From 394f7376ae64502d099f98b93a783bebb5b74610 Mon Sep 17 00:00:00 2001 From: Flatcar Buildbot Date: Thu, 1 Feb 2024 07:15:04 +0000 Subject: [PATCH] portage-stable/metadata: Monthly GLSA metadata updates --- .../portage-stable/metadata/glsa/Manifest | 30 +-- .../metadata/glsa/Manifest.files.gz | Bin 558197 -> 563604 bytes .../metadata/glsa/glsa-202401-01.xml | 47 ++++ .../metadata/glsa/glsa-202401-02.xml | 50 ++++ .../metadata/glsa/glsa-202401-03.xml | 42 ++++ .../metadata/glsa/glsa-202401-04.xml | 68 ++++++ .../metadata/glsa/glsa-202401-05.xml | 42 ++++ .../metadata/glsa/glsa-202401-06.xml | 43 ++++ .../metadata/glsa/glsa-202401-07.xml | 42 ++++ .../metadata/glsa/glsa-202401-08.xml | 47 ++++ .../metadata/glsa/glsa-202401-09.xml | 44 ++++ .../metadata/glsa/glsa-202401-10.xml | 134 ++++++++++ .../metadata/glsa/glsa-202401-11.xml | 53 ++++ .../metadata/glsa/glsa-202401-12.xml | 46 ++++ .../metadata/glsa/glsa-202401-13.xml | 43 ++++ .../metadata/glsa/glsa-202401-14.xml | 42 ++++ .../metadata/glsa/glsa-202401-15.xml | 42 ++++ .../metadata/glsa/glsa-202401-16.xml | 66 +++++ .../metadata/glsa/glsa-202401-17.xml | 42 ++++ .../metadata/glsa/glsa-202401-18.xml | 42 ++++ .../metadata/glsa/glsa-202401-19.xml | 53 ++++ .../metadata/glsa/glsa-202401-20.xml | 42 ++++ .../metadata/glsa/glsa-202401-21.xml | 42 ++++ .../metadata/glsa/glsa-202401-22.xml | 44 ++++ .../metadata/glsa/glsa-202401-23.xml | 42 ++++ .../metadata/glsa/glsa-202401-24.xml | 44 ++++ .../metadata/glsa/glsa-202401-25.xml | 99 ++++++++ .../metadata/glsa/glsa-202401-26.xml | 42 ++++ .../metadata/glsa/glsa-202401-27.xml | 65 +++++ .../metadata/glsa/glsa-202401-28.xml | 42 ++++ .../metadata/glsa/glsa-202401-29.xml | 42 ++++ .../metadata/glsa/glsa-202401-30.xml | 64 +++++ .../metadata/glsa/glsa-202401-31.xml | 52 ++++ .../metadata/glsa/glsa-202401-32.xml | 52 ++++ .../metadata/glsa/glsa-202401-33.xml | 57 +++++ .../metadata/glsa/glsa-202401-34.xml | 229 ++++++++++++++++++ .../metadata/glsa/timestamp.chk | 2 +- .../metadata/glsa/timestamp.commit | 2 +- 38 files changed, 1963 insertions(+), 17 deletions(-) create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-01.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-02.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-03.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-04.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-05.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-06.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-07.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-08.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-09.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-10.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-11.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-12.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-13.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-14.