0qt?<$;l15i{=x)V~$+FSo%Wl&LB;&Hy>`SK34-uSDf7OI{65K;FFntR%dFHp3 zSzDQMwYr?R!F%c&f5vdLn&6%jXQ#uOn8etKN^r>f%UbKjpUS%sb1dN>qU$!97Ax5V zWLyk7DzaEO4m$vtZUUCG>r9hnxT0r)K0B1iNs~yAj%-2I_tE>s{p!8O-T=0m_pY%` z!`CXsk@8gX&$+=Hj|ZtV?tE2#)};3xF9DLAK!r?3*=gP8a?4MkOEQ6k{KT;JIO^5a zII+(F3?7O#_*YDD@3&EAIgh|C%ymtw@x&)^hBPUsvc>-@$zCPC%n0uHYAJ_Yj1qJh$ zX#rmr0;08T7I*?L$<1GReq2h7aq|8>oF2YU52Z*)=Js1%Z^wJMa!dYy^#ugMhl{bA z5XTy9#7pug85lcTV5K!Cccg#COFmDnxJw>?UvdBU_#ON#R;Z!w&+1fWbEDaLl@^cn z;+MFb*_>c_L8rwdv&dmJMsm24gI1Re?xx%)|6^I|+eA@-x?MZ!H#d?#4m$9^BWX-j$oVM6WCEADU=ObSFtrlU<@>^N! z(H)%k@xY*5+fI2NBc3fwWF?b82eG813Rwc4$$* z%U0_~T^o&xn|bf3>1(zN7*#dDqOIay)T^34W*f=GG-6qS+X>{|y$k=4=mSBN5b z??PpN5sK<<^WkbYa}L<4v7dCA9^Wq2*tgzhtw)(ztaTd3_OBK?17W?K3H!LK$b}y1 zU6?uJ);&-}fBPfvGM&ZU0W@k|skhqRBjJ4iJPBq~IR0=J6?!KPB)yxA{f#HaCG`W# zW11n4w!!Sjg|l_AX4b5lmNL9d`=x1*yq^;P`D$3oCYZHO3PTV(y9=ppz=E{ZjH^-_ zTNKgs7^1}KQ`5i)OUQ$q{I~R4G2RTJ=rTTw*kCSFGXe_Zi z79Bv958-0c<8M)~^dUrx2DYrqNx?1by$ijF*4Nx5ztn?|LjvSSa~?nLTDPF?6ca%F z1?q!~sjG$B)lTWCrB@s|Z%4z)kR=vODlcyO$B(c3NX^%HmQp!tnWhm)rly86ruAw8 zlygjYnqlq80LCV61CwBny88$g}zCpo?QZL0Nw4oMP6P|`}ylFQ2 zxoftqWP~EY1))p^9psAK_SC?(yx}EWn2ALbF}Co`qj7#fc+|OOja3E<3vjFDprCLx z>f)rq+B2^(1`oDdP*v9!~dI2-OT zo+dode9Adp?5m{@D3Hly&XG;#+J!1hWcn(s!`!l@a5d8q(N{%Dc497n*J@PVXGNsv zL@ReV{*ePK^t`pJ#5wegr^3oAER@chGo+$s+p(1mn!CZ0lOc%4sj0vc9^bZ%#MffE zBu3Sd->ziSh3_-U`@gPcOr8Jr6_8|=m{#_j{L7_5!UwszYP6z(*myUZZANfA;*M!r zszkQxR6S`S92sM4xscQLv@2*Pda5fQW*lv)NI^_&6H8$tNL*nhS!r;t5@IxWXj>d| z_7+)d*b&~AU9Ln{5B57ZQkj}*rBmvs5A*1>Zesc0;F+5%@Bf5UF6iWw$?saGa9BlF zkXWWsPp`4ERo6;7`P+W4r+D1#LksQg&*}#t2}fd8csBeTYDNd%nrK|xPPnlledSG} zX*A*uDkW5B)Kmx$*`}1Xg0)85Y|X=~@SuU%xqnm4YY`X|7T{3;t}PwKho>UW-?`{%jJVu|VsIM>_`O;CFZil}|2ixDgr1e=}orL}&S+Wn4 z+TUETZ8G-!tYYXCz-`>sr!cU{ggq~a$6H~Q9SN%`AQfu{%qfK}&N!$|w8F30u|wLy zI72kO7eLd4u1$dV;ZbMS9i_`Xu|!E~5**zH%@4Hy z_XF(jFYt26|7EU$S?k~7^SQ|BZ4U%?``6(6ar@ox9zc-M=tT7kr*=LMOQ}(C$e)zh zs?ZQe}LCM&*KqAovl)03_t+6^(){-@$!*HmMKC}oa5feJ3 z4qZdDdu|37O}`Gq#8?t#fD;o06LtVBd4H49JNS_KQ9F2pE~AV#G=BF*UqTf;OYM~^U0GUPXFJHkT~tkU&@y=b1Xhb{KV5Oj*;hz)AG&W_ zq0I*bv5(?fLsL!PaOR*vV`uoi5s9t{GVd4IB1|DM>PZgv)JRU3_QWekn&X$@gtdTK z^D#?eD^p9KQbC~~q(9d%0tcglzGI2~y4AbXb(W!;gf?-hZX<`Ra{a04aeVs2A?%c- zZuq_{swyL==Ck-aCS2V=8751YG4)gTcn0cD3hR2+jW+111_S*Dlg4ND?J%d)r}eqM z%AKAHB#=D+qfzL?7zxMhj}u6|Asfmis0v<#LArz1`jms2?nJx{Vg)CvylCvaWV<;c z31ws{6Xkhp4*83k#`5F?OXS$mwbP&DCC=YJ257A{3$rmg*aqa0l`9V|P z3ok6(BpUtoGMmZO2&@LZiB@~t#7^P?H&;`!C|g_iWOZ}QuK6bi>| zWt_o=zCKces|$Vk+k4rCgXc-?N)3Je!-hvTm2-?NTJ_~s#9(T#cLb=Vi{0&hC|N9? ze#Vx+vBrk6Y^{Kpb7>xJCByR~{FV@N>!Bii;bJjiQ|e`=J#g~B`l*3NE9i+%hGWh9 z>N<<$rpt16#ilx0T3*TNbhNY^Z(`&2i`gAU&Tuu0wLmiQ1RaOJSnoY3oUX8(uJzNR z(8lOH-cihoR+PuI^SW(E6pqU{6$ayj?a8ShimO!8hRw^Ca*0C;A8a)C$1~}%!yVy0 zRbH5WzR$amw`I;J`K+Ug`t2 z&2CH*0HCUhGP}l(>zD>vd-v3xWU&e@%)xKD(wmU3u@qDsm;CmSOie6!6`7l#LC&m! zSTYC#3T;uMs-~W^3PCwTP_#uYC2AUvKz`!LI`DrU4YCNS)t`hHR;q2%paM9IgL0JD z=?+zE>;{R08f-^@+{vP9wZ!JvaEc7g;LkOf5VlwF=mx{OefN!*otc@eW)(vGuTkOM zztXYzsBhLx{aywq!K^}a+WPpzsjcIX)u0Rm9*K*|ascqbbYHW_Oj{EW%y4IFkyW$T znR`J^GjBSmn8liD3w`Iy(qB;TOEGF-*9Tdh`fEGLIQXkc<6qnB34f?hw(*cfXrfo~PSS zd4n$=-~G>PNMPi9&$Jna;}fi`GY4WL&@b()Og(Eg*i^L~`7WRhWgzVkKA1{v#295W z5!|x^ela1AFvI?%cL*(21wB@%q*mt`C0*3|$4FJUOFv0@E5A*!=8n@i`3{{tzIL2g zV%W62xYTqb(vWqRnKkVb*;02IsE~X=e)_o;X=8V4%}`$g7snjZQ$@0{h_BG%<7+{@ zz~;K;Zd$fFrP#UVel46P#I=j!3`EaiXO_%i%-{4ae@p)}0xZfEd) zBL077o~Jc_@4URcejdK&@UM@Zx$wOud-*uVO#&>+uZR%N*$aQkG^4sinBU7citI~2 z4gX}y_(J*y(^zP+1XvQZ5#ziSS!7n6?5?<_&*HM($6NBZPwiTs6q@t*dS?`s4Sepz zqwas78*7Z7m{^$6{(iFxo>#o)>VFY?(9Onoi#8<)0(HMx)nN={xFj+cpF~s>7cUaq zC|C?_vmvM>+J6K$x+5wk zbA%)!_wdFR+zm9ian`@mLS2>!GDWuR)ZaKl+FNFSPjpq=gDHo5BD zCLUXArnrY|Ca{Ic%ak-$3+c}Zq#_?kBUYHkA|ypxwlsLL)ECZT6g>qU)83ZPFNW49 z??(2ORn*?+#p-YNbj6q8FrXEi-(H7q@cGfv{@Mj9J6u-Db(AA8URWud*im@S@*b~h( z69Oa^!b=P7hpV8qOF9|Hhp>*!sY=f-XLYovm?@4cVVNcIfNng3W^ELy93Qt-b;vN4 zX4dZ*#`ctcBwyo4i3^1&;)s$4{TKm*=nl0^ks{-B&CUlTZ^J+-rO628N?qHkF37eb zdF{#X8_e^s)g1)qqd9uv)&1d%XsB4p@=8H+BSylW{OZ`Z|h1?9h(QNmH1m_TH%OG zW#9@~io`DW+>%XMoB@%gTCbpX3XBtu+hnLqpfaExQ=}}yW;=aiFa;B&Rsb>yS(p}f z2)iedMzSD4M^P-%0mjYZB)$ZdL91J`$EYymz-@f-rB6&vBX8(mm`_{|vQ1soQEfcU zMDi8&BLowjy}oix6HkFyW17_+4Ct?zgm8$AqnYl0=kQ<9FG+uXM%@I+R=eQt8;^z0 zF{KB=z=a9nrIK~aAhqXyVmuv!52HfZCKAIQXk?Krk;iIFA%K>E z)?obN5WLB6c;N_Zf)R5AzT0Mp5fEcF2sQppbQPn3P}2T6_B0uOQ-fq?XjEo%$Yl~G z>q@ocB%szy51t&a^fg0i$!ve~Hd9z@kXR-mXV{XJYRu=DgsEMEkT1JaF_xg`Iu8G0 zdKImG?v9j4zXY;64thw3D~9~cw=u{_^Em7B+7P4VeO&K-ufEPiG^L_GsdIp3>>>#B zt!9+5-cpbY(OjahG0gb>Z!yR8X@f|i^e@8mL@cR5AG}S_=isg!f%*IOm-PhKKopl- zUQ({b&irBwGySKN{h~QC)F-<&W5~}BPDK<4r@aPX!*!rvFq_$EArr+sUrj%~8^#3{ zL!WIjZ?GYu{oOd)5;Fpqu@M- z+D!u9&!Q~GO+vk{cY_LvS^*y)U)TGap@a9lLb@RX6@4m|`lY*28mpSTP;s{N)TGUX zo1D4fgju-R;h9TZDXVx#!Ys+HlhY9dG2*R2}nhC(#$)5uutKfQcd~ULjsl@)Y;wt2^;`24Cil8FSs8_dL zK^l6V@FE};RKcH}To3#}=Rk1?3!~4vu}VUyZtPhu8(;N_N~f25wn=a39#Q`=F`5ZsT9# zfM$I#Q9B-$MJiaRu_P3rzOGC{AdYk@JyP|eJ!YV}vA{q|Z)KANFV1>o&wr_VT+rTL zqu1?w`*F87Br)ev^Xc<+_;mF=(ug^7DbT&-=k<8~^sR`@!ZCC+i_C9>V#UGVfO|{Py(@6BS=R%R9wOdS?9$tLyXe-+%+xurpe;W(oxL2VB z7c~^?$6KO;q`%bu^&ix$md|o-JQE$5%_fnYlPYsq4|QC5pu!*4jVcq`LBzw52-unY{F7^EanD<3rvHqaD-mk*I62~<+=;NE^Eg(mn6WW2Y zUwXbd*Gm#ok7Sdnlnc(s?RH~`O*6sdT3!nRe%wWiH=0*ld2co)jK|jPtx^x|I+2xD+0V@f^|v zJB9b?i}Fr{{SWqp9Lxj#_2>qm%W}KohZv9wQ!1M0b1dg`f6CwKNTB^T@9j3qgy(21 z=XQU})9Hw}-8pxiOW}h&n-bIBm1lY^=V*V**~vRMdCqeCyar(dh`V~dI^%&RDmPD} zlVmux5|!fHZ7(@4jwxw4{~Iid3YrSHEN$HWpRTe6Te!+aNHP3fK}FevV4~>_A>Xp# zW|GQe@jZv2xrHX=yw~XDlHLZo2Aiqx@(x~liVmb7yPTrvW0D0L)JhwREz4rKi%f0P ze6{rHuHliCCHO7#5NoVGE1->2ATgzYrfS}lTtg2pisHC}J-x?&ZYa<(v?jWt$_VUG z7!w0w9h+v2(YsB$+7@qkX-&WVB(18^^}p@Oxk1nGf#!hP#a@wy092#gSrbik@U#hAdC&o-K%E-yn;C^A@YO#yL7X6KxOe?_Bab(5T$aF{0V+zB-g^ zTS!Y__}kKji>{Ctk(>eYK^M=TtofEq^ooa@Q!L7q0vpMOjWN#taXSYln}3z~@Ow9v zbB*-W4-T3F$r}Vh#>at`e!qnf8?yq-k=Po=+iZt0Z1H|^o~2b)glPwJKl%bmj9CP3 zd?se-|6wC%hMnaXaJl#{1lKS(xo$K7G?e%%#X7g}F2t=x>(3W3B8}X&QyMw1GCqVp zOvdep12n}az9-|KRGSK=92hQ%jgPlfXG-zL-sEU^s#x=sH`C3CI~jzzeKYC=tM7FQ z!0PNM4xMt>;J>KxS+_cJ)8MbEM|Q{LzhLmuZ7$vjjqijb{HoSC?CgPmbaq}i{;WT% z@m>c$J|XBnX7tf@-n*49bk3b@Sl-iA8oTRu^VDqOYY5CZ-Upes@zieSX!v^{Ex^He zxf^uz)NSHxw$kCIgq^CDlgGp1)3TTE_3+!($Jy?| z@oQy#sX3znj(waTSNCWBe@?Wg1fSXYV2+W?`{*V6&0HT&PxH68i~R)!`z?ar508fj z;(_UOqZw{8)D#g}4@g}UZwSWG8-PQ}pBYaNKL_s7b%5ke%#8U;GCFO|&?>svEPAnB z)GCSbWkx{=(-s>^+e8%Zq56))-4_~`VV>n&;LMAu;fU8^j3qitixmsS7>q2XVUdKk zDeXlHeX7}t9t*g{oOhA0S`9v$`@2mwnuNTWD0fB}_&C{wu4QmlIj>DNScgY_9DziH z->H8eSfLi|hM8tVdV^OIo2D+Ji~#(_Bl&l~*VB(ZX%d0T8(gK8P}Gn2N#bepSKJNS zhxFHCoJJE{P@PZ>ub`+LPU!0PRiAx0QCn*I-Ii8}oq0jkVDF7gTtu?cVyf2YTQ-5A zjBXm?0%Hrn6P8&-A8K$}a|(sG_)YDyLx%X*>mlWJ&_GOC(Ppeg?OadN5N-b*e(Gy7 z9d{TG;(~k<2AkqPO-Z2jXlh7xM1V^O8@L@c=R6g=xHv9}rpswNYf&tK{KE0?&FgS? z>~8H-=y2S(Zw*zTTI;fYE54xGcxd$?=uaki5M84&Jx!D5nw|x4+;Ci0Mnp{A)f9a~ zwfkc6hTm{iPv9K2rd!6Z{i_(>OcYy2%jy8BK|iT`Nxse?5T1MNJMJVHrfM<5K8&K| zteQ~yJ_r6vI+pMRa9 zv|OfbIui%@_onswmFE7t`HE3FaWusid1u zFg@7KY}jUdt$gG{jt@VO#g&Wdok<0-IkUPd{#_va_>euOHPcVqCwv%{B7`SNK{2oZ z4|X7gOeFlYhsC;V@&+?_HrK}k11quAEYz4ZFYzI!mkOE=VKemN0wEG@Yg z2qsS3Zyg51sPPwLcLCPaejVlLcKS)2D_j6Q~1>z3|TWBau|Pf1f~wW4*>%0fT-{LBbcNT zin$O$sr#z|z-`VCIr=SdA<3e;#z6@2I%sky!nx)XG_1%r={vHJZ^&IyxePUrzabW8 zt=&V~Sz+_Ks<0j*@S;!J6OjDi`fjjyyphW)>U82=RLQTz_3Kt{Eb||pnH|ZdU+FDEJcHOKZ zr6q5_(^&;6=(HKh zpo>k2iI~cJ0mr_2g;>0!t0TJDZ6z1M#j2|RHOjJM)KR8fX_2}kcR&yex|p*r@EWiYTtU&$O45c6BWA%FqViEmS`40-J_rm5yL<~f7wV~^ z!K(oGV~>wa@Vv;VLjVY-As7ln9}Xd<4>S*Cxm_v|t_YQc115!V3jM1$us}cQ7@HG360q`WPPANBp6WzhOf*A zn&S#yuKj26Z*1U);r4(HAr%~q zMP`ihKjMS~>dC+V;?R7tOSj7eDZHazkv*CyQ(71jvPd#WuQD8~D8a-D+9C#-BE&CI zkPc%Qn5$$Kvt;IB&gi&>iO2u)MxgM1cM}Z*5B}Cq6{XVU5(MwR_q11>8b$OF8QA#G zk88L&jp7O}L)-x>7@3hzS>~zxM}|#i92MA&Ms)>Kb92WRvOT3J_*}V-f$1X7oPY)j zqKhD9LX@20feDsMNY*MP)SG*xe7fhKd3XpKUljUf)h?pi8f{gcbgQw|+F;VMlL-2u zTZr85nGKE=c5N$;#T2xHFA0t^1y6JZz9nH<&gm7H^+g&_7CDC}?