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-15.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-16.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-17.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-18.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-19.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-20.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-21.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-22.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-23.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-24.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-25.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-26.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-27.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-28.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-29.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-30.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-31.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-32.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-33.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-34.xml diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 97017d50f6..1b5eaf0ded 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 558197 BLAKE2B dde0fd5bc1749affc0b48b285b7ab9bd0a7216628f650cd3cbf0e6b2a1788ebd2dc667afbfee3491b42c071ba583d8c7e204468384a8f639b22206d6cbf47903 SHA512 6a3cf3862910d3680e54853c513e07b7a7d791fa5a5732653e79584f351498dd0ac5f7c244cf38dd9920afd7da27fd2c1e7a51770500da41d964a2a5ddd6ec92 -TIMESTAMP 2024-01-01T06:39:54Z +MANIFEST Manifest.files.gz 563604 BLAKE2B d497f4e02c0349649ea1fd84297af45ff253c185da14e6dba30f010f40d1ab86fdeb750087d23d7e892d4b2a6c45bb36baacd75348d2a50c0dc3c70213c1836e SHA512 c8b2f6bb87969de216a6075f22dc589f34d03bc0cd503b9bbedb9672f2aa19209f4d1236cd3f9aaf54428705e66f266c37a1f0bdb30c6fdae78df87761e4d8da +TIMESTAMP 2024-02-01T06:41:25Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmWSXjpfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmW7PRVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klB20BAAqVFxMgUnpYZN3TY1cE1pYHAycfbddPzAPAx0I3yPolECfSJpH5UP5EEF -r23EVYdedYTG4cj4cXLRRr0cWdI5/2xHN5YzXqMQdAiNekIjeNc/d/bz+fKXbAZv -a2hGFz71burELuaLhtUOgHhxTPZGA7dZ82k2ZkrHdd3zVyxp6rzS1uQOWj6uKib6 -2dGfgRR+sUdAgIFTexJuCRCt861U5LXEeE7kj8tGXE0kc93JXG5QS3b2NmDvY7GZ -COv3ZeAjYVGkfDQtQtzekL+Sd4UyvICHEZ2M1vPVc5RFFjNUuyC2q7P73DoKXKvD -2RQ4SL7/w9EoBtA+8/glaX59LdnOzIQYtwcmBjfhVn1628RwJesKpAFFVag1hYED -uxh2vlcC/PkvqCf/yYExNh6Krm1agmm4ZJ1l56GckCQWgGgRAwkVt3tjlsNdUoxX -55gRtYMLj153y/2Z2ULpMmB6wOvPNwzSbZ5h9+EMt6UnK6QtDVqO5zc5fVPfpNj5 -0mMNdF1XEfcm64fYeu5IRc2B8MIFGr9c9cFKP4hWXXCMEjB78UtICqwDihgD0s4T -T1zRCMhX5gJv77xwNy6OHe9voXkhV5i3XLyW8fpRTIgWx9WooiFCsDPQLDr/4Qv1 -kqUMaIxkUBmAdOh28ouAd4w2gKe1AqeLLr9quaN7LTItxG77BaI= -=4bYj +klB4QRAAmmnYvk0FaooM922vBqTuhwuoLVbDtysDcvBsJHLxoL+AQlp+0romn4tJ +rHDAcIPSjxMPzei60/FKb8/lWyAwDtRJJ6W0NLOBe5K0SRUKTLKQz4OZ3aHFNl2t +Yp18kfnUgMyZ7l3v2CrKEE3oC+hWpULJ9GF+uuvpSHUXDOqIkbm6vhWQWRzDwCrA +0RacuWPedLm34CiqwiZSEsnzOzvBb8A7tbmKtSyqhBTKyam7wy0/Tn99Wp5tnDGu +Vtp7rgT1wMmGFOEYt2I+QM1fWGxf/GN3CNPNrNRQoQHcs9BadB8hn+auklc8zOc2 +RxEgAaESWhDLSsHkI1xp4osi9OTBqME1wUcjHPQr8d9JAdzsg5L8wW7rJE8YflM6 +uUrchSczds2gc34nG/ZYBC88EpvnU6U2AqZZ22LwOCi5qWo3GQZOc4jZqIuumogi +faLkvuNCX2JKYKZdQQ4Byz9WMN+4X5dWLnQfJT9nHc0F/rTsV4ZcpDUApBCiqCD0 +lHY6ZPKcVL7d8cqQ2h6SjRkO0FrytUbBZm97g861/jX/evt1wY8Jx1e+FAxQksq+ +uPTXpriBil+N5YWzpHbuOZYjAQ7fv7fx50HM3RVNz2wwa7OUxhIFaE7/vBNbPL1F +axrmSl59VEi9APSEmapOVVZR5tloRvDacB0elAhfpbqCb2BCO9E= +=EZVX -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index c1be36f2d992534a1dab32b2fdcd1dfd3090b244..44241c9c7a69b0860a556183d4bb2fc2befa346f 100644 GIT binary patch delta 22787 zcmV)xK$E}qh$57;B7lSegaU*Egam{Iga(8MqzFNO^>#V3?8wsHyGEfA2#nzW00coV z5}+9{f(+<`a3KNu<`1pKs>)3D&U5>m+r7`;l^G1u-JEW2#=Cv8GknC$FRS(2+5c4I zXRA;>*KOOaVA_zUyY()MrpVJFR?dSuBfYZau7f>jqqST`X?sbaW6u-c&dyU0fOW@q zgL>?LmFg5(h8S}0iON3sO9yiPZQ*>susoj>)Jh?@d*cLrnNAK+Q1SB)FwEJt>mh=x zldHr$pPbKqfn3>YY%WPp`u9G{iCFy;Du70hV(`&9KHieLi{3>O_%*bV1=9+_@5^fa zO>@SN?yJ*7!bItcaraPU1{-G1pq7v{4|d~!AcX2WNXXhsW66vVDYjfumhzC9)ybZq z+io$G)y5>O@N|UOMd9sRLb8+EPM6Y7>v>zAtRLz&wLJMx zDkOhEKbLsR*VS0)AiIo{@+~=*7?j^r5CW(@6VO!6RK-PQ;opu0NHSBq$@@*UNdL2c z=d)MqPnjit@F0}xc=lj6knAM(sRmXI`D}RI^t$&%MS_`T?J7_iatz>3aZ36ZM<&0Z3juHu$j&<4_rbv%s*VVj<8?Qk6#%W5u#u95WB$sCr|J%h{D3|lRtcbgNt|YT z2K7@fjtfw#RDI0(AM$H>cMrJhv@z(M6vdP}Xjz1Ks$7*74mdT&oQg<1TQZJncxahv zigZAz?N|QgB>r~xTmG2y*;B8&+NDQa$yOul^5pVe&!LwJaW-$Q-A(Qhs;gq?tfpF( zj!xC9Y@4B>w^r2*Lx7pc*{Q03Qc-#1jRd<1ClZS}VHze=c(3y5`0g*2XDC{ zyq^Zod3n^FBOnUtrr@pMVYz%e%y}MEg&aj-ivskatN&ZKAc<JPqrE;_TPbDMZjt!#GQ0DS{YBq?47=10N zL?KQ1;w2l(z{ZF3K2$}3hoV}N&{X#Llr>XKcg;33@13mBS!v#FqAGk***1G$2DRk;CgOpTD^Daf!b5-Z|Cz-uhEnKsUR>cPPs zdswQHsyxEp8b69jmH+ts$MM`6-_2`)@-GDh2z0mhw3_fq%D!yLN_GM!*b0ADJ{mS2 zY^8JSxG3^U&Xfin^0Kmu4jECy1RX*p8(7#69ivYrNyg)>0hvjE{T17Ju0sHX@&nS- zqvAhf2Rl$h(+R_wGY*qiLjBHPR_nJ{ojSX(N;>#v;9&i&g2ZT64`4H zK7(>w4r7pD=Pk;`S`q{$kxRWBn!GLkWD3PD7Wt3gqR`^c?en>mbZ?1+c1rsf*uMRI z^2LVMu2e12s-bs(b+liFzbkC#dQhpoQdt)n?AjF&%HF!D(aSMsv-Ry^@4IR=# zyd>!c$^bh~^U@N|2AVhdprmOqE?-vbh2=kb)y~%nQLjvZ+6TcRG=pfay6xz;G@q8U zWK4jJdXE~&Xe)eORIDfEoV_klluSIegQYoo82|tYC+W$5L7#b22tSv=QknfB>Gs`E zWFOpWq}cO$bUoBDG^w9m427zr$&GMEoh6)y+$liZPz`)YISJAmh`nT}JL|b1tQgAg z5lf0hT_yB$bcCz(Tbp0DQiM$qz>&VJ)-Ov};mkM3W~8P=1tmvLS_Va(2evr;-L8|B z@5>&ms%iXx9|+~4c2I+p(BD)~j#tu3p7N*bbyTmm9@*f<&byvb9NxP523OWlhXl(3 zva?0zdPVueWH7g|GM=K8e4wlk_DQaO<7$t z62LrI@>084tF{DWTWenl>HHqOSU=VNQC#;6g7{T`StQS=_vY%`6xT5?+C7|L${?b!kY@S#&xc3p+}f79up#|bl| zeRphsX(gw3ZDOeBG&KYw$d~ve>g*9zJ&|iPW!N{t{+H$Ym05K9`vvBk!{)#(C%{@= z6d4p13I(g)R-&x#TrOosB@^*hqbj&g#b)v-Z_w+>s>UEC72%Ivb$Gje$e0m25ahdO zNw#3%bX{4ckjp_YvcYS$g5;D8!q)KUQ9@xI264hI9TP~$cA&0UBpk_{049J<_c9l> z(7d0C*O!e*2pxY6AP$7iB83xtjE@d zmD)ck=BG~`P;*MZi{8;V{+_(}qWJ0jGf?MW0#nZ6(1gOF09MeEH-H)81g!QV2NG7& zHW_quY*FuA54mnS<~5|RDCQ`|_aN?eCq$HtYhFEaT+4rUba zHuUL5s9HAU@$EP20M~X>(|vB^qSp81pin0(B&D8vzKK0S>zuHq?NoUMfkf2^w+hs2 zwW8w6K-_<|Np?vZ3#V3}=Xg80Kw$Sa+DnJ-;BnBhC+d^PXLx5)mn}Nd+*W`0vOq@p zRCCCA+*>`QWDRw3tdEBx!