%Cf6%k#Z<6Mt^X zVe~a$!te1xb1)m0RXb1CV4rU)7tP^`B0BvWv(0(Eun9FsU%)Yyjv}r9gglmJ4DZMlc7&Sodood#FA)=Ve!!vbANP}g zuagj%=g9dPg^bSo#4rk`SYQH<>PT4VjTNj2KgBgU60rXcW{f7^2Ve57CLu8ic5>u( zJG>vs`QE{Lk8>hV+35+KQYzx%+C$L*d1jty`zd>V$n-JLsM2=`??JB7o;@gJjx(>1 z*TE2LGw>&w<6i<85;|#ckUz?l`oTW{j)B_9gT z=`6V6LoAHCJCgcsQ3tcDM5U)fg&?{jmoS$!rBDcq1CO{z{=|17YC?_g$AIxZ+l2W3 zg#`(Dx%Y0~UfMr}_kE`An4;u@H;q4%=tQo#<%74FijcEM2skqi9S;YPi`gt+{kw=r z>pps*wSEzi;Mv>3?la*R_z8zMobfN+Wk z2!veW%nc)OK+aDJXoX(Z9|AC0fYTeZ!|=sB58_NhS;h{w;jorx)mLz{d%~AsCv(R6 zA`fvH)@kM&1W70S)Ow)~KvPU`M2z4ab`_Na+qXyxVUids7q8X8H-bSNv`qVbM}k=X zkL1mdKvWMoRvVh%HD3q*5l+|;8v}%mZU&i-cy%c4huqVE+)Ca^Dm0#pbu;VEIT1 zD))7jCjCA7j~^M}$$Tb<-;7v0W9M*b4A5`B{oVhzx&IP<7G(-5Cexta5C*zfBl;Pu zB`wpM@G{h3LIf9sd(FeJs7n^kNsxy$T=+5fWeEMDmi!ADk9o?nsNBfUDYFdUK>tQ9 zc&7g#T-aMLC{3gH^BkjgL;PQa43yzEl&DRCeObmr{SRwxWYDImD(g4B1QHIUORzCo zR^5w(Y#SE3pM`*+9cJhR z*eI&B^eCj){P05AQ)XX)(Q9y3n( zGX^N4;~n&}kr(?RTPsW39bGyp=^lP`z?FrZ5Ko-g&PsMt>(MIob8IJ+SE$Ti`jN0f z0Yzzk1c!EUx-RHBB0+-U|Lfq@>-%pQe z$HEPB(x^vUfmq5R#28Gj1!RX}B$FaRY36O=e*UW&GC%29mnJ5=yaC8oAuMp{zrrYY z6ha}_ZPEiqOtpGld;(l;UXJe{+xr{QzBAVUD5@ie0@&AKH{-wO9K!bhqw0yZGdu|l zzBSgxb~e92as1LFaSHHE--!r3>a!9(9&7|rJ*5aH3m}t2%x7?58fmVz$e;UI$jIv{ zzb6uwqH1G2-tdXX%0gbA9^K_QKM98jvh4x|;u+(L*>m+d)To5PRI2uJa0WJ?h3VhNQ-5M9WW_!-6T0 z1I9!XK-Bf)pf8%GM`L)KHCa**$}(+_{5Es(y^9j8ywc!caRasTQE*#h6_G_dv9485 zMn{)2W8uoi!!o;$`TqfzKxn^)o@k{j1!Q6_W32<$ zd?6>FQzOP@6+2=oo<;}Ry9}lKz%YmW#j7-)Cj52Ckivjlu6I0~B9bjV5p0!i=MFVhTGX#aSeCFF zaXn9C2hAPAOHvnpONBIEmx^8mzQX%3n4t(Org&in-J_y=_4v7Ren^$5&-l}4yvbt$$ZU_>$i+*cr+*?tJASqFsVpEc;;Xs&*<+B3kWp@9OZpw^u5sSBK|i z1IIpq;PutjIcp)v=+?z;7KAFo=D!NtB_0<)@^N}Po@sy%T+Ze~8mvM;9OM!EvM%ZnX0|@5( zO#UH|V0eT=cz221IP$W6pvdfNg3^F&vbFb^L&np*_+YU2J`BQXimt{f$}qzCOL^4k z!C);~FP2#|u@|53h1v_~J91xz+^fU3WqNN0{%0fjOS&hlOzvziX(ske1iEEXXRvpK zz6zm>gSKTdZvwpyBCiv(%HBVEM6J^k1fvWDIT&L(8BE}pU^1Oxtc)Ku`I%zKSS!SJ z2^nE5!88F5HHHQ`Sru9HifUgtro6XDC01B*k*TU4WNu*&ZpVR3?Yn+}mqskSsVXBs zWIzB5SmvriAGl3}JV#NVH%H~fMPg!#h_%W^!bb@v!2qk~VGKPfMKrHPHozj}Oc^{X z6e3A^g7qtg1u@4J4C6TRuqKbdIKJ)Pk@D1*8^OIc_rcFtd;CmnJfB~}Fm#}Ma}}S& zqwFktk*0C_`41Wf?qtLoKVobW1W`$8^jr!=2vNG@V}ZaZg)Z`^VR-jI*c04ItLJn3 zMO|MObRW*9RyypCaiO8_4bUGZn4hT*C2 z2VW?7zPHh-3$n^URQ-<|Ko+|YJ94EvLE%M5&$w%@qP!<~<7HoqGuX>ul7#5-Nen#) zhA?tb`s69VKcBOoPq}&b`1~n2jXiWuU9k8@UVNoiq(*1q7T4NV=UUc*^E95}PPaI8 z(G6e%?}(WP{W=X&$_g8OP#XMw*F7A9Mv4gw+~4)kT6IL-HK zWii*n{m5fC4*SBl%V|Pj2+jbXv6k`qDgE~n|8aGA&cvv9N9Ui#>Qo`YpO|Wrz}pBw ztlyL#ZjlE@C@=Xw@fg9R^zPz>d?mX?d8#Dzo+7+Ypx3%om}yH6PaF+NS8KW-J#wvV z2c*~ZlzxnWaI8eW^sBS`xdiEb-m1 zvZH3=NNsw^SDfcz$mEn8cd%S(9MkXadUoBK?ma)Pjf&#hnP#ngtv|&Pnu?ISM=*+%Q%VzXclD$ zW`QdVwXi1t5~Ds5$%-F%|2b6^zLiwB4!-D!6V*P5MnUwYrDz^z5_E~XJ6=G&Z(RA= zvf9LzVm6?}yQ~YNd&Je4O!Pq_NtSG?Z3qAhzp@^gC^iL;9@Tcnah&Dlt|;y>3$226x1Qb?a<$eQF)W;lJIMV)*>wef3gQP4lL(x4 z$-jt<#pLA{expmI{{q1#`M;=5W1VUNa@DGp;D4|zxUO2aNm3vHiekWnIRreNV2vLa zp#r!bE?5ya{5akR4onwO+QwAYaSoYRSc^kdiBEB4$o!t?aIKudlY_&ozwju&GeL+g z;ZC>F#a4w(5)NA>mh<+`1|nYm8^nk4z%QII}md)?D=wLK;K6p5e5v__8ng@ch~CTdjV8f~_yaRWIbeG!KK zLlA~U>LDsqbXVlJNtr%QH8~9Dw1{Rc;C~<{gFL4D6m?*T!|4QZWvzO)%m-ME82CK+ zAB@g*>|f_&bWN-O{qs{+lzH*vl0Qg4u-!8gTXLp(b(PTfZ!t!+L4q8ONdb=lbFrL1 zX9#=|Y-#T&)saX1fh6h^jO%iL={bhHqGf}&x7e_8na3#{A#hkkvy_aw0)QBDGDPB< zKTDsV0`D$@lfcCi8O`s32b07XW&&fbR3p-d^y%g0=cg4PlmY}w8|(+HU-R(rn$E{0 zb|uUZ1vv_4C;}Pn746h~{b@u@x5xvJ1vH)z(xjlHX&62QQCxvU#8Kj2LykG|+8M`% zrJ|`fv`rBPRih-4)S0)B3{xzx#&xse%!lnse4wY)#sj!E}JD@2KN}se>{-G)ZET0iTV{!kNaU*PP~jlKcrLn9c5AZ*m`Q z>8I0ZzfBSDu=LYuw4;mebW!AiVYw1wAHY&0ov@TNn@v3ihegcAQ;$nY9-1wge2$x_ zv|`<#NW{#dfXmD)eEs53gprGfW`bbLj~9tDlAv@FWEs)zX>5W!j&CEH$74K+DLG^) zKQ9Z;DUJ==G?Uvq>e5930iKr69P`h0y6^R{8a%l>68m#0W-#DYukI3JJ;7=OxpJMm z-{`aNa^~4)ho9K;;~zunzARuK>4nQ3Hjp%EBjVg`eC>JV{Cm zUGZb9E~LfF^3&2~^i?@!n)i+rOlTz<)Ci9$q?{&FpME%H-6|6ZeZ%y7-{jjkMy14@>|$VL4N+w&Xe3_EKwObvnDymM9mSuB`-xIaIazo?vd}*a!XXF zM~}c+3dpem2!kvaQY>TTYnsfpBD^ll@c9^B(!W<|UwswOUzIZscZ^^nv3C-2@?)cZ zis^z{;PHUFag^mL3`j!Yl{PV&&n$>W5}MIt_yNqaU=)$GCs^+tJc`IQJ2aT=$sYc7 zSqUu@=q>}$C*J&b0!}p5>dM)!x}e5elVIdYFvXxLA`BQ=v^TCrnp&!M(28ocxROu_SOu0aTDdl7m=y8`eH=gwPyW88_ ze&v1jx&R)k%#W=yFrc?bWGxB0`g=um^Zp)q1U?`z&88&9eu~_9GC`3?d=G>)5oKl% zR+Bnj#~?&-#=;y(z5q<}ZV*p14A~vWf#4~G_mDo#G62IY20?`P0utdd#tc8BzC;;F zrx8}6giF~qp2FFPV9eCLS;Yv!vp)Zs5w7?n0`N$5NJP=BG?C2Ta{}hP3d@A{9zlHG@sp`V zgugvYSIddu= zuijq6-oP(XpWhwC8!ahUCUPJ3Dx&VWf4*HqK)TDGQC?L#pU^9vM$!C8lsqdaFYIZs z;#4^vjP4d>9v0yjX3zUz6XKn&>u?L9{=G7d%Ge2wvTMVL{8wJ>#Vt};V+%0paeI?Q ztRgg{yBDPN8VJEvER0zUeIA1(rHxc3g9CC&j$zs{a`{+co{=OtE%=KBqBs(`Kpg?$ zOOLtJ4*IhUx7ce*;K9@!K+qq~RD(!|NzWX_7WkD55Uo;T_F=%sB=GuYz2-^bRw2EOija zT5{i18q8phz~$v@%r};bPop5Oh)x&qmel2NI1Io%--&i!2t1_9bC@Ahmr#U9(5u(( z(_HXQOzs=t>kJEx#66bicC5`Cgthb=lwmq@u?WZ0g$S+F*6KLC;Et}$F31)ne$(6= znpv32^yo`MuEhzs**Bs0vKBlTfzN?=oo4Ve=fxG2F4+wiT;fd_9Ok7d=QP($! z{?Z+}nt+Hf9D&*kC*xXj7cQiV=~d>LcUfp3D5|C^!rLZ{KqY4f&vD4GEpt%_?Fa=P zJ-U~y6a;XJ{QX7uRjiSfqSAo)qs&qPG*gi+N(Vy9g*iHiitGg|5JG8LZwsOZtAtV4 zBC~2SxPaZNL#M94D5AC@P8Qd0ig_grb=8p9)}U7&&AFOPR$P={3S^~B7RDoL_Q}RU zQlu9M5b6%|0&l8K7i4<```Bitkpm12qz zK}HGe-Ngy+^+|jakPnzRs?HWyMN~PVoly}!MkN4Ns|uU-B8+)-P!TlFgdAL9@M9kr zXw=tP$A!xwM93(0(UadOEn((Pu^kF+S!F268t9Of4 z?A9?>_@TP?-Cz76bTX(Ibq2-VB7^JlHsSNwEAJBS=SkST4Oy0DQ`gDAvMksCRW;N2 zPSI6a)-B7jlYU&@EuF+PQx&BL=HbM017QuF-;rEiG+dP-`g=bPe*b;%>(|1|r$-C)#|i8K z>36(o;;(@Z`tRvJFWghzXN-asq(#3UCy+$Z?my!f(H2nYc{ji8xCi>xnpEBFUitUm z_asT$gGs>Dk9{CuH<+mo%AvA%6GYxVXjw#i6O=>hro%lOzkV${LC|A*R)J_8Gx{B4 z^luOanCs?1$5na0d(zYu=^eZ85P%BSNsjx*~8OK;$DoxOGYhhZpg|AQaFE1Kz< zo7`dKi7E!mME&DHlo@LK7rFeDZCDL(Q#4@)e=f!>goc&NOA+F?%vzSL|00B86E3i1 z{VS@X)z-gd8TxMhKg2`U{{>mewd8HZV&G|}xF-m^-Lq{07bMfRjA?RmA&VUp+Ni9& z6hmkWjv?3O8lxIaPs){6zr@2?G_HkbeJtuP8nEk!J1@PRPWJ zM{^12XmAJ_pt3=BWKnOoUx8HO$gsS|c;Uw9@a>5edvug4eJps=UL!ovJ0lZJ!S%pn zFK}}_i^cTSn|x9m!a8Fl=S1S1^uYHE z{{IlqLi-P9YE=smF_03PxGVzR8mvC-d}kH2PeEzDM&k-IQ&1B{fkCqgrIYz)1KSF( zKzx6NjfjVJu>_12UYW-q;UsK_Rq#gfaK1$V6^itEkWC|+i;xskV+we*<0)XtjY}z_ zspwt@Sstf%Eairv!VB#+m8F1-3%LjqXdk6DlzF^#Izyt$Mm3B86qG274I>sk8QtpE69J=D&n~icq zNhL|_HB918NVvCW+5TVTtldBWShD|Xx>Y~_kyY8)?f(z)th4_YG_hR)pa9!N0w@aa zM1a452#_`%-&AU{qniSa@3TCGIU3zzeU>Zby$eJMu-62ns3D#$!pH-UBP75pfjpV} z5{F?Bjou|5{VWWc4}%aqCJV&}z0)`c5X?xhTTz|d1dbPxuz()_SN5b=Ht}R`oIz2a zQYk%k`TA8rs{=WvBI2NKmLOw*eqGel$8ie!*)$y?(4R(d27?efAu5KT(!hR$NFh`z z+n>NM@5=Xd@)yVvRfrTD5!NMs(*a7uaacLpJ7IJujQ$4+qf6vJ?gGBi8Q@a+Pn)y< z=%%@o{~qEY#%E6u4OaQ)E-o>-Im>w082}Lp;R(_k7OAcPh?%k=Sw!i%2cT`HOq&N%Et1 z;~t}8E&=Q32ZRT3hT+7nPW2}hqz}i?K=L4q-7DUa_HCPo?a7#UI5XfVSTOm8ui29Btx z0_^#rUxuDI5OX*RAG;zd!do5NHAqL?JvtGMP+^{2<~~*lr4EshO7XI`Nfzh}tU_un zRMC(5q_yGNm73b>Z$L*2M`$GqS_o;|v@=Ib6}g0l|FdF3T9{Tj#B7yA*4or6=071> z%Cc>(QcogRvCr*ng4I{?RtaCHB7}*6kks z|20#av;WDOytDs3#6#?Vm&lDH52klw5GZD;+>jr}&||l!=e4xvttLMqOtNwqOb?sc z9pgDlBN!e>IZAz!99}pDZarq4uhs*7Ago9kR02I&7N~}Nx`E$v{w#*aleF&rG6|t* zoCIwyI>a1W)+sy=8`w^XVVMtpA!c}xc{cQ39nV=3k$YvThc}Jr&621aUiGYZD-0X2 z+I`S?jc%yb6OXNc8n4$H6PPR}>oQ!f-%i9O&@#e$ahUSVt%f|$ zM@5rFl?SdHPoun6)^BnnY#OMF<+FCT5$M&NdIjmBhKyKnZWL&xCR6KtgOxC%1?`pP zHfc_{yQv2jw^%8GSru}1=T0@gLXnVbM!lhb?QL3jV|X3lhi#O%QEWg zT)wdOw{m)cW?3rVk_9$2Pn{Izp*5`P_9aWCMHseXHGgPSJqVlY{6ouw%jCbAd++%_ z6jiqB`9Dl~7ytht&s_Zfd6}M_-3Cgoms>X*0NI6_odJ`XyVL=YdyJjGKNQ_-iX8GT zs%=JCYQ?3Cz3MUg6+A8i1PD6hJ7tRG#S`YrN2;-WgQU}Q#vq|x!G{ndC)KS11maxz z&e8t!E!Ew;sO#7=m3O(fm(WtLq1~>&e{^Ik?5wV8*AIuk{-r#rzs+X}|Hs?^#v8!0 z_-^tRcl`fBo|W=H!Y~x}hxg^>qgxFGq#|d7ix45knrD#c1w_8XX-?8qlE@ap z8;H6PvFi^m;t>6b0tX4=)sVrj8w3otwXkx$-yFA|he>V*#h=L^{0Oey6^Q}F^6_TV z_dJNaAR6svakXaBI7BQFC`^J^X*^99jQk!?3M#Ifm0jYdlsW8^BUcLVvSNE6NG<_d zwN{*p(+J7~IeIL5fkFf`)Ia5~=R}XT!R5G?Wg5m+ZIxucJw)%OW?0lG{1o{D-mW< zivmFTwOL)` zKlxoxrR$wITiELj8&!>>~ZvdAjZYkZN6PiUG^yf2)4}qbjnt%m4Ktk0Aex z`t{0sK-HCC-gZ|l(WelX=nWMUL8Jb_cjvjSb54aGV9EN|HC3tm|7pf9{`WziHS+&mGMd@_6%Yh8A`%zNdm&B`O^D=wte# zKo|gNj$p)l|2Uvx0LAeF?1s{}v4<+bGbAYQF>SgmB3yCTyFk$UkOnzABOX3az`wz- z(^yOcT3*{$0Zne{t=#HPu*%~Uj!K;SS@2t>J=?Zl1-+(Ln%pocG-@8|fybc9Ckanv zZxqH3413`FIZxKViYfjNc^1q6)Kh*SL{1E@g+Pdo8o@I8UsY=PA63oNckw?D@=*Do zi~f1cZ*{8$%f!(hzxItU;QPOj=^451|!iSzmL=YGr@=ry&$FJ;`C|0B4Uf4Rm{h~D8z5FzukS($jh9bbM z*f$G%u+Y^#tqgQn1Ny|Z6*R`-Tz3-y6ASCzQU@f%${YT3||EbS9@;?(cIv)ru^Z&6d zvo8M|@=pGLkf%8RtB44Jhg?__mr2sk45bSX0vAcdc$u>+?~Cty!GstSdKH5q|9Xr+ z_EVI^S&+x+9r*qC{RIVcI0C=_-lH(jr(sBwKGm#|)jCO0j2N_$J57W94$Ir<3rUca zPNReDU53(qAoHKhZCc(#(QJQD*d9z9A42}Tg_dPKu?m0WPtzN2-O~IsTBZAt9ulrqK$9Rt3-s% z31@;Smntc5v0lTh&UqS4h!IcxME!0BU)z4eJkqpH?Z}RTyj0`5mU|8}Wa?c@Ulu;Y zB}o=~9X%A_D%?I8q;Z@N`dKy}1m1O;L23t|I`lJp_jN&x%{(@Rsg^`@h<4i*-Il4; zwfg?QdPu;M{a;b6+WqgUYFWx||9^<5*#FNG6umz`1#XHk*#t1mn3*Ljc7K}kdxhP9 z&L|{3z)D^>7@=^0Sab#`iHm)EaS01`{_0@Ng)2}tvSiPy!l>^nOd9akhRB9~=@z_G z`Tk_j>inPX+FRxS+MNC;E4%oQ2YCwq&&=76Q{h8W5_ATMb?p2bRj_RdG&WlKtD*L;FBA zOuPx?Xu|e33EZH&LSCij&7?_$-C6a%wWkyR=XvkeG5&Sn|E6A-|20L~`Tsx2Q}F*H zk>aMtzap(-qv?--Z8H4vZ%fR6)nZ+Ye$^UPli$iVKLA{qKqm-;Jm3yf(DS&Llmt#+ zTwNa=y*)nNTfsgkB%}Nmt%C*iY|Az%j>r951~CD{$fFr522KzSvN8Eva>+kgh)@E8 z$Pc0*zgv#(^Z3 z-e$+Iq6_!p_0_b^-LubEIW`MDzE%>(JFS17l9|YVEb-|UFGSWA<3ao&M6{EGe3A@`@1)`8=&}0f zhVf0njdWG>uaWK;2%U`XbBMt`&i}Wr z|Eub}{x4fQ{{JA)JpbQR{};D{dHuiO#0~mC|F%T`uNLc~|5s~lsQ<5^)C>FEx2V(? zB(W`}UL246SL&B|-4w`l_PL?kRUhxn&ju)WOTJi<3VL&nExa?l7=twDF47LO>Nqn0 zDMipbi^98oa#P*Lo;e+SaTd<+w`2eKPk&b2|BD&kqWwp)w0iy@)!OC%dzh!q{v%%b z^pN(S^7f|{)W>G~kEqdZ-~Q7i=G?RWryQG=BmN4tygk;hEYhjZ<&{-)9c5rD9W7t4 z9PC%OOl%(YSM+0cU!i`ro&Mef{?^uBSLFYzJO6aB|7+@;{a;si@gEQJEcE}O#JeTO zpT5ix04swd^)ZFSrQGd$;FcQk^fPV)q4I1*)+A?`hSS0P5xt7kv^p8 zN3J6kq`p%EYtOWs=0gj)Sk}#pRI|(HKo~Y>i>#WzyDjs#drMw0iHJg&%=S}Yy-Xt zz#@f3O{ETlEC;dQs9NvA$RjmjLv#`5q}2ZG2g?r^3eMcD^2a=g={_`m*7gG`{6%k9 z*7vgw6Z`PKX4_8Yv)gO_T+izKf9v@lG|Q~>f6Xv<`u~GGbMc>>9{)CQ$@27kKIr^$hh|?@nH> za>#(&zX`(d@;1obakaIV#}_X?9Gskpt@X}MdqR;$e?KUGL0wHSAoiL?2=Hh{ASLYO_uX`0r`1<2*K+? z^wTK~8vSexQ{?rFf_xY$GW2VEplHqJQJJQ~QZna%f#n-svx~n2E*l0j6rn6TPh*EP zRC&?WFU}2eVb?Z z`}5Q5gLhZ2_i0A;+P2b#<#uDY{|1h!qsaYpxH)xR|AmoybqnCq^>5C{|L**M9_DGY z|9#-oy%h@}V;PJ2hHwnhY~3qy+R(oD|Fif0?QPpgqv-wHp8|(XPwl=It>3c!ZuT74 zNn77d6JOg&?|ZuYBoGNntSOQuAUWD3_p{#zzeoTCD3Nj8?7r5sPd6rj!C(N)3_d5S=_J30g&^G(ecwox^VR!iG|NkJrLjISV>vJtY z*4jr>4g6a%+6pgN_|RX#P{uaF4QOaYPny1 z6QTF~v?kZT#qm%}&M!ddDOwKXcVGQ%dyye&qa|Kp@=GtTfv51Vwm}?>&KTJH$*e2! zHq+_4IP#W!x)R(yCeh`@sPsTTmvu=NgMA6^Kr>>xWXNtJWJmsw-V>B3Fuq6#%4aY@ z_&)7_!;1gMp!?|m{UE{JWHt2XN16DK@X?T5R3m7 zrHO@$MejS5k(p`8*~cQAtW4?3+1)Alj+L^JeERg=pP>ovxc_C^u~rX2>i2)IJFLY2 z==J)K@joBr*I56%5Q*cyg!WgY7`qSMPXKGE`KfvFK3nfIlk9y3TAxals?MjD?x680 z2tLX3XbJPpwaE2%`V`ESI}n)yuyWy2B&gxdjcb-CA};lHnXTP5mnMY_d@7XE%WEiR zL7_@GOQjupFlW8eo6KNHNom4kDSa#fKJ?U;BJ)o{UhxijEf%l=^x#07(+FP^IE}4) zPqlp)St(@$@sLTvS%%?VPKkmuA+$X)P7ml0t+jn~PKQz+2pphF%Ukrm^DP~d3(7%7 z_b!-B^d5!3L}3`CJD78h;MsBGFSvg+8_0cYXekC@o+X|Gs`RNb3EHEUgq}gKBKlOb zJRSnJApbX8la;zA@haGPx2q}26GRXW^3VeZI!>i^e@Ao*R6e)k@*Jk0$&6`Sx@ORv zmZfz@mJKIkx!XJ}>!x7&8Ps?8?<9PK?y595IIU&+59rsW_Mu><+vsIqu~k?FE$FP& zZK9eEv8}U%%6QGgg2gAv$_C3ef)Vlqg;1RwCJGi zPgjJc^&|NvOQVEfPjP+4N`abI?hZ}aMXbF2+qD~Io<%q6%vWwH>n%AAOgHj4r{1;} zGP7QonO`;PxaFV5{S>K07J< zkjB9JMkIO|vmDdbz!S zTrRAwU6~|vZNX+%^ncyoj`qK79kdMovP=H&t{MNY+aEsWe|V5zWBcEwbOIqf?$db; zqvaQ|24-s|9h}8fr-naK!p79w>Kv9j6BcmV>U3Wa%`N0fwho$^D(}a%C!i!L0sH6= zdrhz79q1#I$X1P6vZS_4lL+N#3Ij))Ys!JqtG!wYjUK-ExyicZ%zI}0p-OhA(kac0 zzH>xilr+56RfZ_q%fre7#Y-PAj-=~PCu0t#-YK|6D6<9H|NP@fofg?L*TL4)W8(u7 z3<8AlFKLL1jDk$1FGgLItH;4B1jAqRh@e+VfIRkeMp3ae|0=*DQ6c5+PkI>^xx+#=!znIxPsvu+74_T{UTCDBVwUuBpo9=AFkYOi+Gt=^cQ591AHfpI8<)GIOZ=&_4wN8z=z^yd6hxfYk- zPr=Rk<(|!UUDhZEZ$Z|)0J1{R`Y0QedX0rX`%J0Sgv840Mk! zogufzSoHRyUV(JoHf+%Zoa*oMB;+^j_pJa|NP|~XjN}tRSg_3Eb#s(iWw}%u6kgMi z+tl$J-nEVAl+5I~t6uuJ_mKT+_TTzesG0reEkCa{v;u8=|2L@kfAIc~z5n4A z?g*4$yB$_@geha=PLA7XrVrSlneH@ATX=G^4hkiPuL*;o0*9x9giQ!YRT0@(2?Z?x3f}5MrX!{whYB44X%AwSDy|jJ@%JYWyX?IwDO^G!SY5r)GHxn*!Sl=1x$`4W>zS z(~*X)KvTP#(k(t!$OYmDdiZM@QeTPrqGr-#m!|@05e*fDX2Y`l=p_>h=FPnjQrxCr5ATf3F)y z{^q}J{=dC`#s6pAdyN12AU~V_k8+{~@0Q*!#lx1Jom~oUqK895Ir%w_LoL#+;>Y8v ztoz5~i*Q@5Iq>HT5^kuq8iIYwV zx`=dspnDoMqprsglYG8HHbo6N z*t&1jQO@#oSwxd(YF+Kfwv6bBK#47m_K25>iB z=K|~U_cTg?cL=-|upPG3U1`v8_5uE5tBsU?ec8Xy_B zW?7zQc|?_$((cFH?ab)4jYg%0bt?zOpT~NFAW_vyr)swjDJpn_-9!r`8&Ji$&44zYbADPwTUaVMitHyCUB0z&Qv57 zly^bbWl*vzo4uCrk3NI46*6?J_-#p=T;^xDw2cx>U=kpGWU8ClBX|9G{q4;E`8xU% z@n43N=NtDwlgXq1$AkPBpL+g2gCfT=d&-f{c=#4N^G^1pG8V;EfX6?2sd`bEuT&IQ zk2gltB+aM80_rK)FJ1^+isi9^7iqp62hMjR<*9^;2gdh`UL-`#EyU6_yD!gINdU$J z_RnZ}y_(IU_rU9Tb}fAGoJGt5u)tupisKFVV+G@A7EwWwWo$zHyi%=Z$Cr5F#j0g&Oy6gyp{pp5H@w1oLv~HBlS%TIBfA3-j zaxMWl5RtwAT1-3J!W@O3YuE~u zfhrtF{JYdlbCku*zy3cw;Jx*l^A|ZPldTJt^(+X|RYE9Bpd6%rBv@H60|H1FgO*s3jniiffTiGHkrkcqU56#^@QJih_X1{EQ_mH!xZ$aQv5*=Bjg4Q(K1aia=>M! z*QhaAOdvtCRm=d}AYY3LHrSn-XSD=Cu!eCI0<+KkZ}EZW!pH#KKq9}!m7M~b&a21Q z>~{7?D-0?7!RZ z|0Y8-{&TN8c)b66ke_AAvYA#qzmL8Lzo2~1_d%QnFcutKf{LrI8|AYw05 zBp5$RerMK{x?b6y_^b{Ygq`|Y!aRcE^s{;sFwFjTGTiLE|7A4Dd$<4g2i<|0|Fzc} zKl*<@$d73^pS8X1a&KLU!Kx^U0+e==5fIA+HKB05t8KNyD7Q4(PnQuXPkg+k8327r zM;(@}mn%#dCFtqsE{_N@u~NI!KovfLKJdz?6%re*C!6N6$KV`&4_HNzrQuoWOzaIzuUF|t0a&^@T0nEfnNPCPsCcbyaHSl>EE zTPDa{?PiHuZUwD*6r+--lt}sKtJWBTSfiX>93loUp1h4Nd)y$CwtTm%)h$t-%Xsoy~~aWGpoF)Pd#bFF0oFwxb-Rb`g9 zh$bnr#O6IMEl?wdp7F2SCJFsDjP=yUksuh6hSg@$9 z&0_I1$lQ6NvX%8#%bM&xiSuszuG-gqv0De^`(w4D0~?!l^xcBRDxEZEuX3XptX2E` z#i#b(*l88sy|7XN*1|@s9X4a3CFI@N=W|9!_UJT<(Hw<<1vQJvhMpAAdjjqjC{gv< zNL(E&oK?Fl<*macD+$oB5}U1Dv^@F3fww1 zvdEC9NHUzS4=i)Z0IHVmoZtrb6g@wld!CvsiN5HkPpb)FC7RWq`fZm)e}^^E-?k|F zpSvphu9cuEJw{d?4ytl!tXmyI$zgR2D?W=#UlGslKZ-R3S0r6R5(O}hH>{WQv&*+H zpWnRw;o{}9x7W|F-dvnNuZrt)n4N{8Mc@W2Owy&ZnDIVmX}C$?G76mKvg>Dgn$`8~ zD3_f(ip$>Z6>2m(?co~?L&u1pwg6zpSltOiNC)5;_>M^EAY51!BzFy8TMtinZr7kc zW32ijsO`}@#A1Ku(OQNa=kZkxUT1PplNE~W3`&@hYGN%O_q9mDS!T#O0Q=xJO2P|f zQz)as=yg<3`;~X6PeHHSA5v~v@JK5ZHI!^I>Ze@gcW@DLSkckXY7rNu?QzapW4o0b zmJ*|Y=weEODR?G}tj77RS18rJ=29g~KB(!D;bm^@Gu)s>H1 zPm~%*0Uq6NUJ1t`uS8e+FdFs*!_X_BRFAE;ZCo)|OU^^g1e@p&Al+S~Wfr5$H|L%e zRp1fk?(1dipt?Ss@P5AB0&bCFatX;okMQkdL@rUjj9C6ge9d4v0O?h|ZEY*uSYlAy zNr|Sjeye?|&l}I6ejdYUc_SU#9&!SAMzkU)w&2ETwFNOtVD+6a{P6hN^S{+^2mjB) z3F7E2Jr!gnJJ``1bc_G@U{J~bKkWA&^Zz`^uQvZbSs*ZtSBSsSn58-UvP@TrDipx) z=@gI!WJbb#mF!K?EY0ORDfYNL=H}v>tZ|AXmA=N5z!WA zj#-oGvV}>=yX*k(Xc{F)c;U&vJ3;YJ6f9Ek-I-=j3DP`A0iiRlvQyvx?ms_#sOJ5E zVMvSDnM}_0V-%xe-LVw9DdG7*EKS72t_ZX09$?vigGG9mfX)>djgL=9<705N&XOb9 z!+(Ncu}ni+KL3w9y$pQ(2>6(Iof(W|GQ)M2h$z8_?A7rmUD1h8=r~{gc)cEiv-21D zf3ZPwQu2^!bO*jY1Wy(jGeMdQT)~zuKEVe*ed4({vZc>C5>KXqWke5S3~sEeP(FRC z$A3%5#pvi7;A$uz$*F3D{NhtA79ij9>n!1L#U?2*Kh7A!TwRXb^V&@f8s$n${W1{s@MN|tjvi2HyJ#>|9Oz#2mU7Q zhU#@NNv0s^xrD~GIE686&mY6KZ>g7<4OmGT9Z7F-xr*b< zG>(Ferqi%8KPw7L!LBI=LbzKbz2HpJj)|GlR&-4{AMH)!JX&hP4nOt@IK{GZbtBX-6ym{CvoSDya!S!z~fUbc+=-S1J6ZEIUHUSmI@_PLC>iOBTx36Bl_^-EDuU_5g=v2CR`R3x;#o6087uOd*ymn+;IYd7_X zkCL^LuvXPwMPPe#UPu;8Fi$Kq(6DdzuOIVtxf=$wW_i&4poaGsIotk*Hdkm?He-yY z_+GYEa$S`p(qM2SggHj>lgXr9Z7J&3rs_SRXc))@kOt!F_ic!)b(sB#PgyW`Gh!V!ZM%)#X-OPFi)#$~GVvG^k2g5st;X zhM3Qq)-y#~No=P0;5am|3fu+pK0Ig^t#lDf-WxQ>- z@vlm9cHV(|16CoLX}>EUq+GI4^T32=(N3Reo6kZ_O?uQ}S8hu&=>}xCnZx)4C2J`) zs+W(VP&aM^!O9hO+yTX>k`rruxNKu(zv@~6R*v6s@O!BXhB*CCy!Q)I`w z@Pa)0eh=_aBm8FRCSReKXV>8R{OrYZAS2?0fO&H#vy=~#)~s6WDG%5Kno~?!DDQYY z7WI<3g;tczkHsYntExH=m4FH#%<_}t^1y!6@TC0}!