~3$R)R67#e^=`zv-l}-ptL^0r7F>0(|tIJwSB`MIn-6U zIe_laIaHgi=R$iAbN(df*+Lwd;sB~Q* z8Ddb@efeCsve1OvQ@i#Y=4OsL3M#XNq@zUTX}1HYb_HAA&Xn2-VHws;#NV(d+4(Lc zdhZY0x2xutfnxXoT(Mj`@aoX86`v$p0Ns<)bJHE%*}@9c5wuS=npg=n%p4IS`H;N! zD+^W|Nrf5CQR2({a>)RHmkgzs^+|J6O(6m$UrpT*fxj z-&_2M;sDq{Z6L3!C~eoIEgBQYrRh_N`*w_1ChgY8|G4FMG`;fQM|@3 zIYlCC$p_Rqv=RM(axwoavv{gn@fx|40YS;Euk!FwsJ&Y2Lz(h6l!#6wUsBMNx~95R zZ?h9HJJ%c}Wi5J* zupif!;aKXssWGodO&-*9U#^<}3=}y*Z+Lo_r~ytIY9g7^?m9Hc^pdEstG#FE39|F* zMYmF0h>9SPGo45d8Z;a8C@9Aoas#G*8B0qLr{byol)iWJIRS2|&$m6Lz{?yTjOh0DsqBO6cm#Fy3jwLdyPPU5r@Q@@9;*Y>@x?oSgtw8<5%w5?zf>s{%?OAYqf+?9eYo+ylm@u%v8v+Qj9( z>T9)h!Or=vWjv>K=pqO!C8?g?v+od(IAwSMdO2*4Kay58!BbM9o%X8(m8xpTTJ}^$ z-ub5zFg zg{2{gbUbSt5COrW>jSz7-c=$-Uj>|a7~6*fDN!R9rJ4faT301bHNc#trY+-OfAUWF z-PR9O2Cu8;5%mez#FNDkm&o8!WzV#$D;c{0e4{zME$UE`09E*=TI(rs)3!07bONP+ z@`K1)4vsjLQ1yLefp2q?Baw0hBMM|N~!PTz`Pz5|@=Om}C zr=uL&U3V{S4y_`H^_N|B_FF$4`>!KV+-oJKZwX;d;ji%xZ~bC<0QwtmfmDv&W#;(b zf>XV^tG3sYWuD7|mGfiZy;m7kKGtpjWpWx?QX%Nz+}G@!!Egr65=LQUO5)~!jCCh9 zMoN~b;4i;QiG6O1U-k0eLN;q8ezX;jA|4uoTpg%Bse?{C>W}oJIzjnlQ*yKQN3|~* zC_0D$5=c0U&MFgAf{S(N;RDK+&%{^|ztjvlwyBD7f4C6BZd0jVuaY`}DJ}ZbNu%Fc_B@OkKgctv3skSQ`cpfO#a#Pjt zAse0Kkb^|W2FSV(bPm=@S#=Omo>$z`pRRJaiF};d?M6f3JL_6WjVq_`D489b0tAT3 zpA#^yXo$+WWo2EmNi>^4t33w*yF6v6em%E~Jq0b1K&OgKh(AaIoFVXk@HIfIUoKDo zWEM+pAEaj08h&VsQ@JO;sslKs6FCnxV5TGAqq1MM<*|}KG=R94cNLtPE-W=5C_lr0bKcpz4`3MY$obiG+ojqou2O=W*_&#(mdrO&r)tf)oQS^u z85Q2E^-HqpA16`Mm)rD9&^kyf)9X6w_-f}XjV6udR2Fa>Sdk154No+1uXfF)%`Rr=;yYL)Dj%i>9f)>j!aUKnb;3~5+< zdYp`=0=e#5)B>!350#k(3dx)LRdq9497LH@6$$DBEoHM43ra4%hF>*7Q8JMfv=tkv zqO{+=bfNQdaZ)vlZ&ha9s1A&?QwxjYjqjP7InnO%lkJ78O4z*bWr2vQz%$hq*+{7? z{#k3*%6BUVDM|QcwSKU?&;6$9K3kH*KFPFwY-=|?8nsn_ckWHe{4AGKWs9%9RbQ4D*r)tZ z7X4JBgOHURFc&sBLZK$1iqBv(n;qqfip5mE!H}JGv#JW3^h#pqYY>g8@5_&&8>fIu zbnKe|qP6IMSo@QvMDdrL_$#yM;Q4#CRFEON4;wWyQ?yy4VslhtwQOW0Eauqlh7W=G zrEm2m^HYPVqSBU&@o>`5zpl+js6x3b1+?|wvsYyu>4wspOnAE#>oTYlNG3}B$ z?*%q#dTKaRJcK|>+3M6ucKWhfzxGF<*bhmmM`9ZrTQx|n1%^uSDh%J3gJCzoA(jhB zp`>Ds?TmY5?&6J+m?-USQnNlyZrSD*B=CU}gDxXe^Z8qUqRqan)mbGnAoYdK4dwmL(sBCoPf9~b$i>7;gNa1D4qK=_1eg|Jx{;X_& zKU)l^THN62qK_MxpjA>5e}VrMw#-yN$|aNZtQ_kW^Sd?ujS?r~0z^o8kq2{0E(Uzh z;l|J7Xcq{oyel7If-(}y^rf4yqP=D)+crv4HTctB#A6 zAi{UofERyp)Sa1+lFmVgl(P!FHJ-+Q`nD_N`b^+r9mJCVT&@0It&hF61*i_+sncW0 zDObzVES}-S0QnwS2N&P67q63vWm%!bvw+yI&Z|0zw3KZ?my_?=^oJqAYAdx0`|2h$ zoQHN~%42T@krH_85|z@cSuGfL%-9br&c&YD_LcT1#x4*zY5q`(@bt3!BwC$+s#U9t zp|tb#5AU0$9dl8b$?l{^LM=9!_bH9 z1gtyFa=d&FFp*cbsgPG}LSW!*6h}#d6U+Bt0S`dzBGmRyw&QyMT);k$I$R3wJZ8m% z{i$V*4bZF%J-PLv9$x^GM}-T2N~#pzcc;~vvZo0(IXJ4Nv#~XZv%YUC$Z^8F`PLU_ zn=P*GqAM|nw+M!mmrgv8#CYg}+azpe2PBD1-500#52>}fubfUTN5XGKc~}wwC&o0(oy19 z^`<69%|#z4x{Rbz_4uNQSk(^u)>G8-<%Le2S0TDhr6X^xw+^$;V$tpNid;o)>;lg+ zM_vt$VT5hUVar(~4mv6i8Y9w8uQv;|LFSzuY{u>!