$X-Wo7w-OBqh;obHDjNx|80( zwEqnsChl7>bX7`b{OtSE$+bAKu`A#GrErW>}8RU&8lqR~Y4Q?;r^l z2tOV5hyCMY@IU`2sIMp+4P`HXwE@5dOc89Y_F?q>T^UxZ~ zpUq&%Gpqb}ZEN*yVS-C@aPfyG0kkUmQNu9`1d@8W{U(GvF{>hyxuH{?AM5GBUPsC>N4)+%G90uqT{joJkJ z_dkQR_d9i%mlJ6%Za$qhFuQHn9c|90xmkQI_0O`OozD(uaRf0}0+l~M|IC%7Au5ve zefqSg{{8vT;fx)o+1{1^{(Pt;&C)oXZ?3Z(!SFmyFv(#g+;5$Q_t9^R@-ont@@GTX z4`teZ{O#~-YX8eg^Be$M?Ek&Vu#*3~*L%$W_aHxJ|G#AM2MU9q%yXp~{B|(+v3pA; zu2>PtB-X>b*q^@|xyOpP4|>WlU2JC}4ugoGP$QCAO-&kCDsvb-4}b_nCBE_2ou*gs zJarU$Pg@`5^tj9~P^4Rk5|ZbG3^P!SLm4a^#gigPgh?RXv08B@`A~Wasev8#D;~9F zp>hwZXIgr-%K3#324TwdA-u{MS!jQu7z?{1DuDT5zo-Ge#fM4};K`YIh(K%i%2O+$ zrqBv}hzgwY9+$^~(9RQCo{}_3brS<~k3@ecrQXjsHr4Wbo-`ewKKCvqMd7j>Q3^!@=d&p{5f5Y&Ex*==|EJQI}gsAGN78qQHBjTeOjJUkJu(;Jsp?^ z1@wm+d8|n5&O>+r>TpxR?c-(E!{RvH52uCi*P@`HuArz0ceZ-AC4;izy0CpG5*Jc{Fwb` zyZqnD7F68-8un|+5LHRQ=dA$+k_&uEOC0UWwW%58LbDrHm@S?QPeS zie{ms`aZ%WO6H8w>um1mdvF%t!3_pkj%FwaFadh?XjVL=z=#yte@rx=)^*u2EhZfk ziC1KS^1BElz|kNno9)Xt=iF3pbZd@~)_Ju?c^-w<2d3=#Br_to8ZlL+YL`*QS7>zK zVjkFkhgos?_uD(qI&(fS*73&b%+QO!kmX8r-WAdg{OSsW4 zp#Lmf#ETyFOA2WpGxiqn&@v;NXHl;2FZopqzo=_^DySt2qgBOHSYGB8;5=T_vuMxt zJ>ck{=tZ=Q%v(KcCq-pjKkQFg_tY4!#iBW^QZmh}`-M}pcIF z9R;LdX~kppVihYD*j*mt&%0Ds%+6_asmo=obzTB+_AK5yD_@>~%8{&g(8UEH|C_JR zlKm@?tyW@A8s3Wk`{lN_y5?D3H$t}jl7>Y)<!yfi4FE-_hEUr_!tW6@1|yx@)XH2N zx#kxOHg6B!xt&e|TlD|YsAuZ`!@*>XmG9InNK;LlUvN{75V>^Fu1?%44ZIpzkfImXqTOtBONFe2tJd31qwP~n; zGRvgpB@!1}qW>UAA?BkBr&*5HQM%%OQfYd-%7C}-dBEcc7~{hk49Y<=K%QhNPr~UX z#8}*r%a3`Q68$qDj#NAq49bgh0qH5&2mFksRP$;30)>uT8Xh}K}nzo zKXDJN?9J9v6Tz!I7PKg?TmOhpkB+`wpMJak-`}n~qLZ$C|H3$4rXhMN!X!U9)>#arBujHb8JU4P<7Es} zH$$t1>w?)F-0$HuFd(r{_>Y)B@nkf%tbzNX678$A+|aqSAi)bB009BqhJq;if=F-` z`Beu0SfRZS)-*=~QZb*G1w-0bSOkYyu&C`|t^|`PKq*{fS781skAcTlB?ZxFLAL0F zuKb7ShwfZUKRayNmYq2UcJCbq=`xEEL3&?*BFk@vKHZc$>R*aoDR|kAbN`YzQBBW( z@~QVl5|Lf6fwsN>=#MM@ACvCm`;Q0tSA{MYS0 z`hP#j@9R4MvDNiCM?VI@dg|k#|EvQa>;3c3d?lDI$G&iS!455_WwLRv>lwsg|1B8m zy&Vo2*t!FpUSZ22s|u~nvC7hA-EnEld51w$FOW~y}>E1hXskse0dsMRi-G1BkzZHpM zeDqcXu#B3Af7+)1jmP~;{J-vF{HKTcvG@P$XnD%tfJ8B(-2Ca1k|kK6Q~nr?MY7ww zLS&UE00NxO2uRWpoyiENW!{iIOU?~t?a)@(rvQpDO1Eg^0q@6Gue>ro(msok=lyVY z<=Ke-@%(+3BOYd7y|I-kMSU$$GySC*Ri)GX6kH_AXFkl+O7s>H8Ic$3kcxcQ z)}*GD*Cux;nlH#H=xKb~n8yXo!_S&W3gFAmBkzGWkxx^0pGGyB?+wc3)0)n|(p=We z-e*i)F=uqMd%)wn<%`Uqr)OJ4e*pP#jrFNM2-}To_zFPfp^$v$#MVm_sJw*+)e=Y1 z#sRZ5l=MHM|4vBMd_J-?H27hVF0(X22`T1+rN;k-F4`CJps6O!S4!CHIfCAk;+^si z^Q53q9JmW4v?HVk{IZ~^TR}o;!p3v}s))8{%_Y_8rj{Fz9l`b3-38m`UGm47m500h z?Cvi$@(L;*DChZJ7gSy>7q6X{8QCaAJ20yjDmTnB|8_M+d4dSSev}>+jZXP%%aXvA z?yRx7>>0+ZlVV~dvI>aM9JYkdj*b&)kI?ug4dvMV z?M6+i{W-g_6nhW18=DK*j(ykN-=3=^P~U08eg1Z{Y_^tLZRd?+@7*&J!bPt+_A`9BanJPs?)4^v$MgR~ z{B}G4tGt0M5Xf?R7~;;mK(La^1`sQT{htT+MNV$^=T({#2y%S4S?za=jg3q5V{F}&sp|XDg`QIH4%={0% z-uTh~<3WB6Pp@QrvrtRbBJ>lNf{4K6A+>-PB%Qz zwv=@0agsTz;B}za*oLQe9<4{Ufce6O`JX+ryZv_F|CppXd*Ifb0c_L%2g8c~KbSnm z|9+5PbNyeH-`9Lm0G6KKCX3~&VF^`A0jxyMvL6G~Ky>9{0MyD^qpu=S$`et*kmT9I z)JTA8VWCc@E0V3$WHW_VRHc4laM(wG0I%ceRrFw?67Eyr{oVV!=UFTa49fNS*^B3$ z|MTOu0Sy?z_9V2@r6YRZ5e+(w4lGzD5PF>M<8fg2ZUyZcux7lF$@Y0SK&6W8S|$Lh zLNj~Z-onynaZGuCPI;Mlbo(W#Rqb1hzLLq#R?AL^Eu^Sx`oR+SQs#QGgE2^T;I4?- zdIXiw`1eCmN0e_{LZl)%g+c)y(~%wK1U?OSuOhxj$v|G)AT0N^xT5n;N{(>P`(Y&fsm_{HK8^>5(3#{7Sk zrlf9C;fm+tM9DhJ(`1Pf;_v-Ol+04FASA=5M@L~AV1F8s1TG^#NS8-Nu3UVy zNbfo%Jz6oIO<)psL@yoMOGl}x8sEPTru6uGu%C_p`wJ8=Bj)vSFMVvc{~Gq6-l+e0 z|NAh%Z@?ua1my{{uJTC-cMFt&=_-mt%9S!0+_D>ty>9?}DJU|3V}KVZjsZQ}ai5GxdTczO5`85cm9Pjz_h#ay1a`gB7=|A%$_Fws7F+ZaJk$>WKa#RAE z!r*q5G1-UrzW4E6w)ee1g|~a(`(#P~o#xSe@B9C6?;G$2=IlM(#k1#l&(HGocNCC4 zKMD~%;??u?_dS1&gET}({|XG$w*Sw6K70Ao^B1pv@|WR#^ijY6C%r+>xc})5C!@#x z{~*6_!1)3ua}=lZzfAML?(OaU1v1}+r$XE69Q(bI-}nCdmm~Psy>Gtx2K=TK{9|8g zBlCzXR#T>jkbH&2nu1xz7FGsxbfmWI`M$3~Isp6qZol8@_B-9orY?1WB)@e1K1TL0i+&o$fxG;g|;p2fM-^jhew8jcVxGb*z-W3GD}l zA%F=GiI72*q$HYcs8|aYg0RDegdI8wJM>3(!Vdl2X3s|0p+?xDKT-)hXh+z=xY?Ko z@79TJ{C#8m1MB$Z z8fPiTz`K`kE}mVSy?t|WeeuJK=Wm}qe{*sE{Q4Al^myyN4<|g&rv|YGQtGjvJ8^UgAK+p^T1eT^BjhVaY9g<9Gv5Eh=^fp5iu}C z#843t+ISSsEs>@Jkb}V)3ZhvQu#uc^8_2-Lk_W9>^1xup1BE5`I{kjT#W-#zh9+aT z7#g@(@}My94h%*+&=_soG54DZmq}mI<2ZL?Y8;rMJFrZ11TZ2bO6Issk~d3p`4y}( z@cQ}(5TbPyAU9)haO^>Ajy*6q_CVv^F+N&mPZ@s4X2jDxEWT66V&Ws|5}y=Ud> zKfS(S^OYcSm*%%T+&CX>Z#O)O!S=fB1clybDMngIcPjsAM+|JY;R5WswVS?c)Ad_# zy1udL`ue7;(2#q4#T&ZdR~cY$-a0U!7v?}Q=!OfY>s~m0*JkOr-Yk7%v-I`N(l;1D zmP8NY_pfWhdR-{MRA4zIk@>l9Axz@<+Ig=)%y}LBl=O?K+3ua}B%Kde~imtPQ(Y z9kvyfu0OV;()D*!>usp$8fw=ctEhBa@$d0*GsDgJ*loD!x|G>&Yh|`;D6?HnnQc4f z$)wqsCzF~nJCxaOYh|`;D6?HnncaEJ7TW^*bRcNZjQx%$ZuZ-CDYxC$%5B$>+g(k$ z?VcFycNV<|aXM$GF794Khd6FH#Btpa9b&cHTC8>rvD($dYPX%yU_5L%=3(8K9a6R1 zTB>#pA=1^PYD;tBc-YKPG9J1OC0&;U>9&<1Cw_loj9Ew!Dn2^>6Pw_a0+Ol-@DSuE zN!OGP3_6LXF*+2FL*?TVPKka)#@2T-Hj1{D611Q-B{W$|A*qyTcK{jp8VazUQ-Dzf zU1M%3v`_s0$Qbij9dpZF-fcL~-O0{3Iir(i^ctQc81q0K^RdMMBSY7O zQyw9hGEW{&mXEjDrOIgRyi}pcxyIX48#wX%J!8Cm>v(sa7&TI=+RPBIPv>kgC0GV9_=)R(V*d&2X$k%YYMcW?U;Kf#+X%2q1VoGKk7Bp2uD4q zMo1BKjCsfVIop_z^)dHOtYa1nSt>?2T_O-hGZuQ2u3XeIx}KrZ^;DIvYqDvQ zZ-gT=1Q@X>nW)rm=Xtuy*aRxMLrD&!#5o|BzSe84uk{Rltv9v~$US*<)`rK;Hr?>J zZqvDxs2w$5+aL`ks;4SZZucT%kdtO+>*2&{wx$@l2H8q$Dz>7zJcq3Y+DtthPHNP{ zo~kNo-xb706~vb58UYx`<=r?a0uM8X+?(_BD~@eL6Tpy}0KON=I_&Uaj)3lkyWaaA z1TliiD&wg;BDQgPfFhpG7G(5*3c)lYd*6fUYMF`g?tKq(MDl1pN4fX}a{k`aIR)cp zXZ+!Kte$ubU=1C&hRkux39Ol3IUEjZfHge85BrlkU=1TQ zqvKNTT5EQOVs~Pqp-)b8_VeXg;yrQ?2hm*$Xe<4bHZ)XERrBobpn10EXpRB8G|tuv zry2 zx5xV2_9|Q#r&RGs@A#RA2SJFEIfxQ~QNE4>B}}Vh1op{0ZaaAsee#a=$*cI}m)Hj@ zOwwg}kH~}8Q86J#f_*W44H?tK$(SaN>6^5jzKK44lltkCuIOyps{ZKQ8S59Afdx#$ zSWKu8DU1dUUyTjiuf`^h1u$v50LHp^(8RF-3ihO)$Ez36y6+m-9e^5YEuH?30)hou z8t!bjqs7>vPmSB^Q)6A98teL$xiq3gXiZt3PU)F0h8so!5-m}>;urFF2;QO`;0-2d z>G0njJCvbuTV-ghD??*V8FF6_8PaFeQ2LCV(r4_@p2lspr?IX*jWzA5=X{}O3~<;? zogECF>g?E|J&oIHPh*`!k2US7x1+UU(C}&8!2L9C?BK%Vwp@6ubK$YZh06izT$sBF z%ez~CeX~yE)e;3UjFv@!A+`&%b?}{FIfI7MXyBAaV+SW5x8=km{SZFZII%(ph26^Y zioD*6;l_1r899#Bqqaxtk$$8eX-Dc_)j@?>eZeXNEGD48flKagH)wd29I&ILYn?Yd zq7V2Hy}*=IM4X+L_WPqzTOZw#E`&$^Sf!=aN19*DpJf>zcf+Ru1NT#akwcV@+KSSV zE=ot5D0RD~8WY=XxJtS;tE7L@j2re(Dz;nh8Np*sGUExa%U`34H+@kucahjGj7SwDP3T*Q!CuORA>UFw1+6(*RW(Lvz*l7?QxZIrvE!~}1%ZV|_V|9=_UO4p| zx@Pv>u9*XukJF&FkJG^LaT=&TPU;|~i&}Y{0ZEt=b`{xUyPGN-VS>|)n@E)>p#5<( zwWvRK9$W`5uc$$5uc(3H6*W-3qPm^F^K>pEP9Bvi$tepQ(UmT4VKhgWPzsGFgUM_- z=G16-1KHPoD(YW8^#={N)Szxl*>&teYu~Ja;hQy3eY5IFZEUGQ!}T<%TTgZ^cksEs zSzTkGLv^5CV_Wf*Sln_;rKJ|yo@wjcu~5-|neJ`% zp_WSY!0+`9>I@X>SbY93d5FQz^B|5gj6eo+0{VvlhA?Ay6O;k5vpfAGkfGcdEqaq? z`>i*r@nPyUyeR1LivpX4p3fGKs~e>WyObc1pxG*pF(S^{uq*tup!IC@jM?a`vtiyv zpQqUd=t&d&$~`DaL9mG85b&;@gRv{@gO%hPof zA|T>T^T7v;Wg3DRjQDjLT#+*$zgSHM_1K&_!PgF8g z?bY;Tw}v_8DPmdh6Aj4`T*gs?KsW`fJjMXdoi5!2hey<)tw)sMj6YC3qQofdXt=b< z)=H$ILr$#3EVi6987R_hmB-?VhkWkYYxwZB=YIG)a9BbIZ7rcjIIV%NDva*uJMN%( zy@nS5p4;N@3cA%g=9Uq1Yv8LYoBQ34AvYV^&wFlHELViB)&aJR_*w&BRn^#Qd^;L0 zwWzgLWGF?0-OzC91MSrT9gY5OXgDQ#TQp2Lz8e}Yf!R`C_RUG@?t+FZPEqSHMMjjO zzCI~KCmQxiX&pGoh#S<`C&i71eNx(o>oKX(-35)FE8;`zfDcBz2b~%&Uvy^}pSINK z`aM0QicSs}9$nYDuG{)t*EP;{UFBTYJ>d?%4pi*>rQ7;Y(=`q?UFA@-1r_`BbX%+3 zU0vnwDk^t9CU%v#+fL;bc8Q*@xpYgtm*R5l#Ko?-cH1hhU0reQmWnGyW9&r3uDEvF zDy~NSt8S^d)}vupCtC-<>Y9@>-VF`A9@IKElM$M!Tk1g+4cBSH6(6Z(c%)*T4s~1x zyW!&EBkkFUjz)hsH0+Y5b!Z_YvQW2_H1%k>SlQ=1!Rnc-q`MuL2}RkqT6sYmY$k@> z-u@(66cfF;(TI=^NA_WdyeNBcTtY!E0~7>C2O#TIRXyI#dvp0x_zPm5OYIJUFipNA?80DwgUA6$ zR|KRpk;KP2BpWA~v{q^+x>7SSm72v9fuM)jSzCk#dG>YtVGI0d`J>Z0U2k23mqonq+G{1@G#BAn|al+j(SZ^20EKk?W!-@S1fiU3{ zOSg!~x653H@g^bgeI#bDk+}xzv*OT8U0R zO(*G^i}V*d5cV#MH!(<;u5zk+YWYD}`zthq{IT8l;%Zxj$Bf~IN`I0{fms9_;@b>U z#Q;Yk3g{sCd^B zvnWQ)(HX&zJr*ydGb2VbPB0o+V`Jp2jfrV?z;GqP znmA5y+WAetAOyJ7i_V!+&7e0Dh{$Gsmi4sMpEiEd(U;^ zdd@X=Wz-qB&ZskH`6ZOiKUPxe7-T6#RGJey_Tu^Q?J@2^(pjX!U4oN|4!l`Fj}upv zV}Yf8Do@Nw^BNBMo!{*V5PLA)p)r?GJ`GVSfLwA&E|5d4hdC3qpo!ryA{{d#uw z^5W%Br{L!2i)(QH^V!u6xVQ!{U)_LTo}azE0XMI}56{8H%j=u77cZVa1J5q5o}b^m z_%GJuHGiGDx7Pue?8O`i7AUx7YWZ(}tfJtyL$?S4^HmfgTr%d88~bTKKU%_M1>>Xt zhqbt-Exzq{e`0Npy1mY;3?