`f>uyRmy-f;N?k*mp+aNEoO(vVYnSfi{*lkjY4uY^QIC)) z%}=MGKSo!g5*$EYcV!5jw4z|#(KW)cB%*#eiIG#c1bL_dB%nG5IpODUp_j+!HT9UFg>rJw08k&INWvWbFP|2oeljp|Q z>$a2GYj(Mu7kbox;iXokx>9s}wIUBqX|lP+(p-SkP3#u})D~ zbez`-@AGn8pvV-~xUUP$&hPJlL% ziWn8-2t2a?PAYw>_{gT7gKye%*r4x8N0 zo7`m+l8R2pfTS<0^+#&{7$Vcainrkas|3pE91dT1djPsJC95d^cxAW?z2eSMU2<=L z#0z)i==8LI*?5pX)8w&fq?ri+$#{KRC$FXl6bFDmqoUfWqS#w9UDB;=ue3aA3V1qf zq){OFo4YirY0 z(v;t+P51n_v)|uxWgo1Od;3UaS+zi@d%1R-)d4<#wP@3XHcK2O+LCxn;jEp?){ZEh zh66NaP#>Ind>&4<nL+^)X-0mD?7)A~baer&?F7bRFx}eI?>v+BaHn5%~C1 z5?kHqGL|OkP3+!;G zGE#7Vc*S+T?8`svTa^F1J3T%n(@E()-->n>uva)qK>Q9zbf^#}h@LO8OX6`&0s{pt zQ0dupb4o~!?B&z)rwJ7%_vXmKCOlJ^3|ZfrJIb%JEg|F)(v|>PiEl|Mt%iYcnv%pJ zsX;mvkPVz*$Cje!Rz6YT4T)Jw%>$jDP_5X1*|sz5BsD8BLWKirtG;wKmF&P8Yf}j} z^RnKV?(_Bn-w79m_X zaUk@~W(pLwiZDuMj+%a3{ws07wz9A>NeqJP7I|mCwd-eMP*2DrxIWa_dXt(}+U-Pt z+`u-zNYU&|O)^x*^QxohX{Ck7ktwTqok})!FB2SXbk8etObK#3^xrM?RTEU7TaGNz zFN2gR5;c{5bi=+PQAaa01wOv4)*lbzbNE%!lY6VcOyz@$(U@c={n)YcFN>Fx1=?HXlb+D3)y7ctYiUS_5rlwq*1c3;w*%G6X$S;MKQ~F8$1Ag z`X7MhG`uHBQ#Hn*(SttFr$2E$*ZQ_vFH-Y+ZxKr!+@+)-^=ubWsyRDvTenw#=MaOj z1Op0WTd&dUpor)Q;_a zcbXo`X%Yi~g&h#QaB#?-E$q0?9$S&)<#pp!4feLBs|%A?mcwBp0M9cu?D59Rp{^Q& z6M~+YM3qq&dni ztNm^DK;e{>{T@1Yv2llD9mFM<251)ektAk4S1wKIigH4#vR{%-&Vv_!D(j6%s%|)V zgh0rfW#cL1@f4NndXtsl7%V_VE3R@pnu_Sf^JTTtzd12#26XE56@j{!t#kG#pUw&@ zNx?y|Riga{HC{V!^~Y1t?bsU#Kqn8CRQl;W#mRfqd`G_RArFT?I-FV*H_dnxm#Tx} z1h43M{=i#{V$?C^hurXgNF}}ayC|f6=?Oc;$rM0=40I8}PAB{hrw*2ySA;Da=4nr% zv4cU|g?fZzcm++A^# z*HNv=7A^&r*BpG)z@m7MYPf`g`M$^@86y9-Y zdqc&;4s5rNuVO;dP1|0P3V7-{ zpk-8R|q1WRy8?MkSGYE)7!!w7VjeE`~Y&RrSsrgZWGqNfDLk({8^uq{0= z>Z|SrATojoUz8Y~de{`OGb%~ngX;6-rksRf@6i>1B6?au+i!svNnWKohbFf4YwYUD zIa{u+%m8I^WS4b61(Tybpp+gA@WcLXWtI0d^)RWEe-0f0iTebb=#AV{HR721&~tR^ z__A6*2%_>n-dKM87~YuEqRJP`T7@!#2pfw7ea8V9Q%MellveV60Wf(mkzrPX_s)CX ztW(H;w3CqaT!Zg-`&L1lN_>qiL6i5zqe{zbSyC$?@#5In-I@wiWeRi;bX?O5eNOHJ z>a(k)+&%%#E9=WC4VBGgnQe)bdr?hnO-+u1axBJwpe%*Aeidwcy-g0Hok?qt;gGM7 z!(op5e!i^M>o)L1IMBNjrwDItG$_gQZp4Yfdm>CcWsf~kOP&n`>jnt& z#cUf;k=-0zWo7j-;006VtRk7atg0a4qr&_aeVbiI^A?YK%l>HG6D3RCN(4FQWH&{|n>P>CB>+{!y9ZDI~Bmnpf+ zc};x~b??zTXYQgxCHlxya!z>Fa#GoEQ-Mx>%PbkFN(TU(Xp+kPTCMFH;+-wIPjhu* z0iif-g0rfTtmd^nU)ADMg!PnBsyK>&bGy@sK$V^pG1wNhSry1jL*B9ZM=Ge*#1<0= zC8s0Lq(1R2_E_=TYW>~@QXqUp`N1~}?APE?Z^yZLR|E{*pQ$5?lSBZgoQgu%+l`Qu zMa-yUml|L~wp!RS^N(8X6t$US!+{Q4HOm7UNFAs5efEjwB8yR}#2jB(erBM5&*_le z;f&C&MzaLZnw)3kCqHTP4`!bm~dKm}x$OQyhSPC)FL22eKi5ffaOQ%>jchmf(_Vb zt&*G6_b&OloUzffmzO#TXbPQw@KwSpws6U4JTT>)?OLzW0fGb}`3MI!Zr1rtU9a~L znN47+c2!x}y7;SvTk4Un;1B57>&oDeJK2Cx-E>%TM*AtYwx^RoVYQ}rak7dycTY{3 zfDr+-Dgt>UH`(RUF6pIzVe9sV`uwt5^^cMC-djb9rRH>bqpZp0DmRFK^mZmxBYDa> zB4f-Bz}j?T#~lLu=`B8w6RFX>Vrh!$656TQ2pR-8j>g=>>_d-Dz1!w|HkBgkHLPuz zw`6ZoN&AjnX4SZVD$Z&tG^b2Xx2wLs<;3>yEJkvs^r2{H7u%;B=~RD{no1#! z@+gqjo*%*cLq1YgcA7l-JPIS(FyST6>813IJZNQRWDXr5U)D}$FZJhSNjY|Z#Sti;U)R&a`9o@d zb~u~TOXwnltWm&e3OS2rBn}`IvEehM6f3Xnow%dAUsmg7UhpwppjEr>*tZvNPLG!b zbZ-(aKrU z-!hb5U}jDYF~!pK(d{{8ZG}sfN_Wh|3tlUKLlL{_=BS>3A+!0t9gj(sauqIBy#@=i za77-^auodB&O?2hn<^6W?vUL=S;EZi?GDLd-8<4h!>_K^?`>fD5VBDU zk_GCzg_fXymI`OZ=~NDSbC^$&QpK^no-YAL${RwzKfiR^ zX0yK*lyaN=K8oiqt(PoWrBJ*WNd$x@3<#&)j$r4uD1@$7)}?R;d|ziwCdQZhz^kH_fgW7;s3Vpsuu8aVR&fLku~8Rgo)VX4K|6+)}jfFH!#YHZXp6 zUxQkmgD}423tSC=?ZDRJ*N8RhRVC$(C=wk)(a*y={z_&}g&%C6sl1>hhSv7_->?@f zHt(Xprv6tP8ISYsrrN*)ql8DP&i76804OdDExtS_=m__Rno!2~cJE|srKns0KQq(1P*y&C|eH7ct6%WC~$ z`H$%WJ8p**bwxpl&_VuYze2XWzOy=n%8Pgu$+%AI$^#&eNWMwZ9xhepMg5e0N-GnQ z48#0VlJPB@grdkouNRN?EtTO=UwnXNKdc@Zf@Wnwi+NzjW$M+@hmTaR`qp2PpOGCO zt(Pfi2pfNNJj&HNNN=6myoH;#NN<81!0=zWGFR)jvrjI5cQGzrld?VvjVbqgfPBZ) zu16i87)Rj%IqRzKk2f-V0AHFARkB)N1Z^Nsv9&N$wc*aD(-h3QPN|-A8yl!ksxIBF zj$8!I=Y!w)wwsKUA?&;B;PI|o#YJ@muS+91ubO|I#83=JM-E-^Dt}5%@u#pIMKId_ zjO8%Tty>yQ8fjl#K&*NU z+|_@!ji5>jVjd+o^wOZz^UYTQV&r7QwS|tNlvcU@Ke>Gd+@t zR3|c?YYnVE zepH$(@7sI{&RL5zKue+^lbfSq#SAHf>q@0PC>tov>e5n(U`fnGbNP2(q z+V5JsAChxdeThRxX|9wnAi_dOU*G4X#y>%ppkyZlC?2Ykw#PP5mzsMz^_CpIZ~1f< zENKfuXi%L{qh@tmo=Y{fTFJHN+lXvV2jY(|pHdzLa3Uo2`TKAjK)6gb9FAw*$0L<_ zZ$0*?#Uuz_6ILA#7B%WJwUA4|$$)=W71;6uF!ZiOY$5-s;s-!`LhaOcwne|JR{Ij= zhugS;VPcY>Ms(dSbXwHww$>$w+oraGX=~qsB%URxzBpyM7VS+JS^TlDSZ<}763L39 z@j5hg^P*6qQPxZQ9;ezML+cgQz+X2un;HJhYbktdhY&<|Ot4IhPSMB?*ZqIus1($i zu9$g7+FCU>hAa#(Rm{3h(xO>H?j*rdg} z!}wKFMIaaq7XRT3uoPjRmnufGt!FlOGEzc`;=gqq&P#2t#ijsIl<<{{GE}@dEn5zw1O0P6PMchnJ1y66s~Uq)X8rpcY}5?E_4uFm^n7>Glvcs*8Ud`rDy=-K=i* z=*6N1Cx{27PZcmKN(!C){hod0gO-B%2di~$16j`^c<*rP zyQ+;WWpVIv-pNJ@IAik;wfY-Nc7(J3*HZtD8d3kGCTC0CK!@}J`X)hgqdrzr2FKxD zME!Si#npPTbl*{aTD*Usn$#_OQQEj{Io0a)MO5Bh*O>^)B=k1x9KO!vVPdsfV|OSH z{OCKoTSqFkDB=c&J2VJ9v<2S1?y5qV#zVjiCkwqodEamGlQ>jHgZt7NO`&#&@ny*6 zL@Ff3YTb9MaYr3(VdPC&Pz91-D30>03_w+>dr#MO8*uSBl1P79W$z&E8PObx2)SuW z_Grx;yO#rBR_l+Y8{cv3Rtt&nO3tQ|k=eiDyguDTu}7Y^jyaA(W&1#tTyygEmIYti zVo6$FHNtq%xs-~8WjT(;dKaw(y+K_(fuiBgKihyN{CKUO!dp^`l;Y8HBts94YY&#_ zgv)6Gobt`qk3oOoLtMBjo0YY2D(KUnj>?$Lb8Bpl;hhE(YgK z22Vwazxy^xKb-g_Zk>O|82uf$2p(o$LjswuZ>Cmn;ZfBqpPCNJ=G#)|m-3)ycYQ__ z$-2$bO(N3p)q5IrS)si1BHkudRsiRb$Y`_nX3Ogh2Y7$tJ5yMV=T-UW|EPJbZUp?L zkTRy z#C%RIcc!;K&L(>JuND_2)3?<+fA3B|co046!!v)tqKV-1Sc55wy+$>k^Mia;;H(;% zY>`JSKzTw{l!r1cUVo6Zv+$rP5~4JS-e2ywMm^9#5UI8mClCq zetDr&>xrQL6R9t&T$6~Vmr5vo)1Qeg8svYndw2&10OfjZ3oL#lA%LJh_fS9U2=?)Y z?2+Vfcit56k&Q>vYC*$65E`X}Ln2Sv4W#jHwbCCq@Leb7(+iL8mcM(p(k%)mlHSbz z8hvjgP8OKWl6DcX)c^_jM*@tghppI+0%^}}@L@;l;C9(404z{_NCmvDjgFsepf!IB zkl+Bnz2er=-?RYOI2v*-y)iqg*Ydzz11bTk8uP$})G}wh9P}VBvG+;d$H7*SF9EQq zdJ^a%U%Qwd% zc~LTtRx-WiNt@5uNKMQ{j%DUoJ z#uF|9lQ|qLMMd0GVW-#}KG|$CJ%|4GnmdxUFUlAa4u7-dfqdP|!!VSvi#ldH>dDVD ztWpC_vZ20)jhGy~Mv&yv&)3~4Z)*>YJ_$gSf5xsCu%P%*7KZsKk6g3^5J=Bl5Z zhvD|Rj|$_q-*WAHrpJNV!m@uTUM7Vj>*c1O$uYDIuRw9?J$=6Gx&E2Bd)s^a-rlQq zP92Il+-2A;v782NP|({?FKQiCPCyd*UTm9gR1IF)5bPBj%0-ujyLs(CrNP}Ac`i*M zGPP0|md4h#X7T(4Wm5E;8BzY;tLLLIv+i{cpD5BnSW+oe?OQgxwDx~%4n0b0w|7f| z+-$O-nzuR!