&^p{YM927Uh`udmV6%5F6%izecx_3-ZBU2b`BEJ&SOV z=3!YoGB)CITfvcSpe@O))yy>vTGMXK@U!qWOYg zs^Fn~jY7}?H~P{RuDbtXa>&O27bsqK#Hs#1gg`C-?{&MA?!?UhPd`2K{|ER{9>%?X zDQD@tVY9xsr>yG;gDj7hFpuI5W5OY2!c4u}u=W4)>{@sS)9vl={hZ#RHOddc9TIO@ zd0iOCg8yTH2~0wmhrCzblMgNu&i0GETNFaHWTzuF6_<2W=4%v03F8bRoxfm;jAgQQ zO-H~i>eEdrmuLfq3`q+=Uknpe#w=iV%XA(ETq;P)d<1_(l)K+-GRoa0_2|F2O2~?>>Bb2R?#pmVk5vV6w3uBr#Z^oIS0h=SW(ZZ$L!Q z68qpe3>Nm&CtjqhxX5CLnHlC5ZG0|f$}kN9Ou&@iOZY%wP0w=*o|KhO5f$bi8E2HH z9yS9a0s;n@t_&E{_MJ4rKCQ}f=rQ=*O0mjO2v$jma=scELS?6ZkcONI=Vt$^B~rse z>JbGVlo~8vH3ilY&^S`eS`h>YV=#+iM3*Jm0l^>BoLdN^WR@NlGL(Sd=u!*QKuAt1 zu+jkg$|;zMqI8va7~|D=aYta@5d=H>MnU+%P8FYJ<@*TY2(tzBo7d^U6e2B(M`kIU`p2l9hls<)Om( zzT)6DB1=Hrpobkp;C8(bd<4@prIYz?24jpU=Ff%6ZxS>N3>5YlKYk2u|4Mm|AJ3IF%OLJRF^0LioC)o3DcP}OsPRh{>X_h6mO*^H=MG}L$OR^DEX&-0P~2r_V=rda}v(fss7IQ3j{w! z1mvX>Jl(K31tR7aq=JN*X|Jz;rn|=7v(I1Cb5@Hvu^@Cx2B2ol;+A=gj`{36FO29NF3uWRUPY8R+=$s3LC?Y)WSeByz(SreUur3|7Ykpl? zMeX_f2(#@XE>y+D(=R3kZsf5Cp!XTOL5tXNX^QwpOi01A5O^1bZ*vUa)i75-O6EDj zc!#|R6Cf%pW@wYIy1EfB!!6xV?Og4ph{D&rle;v(jgtAZDA$R6ld*b9pUk&+q(QZdBp5^J1z$m_lrBZ-WmP(-?#p#^u$#@a5gaJ%dkJH(334BO`j{usqbUy+{J0p2N_A|8PfYB~<4UzV3;QTfJSd?M z1+sy$vhBcpdQ?vMEr7|z&U1P^AQ6nQ@SR9#uVTEkt81a`?z6qZ@?&)10eF?fGTW96 z0S6)sP?E0Z3lkC35u=tlQn@8NS4>25#1&Y2SERCKq(@&x#ikw5>OOb_<0zCXot>#< zqeCEPB+V6fX4dI!79|ncSa!iPG>Z~?I+Im`G{G#_7yj!j@dEZod<8XQ$gwsh-j}7acVr0`XU#(G|Q!&O4Z?uLy zXUYRyxhoiu6-jXbV?L5%V*etS@Lwsb3qt_G&uJe0leUfN5el4%h5}A`Os!ocsu{?= zPz+%07K?hkwXYbnn+B^!0lq`Ww$7?+Xy|v9C3K7?<8e0#W??W0U>HnhJ$N$e2h(YP z*b7g_!(M+jIf0YjXc(aBWHOy}r_*3?JUkxG`u*V!SjlxHPa?HTNmSa$2U`|Y>7?ga z0_Rc-ErZ%C78j<_QW@&gWv3YXWlf>Wa>+W~lsd0+WpIl&#a+A*M&EG|-wB+29ao_~ z`K8;p?fT+ODW&JfP_b^x@cdS=AtcZOuWZFCFrV0j821*!J2Z4)y!C8|LFt!{cR^NU zS*W7>f){KVImy#FM)?*}QZWtGDni>W=>)W^!)rD z-4;IK#w(~I>znPJLBLz4VWo&HhInb6#We5 zB;v9};jc*)OF}4v1XpTPpfs)P0k85oazQVtX#iis_dv9)1HMY&8b&c&OKrN)+Up%r zEs~)5#sybjx?q*fa~L8}H2X2l!Ly=od`NZgD3pg0s`*~Y++O=aIvg<5nuaB}He8EI zxJFh$uaajdMg&!xm!N&{j4e?L0z~tKomCeRuIxFBT3?L9a}3_8+ba>0%N>&D+Nxsx zGb_S5%-}SNBN8EF(|a%sz0=?Rap;A4n$dqTHgI0vQZp9?x?c4|iyx>k(-onIN_k@Z z>GcKO*1AgrMTa}9>dfJ{e`xYpiRH`c*@W_IftQ$On5b-pc8)~mrAS6JWLdA%Rl;t7 zUSI!ExXmi^o!#-fMLRE6B)S@Pm<=w$d>96a>A98bJeZSO%%pev8!z-uJr)SnJM`G% z^G>~<_vs&p9!4+^76=#fBCiX%B%Es<6%{KH(&`jAV)Zj*9asyPSe{} zChsHCgufEB5L$>E1z7;GM@SOi=z~lw;z7XvXY0FN@0$!1MvO zjkK!2Mr83buW4&Vg&N0%i#2hOe-S0O*sW|F2}Ogy$L0~iggL`)NG_8(H9FRcRvmHA z6D9K_VSwnsjK4RcQ{532kG|pdetHfj3nV`uh%wsCQNO?_vE%K7n~HjN&0dX3UU3S} z4#3U-IR&q8&cP1{;PUMH`qyWt;JXhWfPW>T`ZMRsPoKU6=Vb-kbJ;uc%ka*IWHd}_obN=TF=_IQEz6D6hEAfQE9FyHEC zQLF9JAxuCj0o@WJ?W@QU@T9ZF^{YUgL8e=o1tWLNpIR=od68-jB_xmd*CRxNBU%%K z4p_o0qi9`R(%Lz~qA4wBJofYVE)2tt=)OZzW|~4I=r9aAcM(~ze|8|p`{iU-9mxGhP+I|rM5S9Do1hl;s6i{tc88iSe59KENUC?aJu={iJV zMRnE<0n=`}i0TX$T1&M~(a`kw{|E0(ELl7;qG$$}2j-4qzGPc?hXj4%cZ8ay9728@9mM}`blW=?$Ri74Z zIsFz_P4<)N9lHdg%EOe-A9LgnEuC=D^JDZLg}+2$7$eGDvE^i1Naa+j$uKF{BUsY5 zqN%-$M&^ZL%1l_ZDx#%#U$B5t(wRaW1>CofX`tzhV<#Gjn{1LpG>dN45-LI%Bg$Za zBvXSck}e^M0_Nm(&NNocRMvvn{7Qm3v?$QnL&q#bNys7dR~M|)vKL&q!W1oep(1Wp zGBALyk4yZ@>EFjFqskIG&=8^6r7PwPm13b{E@i(c37H>bmC}r9{?`2m`-i@B*^cO- z_i&lT$dA(i#%v!`9w&LbX@L@(gh^}LIxMgW* z`hSQ7zV9FS;DYJ0IikocxiJSOpeF$wDvBG!IZfhCSul3p8X8J;VH}a2pJy1A zx4g^HYP%m~+$@j@foWI5!IYqU86|vyrg@0+?N2yF8ob(JiPsrr73rOkuaZNSG=Rr9 zC~6$Cr<}>0YD^KGZX)|(OOE#(M>7;`0@GFL)4PgVTGo`4OV^=sZ6?!fIuu=5tfUO7 zUYm+a{wlXw0Rr8y$o3LUxSGyQBTPr6n^LgZ*H zFB}eLDC`}F)3Dc@Os11D3Z~;(Fqn*cy}>jX_QJt1g#AG`7|LVgneN##;2wHLgN3$hYl*4bCQPYS=-#aFVj%w?T>iuA?Xox@2)@zb5!7%a4U;& zVyfNbJNTBVVA{EKNN=hjj!HvK#JR;~-5^&SjSy{6% zx|VMQxzD%HbzZKMrecRO?Vk(FWg4PF!4`hnoLrl9l^5A)#N*xke>B_9y!BCuRY%0z zl$RYH+CM&U(xTqog`RG7mzT>o=S4L;$QF!TolT|^xuXZtL%``C&xu@>@8WKx4hwB-yIfqZ<2!VI^T)=W2{1-u86)cls9C~Ik@LjuiVv+-f{#(=DTcJ z-jXdxGj&iE&wW5)bjovtr57Ci(^yg`CnrBe#lsQECnlX0{6h{VM}MpkCdG)X9Lv?K znzhho4HA9v3VNiz0`|p>-KWrn(0O+V!c78~QNZ~dj?zSAT$A3VT7x2y+q*-}zp!YG za*HihOrZ)1r%S|>yP+5(4val%)H5@xEmsM<#6uz2SGqo6Tap7!R&jg?lC+vwj;cJ2 zy(4l6Si}|S3}6|7oBXS(YeT*kc9S4YewTrZm`UlK#uDH8VhvI~76QDQc9`uiVz1x% z8((Q249hKDgjb|Tbr##ufnn8)CR+#6eWuFFS@nwl%xRfb`cVAy=gUKot%E~=mKoVR zi}FKZYdI{v3lGZ}kyPIE+e$m0OPERfwo8wAE{f9`dwDM%R+q(V)mo_kKHO6s6embX;qq9q*#&G{oK$@aEm@THk6TQnUp$-68JzRDb{LV@;gu^`m(Jm5_D z8~}ytd&#b_t4I*a2 z4AHv9%fZ?n9JY=>=h2`QQ~QSVJjZ?$VsPtjV+$I_D>lFHX81KCJuUYj6+yfF(>^7Yf2(!}d_n`Qp1o=}X@%#R9qaEyFd`MvA70eq+}sba=ivIS4bAcpNdA zOqe%MDHIDA9tLx%nyN%^Tl(RqJjF!*!MjBp@6?m8e!W94<1g)(n+^+se6-wjiqcR2 zFvPUzmcy;r01Z_B4U{NjL~fOuSFBa11tE9RrHy{Su=<7xvJ-kT zr%j6(w_45*{8_St^%X{WRd#S}{Ur*cmDOq}y<9{Mk^=7+v`q7jSFSe*$TFK@uzz*- zOJ@p$TNH9L^9B>NJWx;3Z0>}qM1ovE0%$97ag~M^D~!MsNB>0fO_a^RNddgOj{b=_ zjz2J5xKfPYff<4O6|-z&dBqQyk%_&{V1R%am7r)9KZ2I-C!MY5 zoN+6(%u*h?N6^jIw`~UHM14im$WZ-iCy^(?ce~SmWqVhk`}J>LiRjln@%hRb800IQ z_k5N7i|lxT?AJQ=pZ((R9-rxDX?V8vS-9nmwhUdSw{Q92TLJcB_qW)UR?VMTDf{Og>Bn&mDN-l_MBWi0w7!b?bkg?H$&L`G^m_Te=~x%gYn zWy0!}ZyR-gHHjRM*vVCKSqva2Fm{FLVyfmRb%RPrP|>b>hf@NryFV81>-A@aoUjb8 z5_y8b!(^T#{6{5#pyYa&WsO?5x)Ra@de)Vl*1Fv&qpb0~F@UvmzEQfeJKmVRH1NGC zn{Myc)>So_N^j`*{I2x73A!hf(R47KhTUT{8Fj<)s5eA|3I^Ae_zm({MC|-En{1J=u;`;d7HmDcjj~j`iokUr7-vli90N5n)a^ zZwY@Lu&k*4@?szTBf% z8-xvx`2xl}^0*!V!Ou50m!hTgKae2}*czbaNAy3}#jDr@aGD0GEF811q+3rP37It#FsL$X&uF$gEdtRbC&F*cDnqaL%`68=SFjp6eu0`>d6)K?I@A?!#E2~p>w$s|g+5jw2 z9&}yGPVaeDs+797HK_x&4C3C`BMV_%uYVSSnQOF96;MmvQ;*|Z(LA*tn&_RP;kFK| zom4f>zOO`p>`i*8dmIK~*bB!&_hdSooeWQc!6ZP#*>Ex%Pfrl)_6Gggad*rgw z8yh^)*JpsO!&a2l9_i1j)_@(Me+JkRUJKvoCR4{^!#YsBVr6y6;gv{PZ}%=Pip4!} z6%ijqNf58(vt&3;*GOEcg_0e^ASiA>S<2w$8y&G0Z-&P!s#jxDq*}>L^|x9 ze(-{9<(+!NZnwMi4n1z3^G?0vpCa$mp(lKEm6|=h-l+Ray?%WT(crbWzxgH+U|BjuVY-~EzHG8ytO<-_a zQ6QpBXiQ2!O8rA{$(+NVtzaxZh)@p2mntsz8^A#Web4VYoO8w#XY8~uuGK&rQ8G*O zC6`8(oxy>&-4+W%vbt@-ptoJTJf=tu$RrKXr6cf&=Bpy>agQ*`D_*29`~k)=2~f^> z^-Eb#PJwtG`?>MLim-kZ9(%e<2XRn4HdjEE8%daihp?@M(J=Z2gS#d4g){PnK*AOI zg0Dnp*bDa%Qj!J?d4+k%H|Lk{*mS>p{p|9c z5BMRReh|m;4BjOGf}8WpVjxu^Tc%%A z>Kk?sZiClYJtM#@PnTS^EyGK)5_ZCWR|0&;UIWRDAmV(lt}n@+gzs7@tCd5)aWnlc zV}RKtus|9@^`RsR1;dewQ~A!c;D5}z;93>>Ri>Q*Dx7=^AFTG#aK~URXGn{9F|IfB zn?4ZFvp%zj*hsGIs$j~?25<3@3v=oju_L+^L&4#r`+<$X8D;^~a%$We- z`l^Q2H`_QN^E_x%hm^tI;#mX1)dMKJXLIrv0RL4NA^)L+Aun4%#HS_eH6Uqrz_LYl1uE{RQ6r}-pWLH$mNEg7%yN;FR%mDwYwCltn}wnsge zPF=qNq6s4Iry+I2Q8*4cn~Z{KJW0ben4}?3{nU;9z>hu8i$gjNIGwt2L}QPg3}>)B82 zWWHUZl+uas!;wct5glOqTcjVMs#H-ipl8e4ez|{y2q9=8 z7{5Xo6Rc!{^gqaI*GTn9eI@u0g#OP&{)iU^Pp^l@K(uYomc`upt~)A`II0kZ_hl>AH4xAS}yB?P6IpgJmb2Y@yJA^C?@Cpfh*80@4EPS6tx&HR6OqB>B^nyQ2 z{7IA>os#bJs+<|Pf8DOH$T4~WiLI?L615ouKXdm|uQq?X-Y#^Z3ti}3`V{~G|NoQu Jj<^7@2mleTJj(z8 literal 0 HcmV?d00001 diff --git a/incubator/linkace/0.0.1/helm-values.md b/incubator/linkace/0.0.1/helm-values.md new file mode 100644 index 00000000000..8694ae356fe --- /dev/null +++ b/incubator/linkace/0.0.1/helm-values.md @@ -0,0 +1,84 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| additionalContainers.nginx.image | string | `"{{ .Values.nginxImage.repository }}:{{ .Values.nginxImage.tag }}"` | | +| additionalContainers.nginx.name | string | `"nginx"` | | +| additionalContainers.nginx.ports[0].containerPort | int | `80` | | +| additionalContainers.nginx.ports[0].name | string | `"main"` | | +| additionalContainers.nginx.volumeMounts[0].mountPath | string | `"/etc/nginx/conf.d/linkace.conf"` | | +| additionalContainers.nginx.volumeMounts[0].name | string | `"linkace-config"` | | +| additionalContainers.nginx.volumeMounts[0].readOnly | bool | `true` | | +| additionalContainers.nginx.volumeMounts[0].subPath | string | `"nginx-config"` | | +| additionalContainers.nginx.volumeMounts[1].mountPath | string | `"/app"` | | +| additionalContainers.nginx.volumeMounts[1].name | string | `"app"` | | +| cronjob.annotations | object | `{}` | | +| cronjob.failedJobsHistoryLimit | int | `5` | | +| cronjob.schedule | string | `"* * * * *"` | | +| cronjob.successfulJobsHistoryLimit | int | `2` | | +| env.APP_DEBUG | bool | `false` | | +| env.APP_ENV | string | `"production"` | | +| env.APP_NAME | string | `"LinkAce"` | | +| env.APP_TIMEZONE | string | `"{{ .Values.env.TZ }}"` | | +| env.APP_URL | string | `"http://localhost"` | | +| env.BACKUP_DISK | string | `"s3"` | | +| env.BACKUP_ENABLED | bool | `false` | | +| env.BACKUP_MAX_SIZE | int | `512` | | +| env.BACKUP_NOTIFICATION_EMAIL | string | `"your@email.com"` | | +| env.CACHE_DRIVER | string | `"redis"` | | +| env.DB_CONNECTION | string | `"mysql"` | | +| env.DB_DATABASE | string | `"{{ .Values.mariadb.mariadbDatabase }}"` | | +| env.DB_PORT | string | `"3306"` | | +| env.DB_USERNAME | string | `"{{ .Values.mariadb.mariadbUsername }}"` | | +| env.REDIS_PORT | string | `"6379"` | | +| env.SESSION_DRIVER | string | `"redis"` | | +| env.TZ | string | `"UTC"` | | +| envValueFrom.APP_KEY.secretKeyRef.key | string | `"APP_KEY"` | | +| envValueFrom.APP_KEY.secretKeyRef.name | string | `"linkace-secrets"` | | +| envValueFrom.DB_HOST.secretKeyRef.key | string | `"plainhost"` | | +| envValueFrom.DB_HOST.secretKeyRef.name | string | `"mariadbcreds"` | | +| envValueFrom.DB_PASSWORD.secretKeyRef.key | string | `"mariadb-password"` | | +| envValueFrom.DB_PASSWORD.secretKeyRef.name | string | `"mariadbcreds"` | | +| envValueFrom.REDIS_HOST.secretKeyRef.key | string | `"plainhost"` | | +| envValueFrom.REDIS_HOST.secretKeyRef.name | string | `"rediscreds"` | | +| envValueFrom.REDIS_PASSWORD.secretKeyRef.key | string | `"redis-password"` | | +| envValueFrom.REDIS_PASSWORD.secretKeyRef.name | string | `"rediscreds"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/linkace"` | | +| image.tag | string | `"v1.9.1@sha256:d56fa76113e3e5ab0889a13bdfb463d12b71b3e2ec839a8ff6fa99ec036be862"` | | +| initContainers.1-create-env-file.args[0] | string | `"if [ ! -f \"/app/.env\" ]; then\n echo \"Preparing for initial installation\";\n echo \"SETUP_COMPLETED=false\" > /app/.env;\nelse\n echo \"Initial installation has already completed.\";\nfi;\n"` | | +| initContainers.1-create-env-file.command[0] | string | `"/bin/sh"` | | +| initContainers.1-create-env-file.command[1] | string | `"-c"` | | +| initContainers.1-create-env-file.image | string | `"{{ .Values.image.repository }}:{{ .Values.image.tag }}"` | | +| initContainers.1-create-env-file.volumeMounts[0].mountPath | string | `"/app"` | | +| initContainers.1-create-env-file.volumeMounts[0].name | string | `"app"` | | +| mariadb.enabled | bool | `true` | | +| mariadb.existingSecret | string | `"mariadbcreds"` | | +| mariadb.mariadbDatabase | string | `"linkace"` | | +| mariadb.mariadbUsername | string | `"linkace"` | | +| nginxImage.repository | string | `"tccr.io/truecharts/nginx"` | | +| nginxImage.tag | string | `"v1.21.6@sha256:80d87a1d4d67749d2caaa64ee061a66a946b81942ac56f4780e36f8356cee371"` | | +| persistence.app.enabled | bool | `true` | | +| persistence.app.mountPath | string | `"/app"` | | +| persistence.backups.enabled | bool | `true` | | +| persistence.backups.mountPath | string | `"/app/storage/app/backups"` | | +| persistence.logs.enabled | bool | `true` | | +| persistence.logs.mountPath | string | `"/app/storage/logs"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| redis.enabled | bool | `true` | | +| redis.existingSecret | string | `"rediscreds"` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `10160` | | +| service.main.ports.main.targetPort | int | `80` | | + +All Rights Reserved - The TrueCharts Project diff --git a/incubator/linkace/0.0.1/ix_values.yaml b/incubator/linkace/0.0.1/ix_values.yaml new file mode 100644 index 00000000000..ffe6c9420a2 --- /dev/null +++ b/incubator/linkace/0.0.1/ix_values.yaml @@ -0,0 +1,127 @@ +image: + repository: tccr.io/truecharts/linkace + tag: v1.9.1@sha256:d56fa76113e3e5ab0889a13bdfb463d12b71b3e2ec839a8ff6fa99ec036be862 + pullPolicy: IfNotPresent + +nginxImage: + repository: tccr.io/truecharts/nginx + tag: v1.21.6@sha256:80d87a1d4d67749d2caaa64ee061a66a946b81942ac56f4780e36f8356cee371 + +securityContext: + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +env: + # Internal Envs + DB_CONNECTION: "mysql" + DB_PORT: "3306" + DB_DATABASE: "{{ .Values.mariadb.mariadbDatabase }}" + DB_USERNAME: "{{ .Values.mariadb.mariadbUsername }}" + REDIS_PORT: "6379" + CACHE_DRIVER: "redis" + SESSION_DRIVER: "redis" + APP_NAME: "LinkAce" + APP_ENV: "production" + APP_TIMEZONE: "{{ .Values.env.TZ }}" + # User Envs + TZ: UTC + APP_URL: "http://localhost" + APP_DEBUG: false + BACKUP_ENABLED: false + BACKUP_DISK: s3 + BACKUP_NOTIFICATION_EMAIL: your@email.com + BACKUP_MAX_SIZE: 512 + +envValueFrom: + DB_HOST: + secretKeyRef: + name: mariadbcreds + key: plainhost + DB_PASSWORD: + secretKeyRef: + name: mariadbcreds + key: mariadb-password + REDIS_HOST: + secretKeyRef: + name: rediscreds + key: plainhost + REDIS_PASSWORD: + secretKeyRef: + name: rediscreds + key: redis-password + APP_KEY: + secretKeyRef: + name: linkace-secrets + key: APP_KEY + +additionalContainers: + nginx: + name: nginx + image: "{{ .Values.nginxImage.repository }}:{{ .Values.nginxImage.tag }}" + ports: + - containerPort: 80 + name: main + volumeMounts: + - name: linkace-config + mountPath: "/etc/nginx/conf.d/linkace.conf" + subPath: nginx-config + readOnly: true + - name: app + mountPath: "/app" + +initContainers: +# App checks ".env" for "SETUP_COMPELTED" status, to determine if it needs to run initial setup or not. +# We create this file and set it to false if it doesn't exists. +# If it exists, we let the app decide it's value (true|false) and how to proceed. + 1-create-env-file: + image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}" + volumeMounts: + - name: app + mountPath: "/app" + command: ["/bin/sh", "-c"] + args: + - > + if [ ! -f "/app/.env" ]; + then + echo "Preparing for initial installation"; + echo "SETUP_COMPLETED=false" > /app/.env; + else + echo "Initial installation has already completed."; + fi; + +cronjob: + schedule: "* * * * *" + annotations: {} + failedJobsHistoryLimit: 5 + successfulJobsHistoryLimit: 2 + +service: + main: + ports: + main: + port: 10160 + targetPort: 80 + +persistence: + app: + enabled: true + mountPath: "/app" + logs: + enabled: true + mountPath: "/app/storage/logs" + backups: + enabled: true + mountPath: "/app/storage/app/backups" + +mariadb: + enabled: true + mariadbUsername: linkace + mariadbDatabase: linkace + existingSecret: "mariadbcreds" + +redis: + enabled: true + existingSecret: "rediscreds" diff --git a/incubator/linkace/0.0.1/questions.yaml b/incubator/linkace/0.0.1/questions.yaml new file mode 100644 index 00000000000..1d395b28381 --- /dev/null +++ b/incubator/linkace/0.0.1/questions.yaml @@ -0,0 +1,2849 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + # Docker specific env + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + additional_attrs: true + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: APP_URL + label: "APP_URL" + description: "Application URL eg. https://linkace.mydomain.com" + schema: + type: string + default: "http://localhost" + - variable: APP_DEBUG + label: "APP_DEBUG" + description: "Enables the debug info" + schema: + type: boolean + default: false + - variable: BACKUP_ENABLED + label: "BACKUP_ENABLED" + description: "Enables backups" + schema: + type: boolean + default: false + - variable: BACKUP_DISK + label: "BACKUP_DISK" + description: "Backup destination" + schema: + type: string + default: "local" + enum: + - value: "local" + description: "local" + - value: "s3" + description: "s3" + - variable: BACKUP_MAX_SIZE + label: "BACKUP_MAX_SIZE" + description: "Max size of backup in MB" + schema: + type: int + default: 512 + - variable: secret + group: "Container Configuration" + label: "Secret Image Environment" + schema: + additional_attrs: true + type: dict + attrs: + - variable: CRON_TOKEN + label: "CRON_TOKEN (Generate this inside the app)" + description: "Generate token inside the app and come back later to fill this." + schema: + type: string + default: "" + - variable: AWS_ACCESS_KEY_ID + label: "AWS_ACCESS_KEY_ID" + description: "AWS Access Key ID" + schema: + type: string + default: "" + - variable: AWS_SECRET_ACCESS_KEY + label: "AWS_SECRET_ACCESS_KEY" + description: "AWS Secret Access Key" + schema: + type: string + default: "" + - variable: AWS_DEFAULT_REGION + label: "AWS_DEFAULT_REGION" + description: "AWS Default Region" + schema: + type: string + default: "" + - variable: AWS_BUCKET + label: "AWS_BUCKET" + description: "AWS Bucket" + schema: + type: string + default: "" + - variable: MAIL_FROM_ADDRESS + label: "MAIL_FROM_ADDRESS" + description: "Mail from Address" + schema: + type: string + default: "" + - variable: MAIL_FROM_NAME + label: "MAIL_FROM_NAME" + description: "Mail from Name" + schema: + type: string + default: "" + - variable: MAIL_DRIVER + label: "MAIL_DRIVER" + description: "Mail Driver" + schema: + type: string + default: "smtp" + enum: + - value: "smtp" + description: "smtp" + - value: "mailgun" + description: "mailgun" + - value: "sendmail" + description: "sendmail" + - value: "ses" + description: "ses" + - value: "postmark" + description: "postmark" + - value: "log" + description: "log" + - value: "array" + description: "array" + - variable: MAIL_HOST + label: "MAIL_HOST" + description: "Mail Host" + schema: + type: string + default: "" + - variable: MAIL_PORT + label: "MAIL_PORT" + description: "Mail Port" + schema: + type: int + - variable: MAIL_USERNAME + label: "MAIL_USERNAME" + description: "Mail Username" + schema: + type: string + default: "" + - variable: MAIL_PASSWORD + label: "MAIL_PASSWORD" + description: "Mail Password" + schema: + type: string + default: "" + - variable: MAIL_ENCRYPTION + label: "MAIL_ENCRYPTION" + description: "Mail Encryption" + schema: + type: string + default: "tls" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10160 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 80 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: app + label: "App Storage" + description: "Stores the Application." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: logs + label: "App Log Storage" + description: "Stores the Application Logs." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: backups + label: "App Backup Storage" + description: "Stores the Application Backup." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: true + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/incubator/linkace/0.0.1/security.md b/incubator/linkace/0.0.1/security.md new file mode 100644 index 00000000000..77a0d570b2e --- /dev/null +++ b/incubator/linkace/0.0.1/security.md @@ -0,0 +1,714 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: linkace/charts/mariadb/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |

Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'inotify' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-mariadb' of StatefulSet 'RELEASE-NAME-mariadb' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'inotify' of StatefulSet 'RELEASE-NAME-mariadb' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'inotify' of StatefulSet 'RELEASE-NAME-mariadb' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'inotify' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-mariadb' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'inotify' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'inotify' of StatefulSet 'RELEASE-NAME-mariadb' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'inotify' of StatefulSet 'RELEASE-NAME-mariadb' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'inotify' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'inotify' of StatefulSet 'RELEASE-NAME-mariadb' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-mariadb' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'inotify' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-mariadb' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'inotify' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-mariadb' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'inotify' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'inotify' of StatefulSet 'RELEASE-NAME-redis' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'inotify' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'inotify' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'inotify' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'inotify' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'inotify' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'inotify' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'inotify' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'inotify' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'inotify' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-redis' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container '1-create-env-file' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'inotify' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'nginx' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container '1-create-env-file' of Deployment 'RELEASE-NAME-linkace' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-linkace' of Deployment 'RELEASE-NAME-linkace' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'inotify' of Deployment 'RELEASE-NAME-linkace' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'nginx' of Deployment 'RELEASE-NAME-linkace' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container '1-create-env-file' of Deployment 'RELEASE-NAME-linkace' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'inotify' of Deployment 'RELEASE-NAME-linkace' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'nginx' of Deployment 'RELEASE-NAME-linkace' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container '1-create-env-file' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-linkace' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'inotify' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'nginx' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container '1-create-env-file' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'inotify' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'nginx' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container '1-create-env-file' of Deployment 'RELEASE-NAME-linkace' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'inotify' of Deployment 'RELEASE-NAME-linkace' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'nginx' of Deployment 'RELEASE-NAME-linkace' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container '1-create-env-file' of Deployment 'RELEASE-NAME-linkace' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'inotify' of Deployment 'RELEASE-NAME-linkace' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'nginx' of Deployment 'RELEASE-NAME-linkace' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'inotify' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container '1-create-env-file' of Deployment 