_f}jKy|Ogk=O6re-tY|D!r7t1Fz1?GVm(hI;Aey?YZsd2d`f1HjYx} z^3Yj_{c=TTy_Bix4p)EKjMUJOh0M9_QD-Cjf z*;{{n`QyXnuBbaU=Vz(`%Qregmht4Qw${|0sOt|zokTJ0B`oQO|4|g`&0z~X zT!oAaf^_C3&*ut_fZ>%*R2VBi@AS*_m=*%>~{>bfa^$zUSJdvu}p zj^^MrJYIa(%c|p%DMopXF_RcRE%z>*qG-G+;MPn0$5^8Jo>1`o48G>Au_3@bCyMAtW5i41 zaa3Un{BJk=R@Rb~^lDa9AU;x!qe6fV@7>xNY-iUeHzP))7=6;-gJBS0$XHP)0V;{N>x$k_YJmXVPp8*!*_ao90B>Dm@E^+i@hqT~ zhKR&Kk~c}$*817T)OP$NMU@{SP|PHl-SaD6LhkFhp(&h$oJEv&UTS<1&+=pO@MX3B z2=n37M}(wOgig!8Mfy<|rUGV-(zZDZ+p=zw)Q3%8>cDzy#zO?jGUqkooT*wCk-wuN zc&+lZN~mg0CpBJw5d;~bvIx$tJClJMApTd2tVcb-;xSLv13AWy(SgwlIX-l+B&l%Lp>5xG<~x_EsySqmQ&ms!assc{ zFJS(!MHW9?R|tJ$LlY3brUZJ%AA8hN%X)82>LEhD9U)ME;bv()vE``?@y!>yg2cDk ziT=Xa(@q1g)j@uho9}_EY+R8jMd{4koFu; zJqiKw%WBnsKY7@X(G~LUX_xO*WpaxmDh6d2i1R?PbNCLUY7mae$N-3ZIE9`b;^fRV z2ZuxDvcsB33Ryog&?mMf8M_JJyWQKSGEkHC2I9HNz`AI>0GB>8RBw4tBFkX14OOJS zDRnA>CRBCyiUzw+72F4>@Dx`GVll5{I1hl%nW8R#1$;BLpq;jxwP~#W^gV6`Xi`uW zIFJd0d$Rr;;Q9sg=ZDzHqI6LCQySByoI=>fSp#y>xDtUnC<6+^Jcdm^avZ1P3{GboOBplJ&mw@~SOmS}2V~G0Hg;R;e`P zaz)7}V!@izKbH{a>+&>y5Konm_Tsh3)B+C3qv~##(YK@Ic53ar(^nFJ!8x^{L+RAy zg=4$fCekdc_OZ%85}@t4WKPzedp)zha(d!_DXZmRluMdf`a8XaY`}=1fyj9UALKY3 zm56$3I32oO;SLTnrDcipNOF&e+bpCOmFImFtMXv8G1bG`3Y@3aW!JoXOLiQW7FAu1 zx3uIR`Wd8ww@)}fkxS-hlD66DkUmD z^3;e`k!;HGP|c4@pX~KzwSHY!NCNMFoTzvse>>c`C8e4c2}KXb7K&19N|$=$*fdV$ z9eeT7tRM?9(vlBkO1Tm>Y3=+djf((7-ZN6Cfp7>tlKco$kFmv|dlzpPiTWk`PX z$15XA|2-9C>2e4Zb=EAlgsF+Iz3ydOQ8qc}?be7zhl@v-MFn~rFK#&^?94lV1(r9M zk~FW=`JQnIww>F}-V5DRqRaJdwbCCt{q)I|jLrE7a!u3HN5%^;jtX&RMoQI6Kt7aP zE>gL?bo3GwjGd&zkRwZw@<9nfX(yxek$NMI>atR?1wq1Bk&zP6>D}|_+Q(AkwDlhJ z8A~gAg7>M*k~DM*>_EHQr1e`V2kiQ=8lt8=EC6W6SR5%aY+Ep+-5|OA28H`0ztR7>smG)ga2u-JZ2(^zo9h|{) z0tu_aI@!_NBv+7e8yTzOm?|bWZ=^E$xW^fF+*=^85>zx-5VcS%C=cr zvVh1tDz)3|U zylxPeSL}OfQcJvW7=u+x)~Y}}5bU7hu_a^c_Oe5+c3X8mLLcZ`m7n{F#2Jn9 z_)$p}8wn5^zp((fx;3wpc=0mMOp>71RF`%+bT4SQw>=PlpXB8<)r}h0M6{L*r}*;3VKa9k-(0U3WEIM=2$)N9b5D((^G=Z(mmHPi*9TpG1mW z1uZC-Mz&GL-zjsi(DN~u)1%5N>lze$o~H(dfpUR6MumZv3z`l!M7>DKh7 zWNQ|Wr~DIt)qJj<_tvF-CSftx7lNRQl%Jr0vRI|b@g_?u>c5=p(5U5b-j3i$5C?a1BmrdX8cwKRDc&R$?b}t3ShMl-Hw?3RAbLN6CaqBf+@Np8^ z#uD*Q6mJR=)_pM$ENgM-1tHt1}JYK=?lHc2&8 zdG$S!pr$nsTZ#Oaks8SV=pEMB6qJguxW&$x5|BpU&D`Sxzyk~T2K=vnsjuY~hnZN~ zSPEOoQ-NQ?Ero=V_z{4<{X!`c@~#upz14gvAJ}&kh@EnM5!^2A_9$p2r*7){m(}{C zB(*nx5yI;=;5zT-bOf`jlj{`aqiCd4t5+i3OW&ko+zNRYAy{W8c?`AzfMV+iUY>LT z?4we5uk2!V-$1_g_0>lDWrAKwz8h- z`m$QTLMa2@HB_1bLY0X^rj#e5V;QRd~|bG-^mrH9%N)#-qOR_ORZ3r+??99 zfO8Z`1snm0lo_Qz!3hr0-K=wn!R2yd(P2FRDph!N@JUjW#QNyvH%FlA&vdznv4X-? z6IY&FwupYtoc#KaZJVq0ON1z&L;FN_o|<%ZauBQOf~`|kVGYswOMu|H>~9O%4}CK( ze}zfOzJM*SJtPOSVa|KANv~&R2T#2lkcfRdd3=v9m8G1u67*xA`ji*P7V8H&uv+^8 zh9Ae3>_Legqe`8MOU08|mGto7AkCzAsIDislp9j$v7Kl&FQ$5J4=JHhl7V`7gl8Us z0B>f8*X-j@Sa7p3I1SwYc7-J!L*W@t+C-E!fG?^GzKH1bEQo+@vMeBjXR zYrH^d2_lNyPxsO^t%W+3(jBeyvZI|-f`;SqN`CR&x3__3K2>NIz}y?zT)k^se|cS7 z8*J=BQ-z;Tj&T)=NVAti!B6wHFtR#d5X7H@V*4O9dl|}(45cbdxSR+%w7H{@370Cc z3M{aL){(Qf&C45i>MW`Jbqp0-%2JCj9S4xCsnk0P87Va*MAV2x=f2V7xlvh;oY>j) zSkvj?MY1_5xsy`to+(bRzFdSTf93N*l-^SEGLmj}a;E2?K+H4PR)6nUR2q382b{f%fIyUx}Q zdl%&u8<4fT1{80)cv)^xrFp~tLJ$%X>_d1{thhelAy7+40@BGJytE8#@}U5RiY`7= zx^3Q9B`S70O`R<(e-GU~wH$RODr%>x`m-pWJVp%!l2eE{Yfr8{8u!hf>c(3mBU4VDgylzdP6r4ar$}nkB?