'RELEASE-NAME-linkace' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'inotify' of Deployment 'RELEASE-NAME-linkace' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'nginx' of Deployment 'RELEASE-NAME-linkace' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container '1-create-env-file' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-linkace' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'inotify' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'nginx' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container '1-create-env-file' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-linkace' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'inotify' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'nginx' of Deployment 'RELEASE-NAME-linkace' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-linkace' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + 'tccr.io/truecharts/linkace:v1.9.1@sha256:d56fa76113e3e5ab0889a13bdfb463d12b71b3e2ec839a8ff6fa99ec036be862' + tccr.io/truecharts/linkace:v1.9.1@sha256:d56fa76113e3e5ab0889a13bdfb463d12b71b3e2ec839a8ff6fa99ec036be862 + - 'tccr.io/truecharts/nginx:v1.21.6@sha256:80d87a1d4d67749d2caaa64ee061a66a946b81942ac56f4780e36f8356cee371' + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/mariadb:v10.6.5@sha256:c791efc33f2d5fc972dc67bb015deba4b1a10def2b2f5058550f58415a34fb42 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/redis:v6.2.6@sha256:f744ac43c6ffe504f92c5e1238ce022ca3fab810f44ca11fb4a4919385b7f2e3 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + + + +#### Container: tccr.io/truecharts/linkace:v1.9.1@sha256:d56fa76113e3e5ab0889a13bdfb463d12b71b3e2ec839a8ff6fa99ec036be862 (alpine 3.15.0) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**node-pkg** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/mariadb:v10.6.5@sha256:c791efc33f2d5fc972dc67bb015deba4b1a10def2b2f5058550f58415a34fb42 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:f744ac43c6ffe504f92c5e1238ce022ca3fab810f44ca11fb4a4919385b7f2e3 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/incubator/linkace/0.0.1/templates/_cronjob.tpl b/incubator/linkace/0.0.1/templates/_cronjob.tpl new file mode 100644 index 00000000000..0baac48a52a --- /dev/null +++ b/incubator/linkace/0.0.1/templates/_cronjob.tpl @@ -0,0 +1,53 @@ +{{/* Define the cronjob */}} +{{- define "linkace.cronjob" -}} +{{- if .Values.secret.CRON_TOKEN }} +{{- $jobName := include "common.names.fullname" . }} + +--- +apiVersion: batch/v1 +kind: CronJob +metadata: + name: {{ printf "%s-cronjob" $jobName }} + labels: + {{- include "common.labels" . | nindent 4 }} +spec: + schedule: "{{ .Values.cronjob.schedule }}" + concurrencyPolicy: Forbid + {{- with .Values.cronjob.failedJobsHistoryLimit }} + failedJobsHistoryLimit: {{ . }} + {{- end }} + {{- with .Values.cronjob.successfulJobsHistoryLimit }} + successfulJobsHistoryLimit: {{ . }} + {{- end }} + jobTemplate: + metadata: + spec: + template: + metadata: + spec: + securityContext: + runAsUser: 568 + runAsGroup: 568 + restartPolicy: Never + containers: + - name: {{ .Chart.Name }} + securityContext: + privileged: false + readOnlyRootFilesystem: true + allowPrivilegeEscalation: false + runAsNonRoot: true + capabilities: + drop: + - ALL + env: + - name: CRON_TOKEN + value: {{ .Values.secret.CRON_TOKEN }} + image: "{{ .Values.alpineImage.repository }}:{{ .Values.alpineImage.tag }}" + args: + - curl + - "http://{{ $jobName }}.ix-{{ .Release.Name }}.svc.cluster.local:{{ .Values.service.main.ports.main.port }}/cron/$(CRON_TOKEN)" + resources: +{{ toYaml .Values.resources | indent 16 }} + +{{- end -}} +{{- end }} diff --git a/incubator/linkace/0.0.1/templates/_secrets.tpl b/incubator/linkace/0.0.1/templates/_secrets.tpl new file mode 100644 index 00000000000..af4b65b924b --- /dev/null +++ b/incubator/linkace/0.0.1/templates/_secrets.tpl @@ -0,0 +1,20 @@ +{{/* Define the secrets */}} +{{- define "linkace.secrets" -}} +--- + +apiVersion: v1 +kind: Secret +type: Opaque +metadata: + name: linkace-secrets +{{- $linkaceprevious := lookup "v1" "Secret" .Release.Namespace "linkace-secrets" }} +{{- $app_key := "" }} +data: + {{- if $linkaceprevious}} + APP_KEY: {{ index $linkaceprevious.data "APP_KEY" }} + {{- else }} + {{- $app_key := randAlphaNum 32 }} + APP_KEY: {{ $app_key | b64enc | quote }} + {{- end }} + +{{- end -}} diff --git a/incubator/linkace/0.0.1/templates/common.yaml b/incubator/linkace/0.0.1/templates/common.yaml new file mode 100644 index 00000000000..bc265dfb097 --- /dev/null +++ b/incubator/linkace/0.0.1/templates/common.yaml @@ -0,0 +1,23 @@ +{{/* Make sure all variables are set properly */}} +{{ include "common.setup" . }} + +{{/* Append the general configMap volume to the volumes */}} +{{- define "linkace.harcodedValues" -}} +persistence: + linkace-config: + enabled: "true" + mountPath: "/etc/nginx/conf.d/linkace.conf" + subPath: "nginx-config" + type: "custom" + volumeSpec: + configMap: + name: {{ printf "%v-config" (include "common.names.fullname" .) }} +{{- end -}} +{{- $_ := mergeOverwrite .Values (include "linkace.harcodedValues" . | fromYaml) -}} + +{{- include "linkace.cronjob" . }} + +{{- include "linkace.secrets" . }} + +{{/* Render the templates */}} +{{ include "common.postSetup" . }} diff --git a/incubator/linkace/0.0.1/templates/configmap.yaml b/incubator/linkace/0.0.1/templates/configmap.yaml new file mode 100644 index 00000000000..7a84cf9ab31 --- /dev/null +++ b/incubator/linkace/0.0.1/templates/configmap.yaml @@ -0,0 +1,65 @@ +--- +apiVersion: v1 +kind: ConfigMap +metadata: + name: {{ include "common.names.fullname" . }}-config + labels: + {{- include "common.labels" . | nindent 4 }} +data: + nginx-config: |- + server { + root /app/public; + server_name _; + index index.php; + charset utf-8; + client_max_body_size 20M; + port_in_redirect off; + + # Choose the connection method + listen 0.0.0.0:8080; + + # Content security headers for Laravel + add_header X-Frame-Options "SAMEORIGIN"; + add_header X-XSS-Protection "1; mode=block"; + add_header X-Content-Type-Options "nosniff"; + + # Gzip + gzip on; + gzip_vary on; + gzip_comp_level 8; + gzip_min_length 256; + gzip_proxied expired no-cache no-store private auth; + gzip_types application/javascript application/x-javascript application/xhtml+xml font/woff font/woff2 image/svg+xml image/x-icon text/css text/javascript text/plain text/xml; + + # Location configs + location / { + try_files $uri $uri/ /index.php?$query_string; + } + + # Assets and media files + location ~* \.(?:css|js|map|scss|jpg|jpeg|png|gif|mp4|woff|woff2|ico|svg|webmanifest)$ { + expires max; + access_log off; + add_header Cache-Control "public"; + try_files $uri =404; + } + + location = /favicon.ico { access_log off; log_not_found off; } + location = /robots.txt { access_log off; log_not_found off; } + + # Error pages + error_page 404 /index.php; + error_page 403 /index.php; + + # PHP handling + location ~ \.php$ { + fastcgi_pass localhost:9000; + + try_files $uri /index.php; + include fastcgi_params; + fastcgi_keep_conn on; + fastcgi_intercept_errors on; + fastcgi_index index.php; + fastcgi_read_timeout 300; + } + } diff --git a/incubator/linkace/0.0.1/values.yaml b/incubator/linkace/0.0.1/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/incubator/linkace/item.yaml b/incubator/linkace/item.yaml new file mode 100644 index 00000000000..c9619afa9a8 --- /dev/null +++ b/incubator/linkace/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/linkace-icon.png +categories: +- media +