>s!mXlc2c>tw7z3FxQ+(3L=WZ|)& z=;U3EGAZr#$D-x2dn(FSqSCsDhOmO{SI=kiRzzhQ7zY)+f1S!vyj5Fsw=AcUFlp2{ zyr+%4$6TZVJvM4{$y;`C)hZE0xryyKct0uvr`wW=7yI1GV37sRBhD>TSG8#h>)T2E zwQXx3RLVB_;pq;98l_^2{sf@65mPwNF+o)X2vRS_ZuSaHJ0S;Ub~&qmE?ZqbEhWSd zU)`FTYM-f>e`%2*GYnhzLD@?pYie;EJf@oZiJ12`P%Om%(m<`501iUV*ETV8`0;09?wH= zCa$F~tMxaa_#rl;qM?itLZ`;w^U2OggBFf^54BcKf0Tiy1DZhb`h2Q z<@JNt+5TG-?4^Bb)wYBrzKYC{xsA|m7vJ=LEC8WSS0^2bws-p7wj9x|q}v{J0-j~tfJE%v+beFBdd%#NgJKct zG4n!nFric=LoR;%_GUinHVS=i7DL5}=;h(rf41)lCr`jfT;z8uQahCF9r`dx^;gRe zz`;)n`o&Bzn1e*8Kr$R(R_kv-@nf|dVoLjISO&EhtUUAx-whw)kg&C1r=p43ezAlC zPOBPx&gv`HkhK~je4g7{I_&Mk2?W`&3ASPPaI;Eg@tp=@2=78V@`uF17Jmh*Q?hT~ zf0ZpSxiF_jlbWJEihA*L31e)Dl+*@QYPjv2nz>FOPo_pv;sX?=t_@CtY@b=32}c}tv@Q|hdivr$RskZ{D-h}65o6DwutXvMV_(-*b3dTtUJ0| zoJ}&DeIf!?m2e<>XJ1iRT>4pLd!|=Vf9XQe7q)`p`$W3m@x-pSUv`l6-A`nK`K*k-YafHm8gEE0`a$kP+3Zq^LPjKe@fS6 zUSGY_i7}!FrH{8L`81!VH7{A8=eDMi9kV9+&0*gP;>co;=uvPw`_i|v5GG$78w*u( z2>7=IZ$U4rD|SbAMyfO-(dGME5^?NVsSA1Q-oT4$OA7r>xV}xxRfYkFEpC;^t{1op zK)RNOpoT;>;}=`XA#a^568HLdf3<#Z1Jy+M7!_84(=y-!2pnE*5Ue#xXsUN#syP8n z!LD;3Do%Uf)-MOCEA)%KP`O7Y6| zCjX7yrI0)&E9Xg-#nZ6DLCgpg)|uXe`DL|!v3&iMhb3v)av;+@x8DXl^4Lnf?>Q(R zs0baJJjNE!)!k}oT-K+GHd4>~m7e|hd~v??Afyt`ih5d;hv@=FieAfb(2-jEa-L4M zkOHZ%QDN`-Rt;iYNpm)oe{w$eeZd5W28lDk$tSqtD)wQ#G%Z=$_lAIe5}^mq+O+BrHCtH{;0^M z?1JQzqJpv32g^l0C9gPac{^`;I`}{?-R6CoGlu#FoxX1a-zQPK@q_2LW#I7KV4FoL ze~;o6r$0&B2Pc4ke+M+94g^L}zuivQ>*ElX!`!#rxa2El+knX_1VD?Actn+hkkYj+ zMZJDFN+XY`3iq}Vp>p!#@HFMgIj+^&!hP9I{aeba_OT9aN{XVm6h_0{jW@eba(KQvhz-%KL6Zrf9=)!>+FA=#Oh=9rp%Mm zh7N7>xm}iQRKE{+I^11EnMWHGdm3c6zBI@3vVJG)bnE6@G>p|Qo1_@#7P-*Zpon;F zCO66iO*oEf<@hL2Hs8jt%TX8|9968bO|6r7*I`$R)XKa_0+OJrpFQX(PR$7n)KWt= z237R-l2_1&e+^9Cwq!@AuvuirFLf63v9aAGfaODRQio)}t=3;>zr63a9IuPBsOZJt z+AwKI5*7H68$Gw}cb?lz&4~z#nqvP9d`fblW?hw-PTD$p4#WCe^~z42rkkV%UsOR& z6_)fI=S86_DTq4n(pva!7Io+coG1iN>I1N-YU{IXf0s3BNP&OzOv-8wSFvc(kWe-J zrphE|xG%j`$cyvPOi^CQPybR%E9%qc~@Un>yJrU-#s5< z0v{8^f2zPbE=Jw%T)7H`HLFXRbY=tjPu=ONy_(`CUG=JM>bf9%K=6UODlvQG`VQTsKiaYTVf z>2qpG?Z|$VrY?D=6Hj$~qs~=M>9UxjDqWIN!%~Am_YzIo4-Jq&6obTaf|I`Ot@iJY ze+|IF%OE8oT1>jr71bUTp_zcD{^8i{ z)%xx1pC9rW54$C3c;l#$ZO&7z@>Qe9XWKy?Ha7B^Z0s#7TjDNpQ&qJwB#fNOB~b*Z zr81nzFI(kTqpswfabio3z>(4-+WUEpOM(cL!~Logz28d`0?1!&ol9%XdrYue`VgDCW;i* z7KTOvWG_`QRIJvV@7x3(_8aL^19}y+S$q8~z~W7>tA`iEk-6>ey`p>w-v4u25AufP zx(ubRU#fmw+Q^PWeVf_kGC1BqxUi_*ptV&Q>kr9SruuMZ;Mjd`v+GiM|A;;H4Ys`8 z7}SV_d_w5YV9S@2_$xM|e_hX;8<;~IK_zUEw>Pj_>D-&%lhqCp+J_8G);nrFYdzk8 zsDZ6l$xYS+GDf`!uG4KpTD;<1mPcg1bf^wCjlIMevR!u4jUuKR(pBYrO|A?epK?)M z6)ysgb5-m#iog4ZM0d!S+pa2c-%Z@Pa`-M3_>5CmsXq6(f0^C8WvxHea?yj- z((WXr>>r~4DGD0HR?J-}9y{eice`Y`jFj z?cq8Zb-wzEz;9CDbdGB2e=UT$HQ3$4TP0Mjuqn$ZNxMzfr8YpR(aEN~jkI`$xyCJP zeT1MTAR!@Z-&=s88aCZgW5Rw#9obV<(_T+K8AJ8Ue`@{R%YWoV3p`t!Zf6BXPi-cq zQ#sbzR4PuvWTg>_shrGqinTg5n$Ua@k*q1g6%z*tl%%E6(1vhbOX=WOly^*%#6><9rFFoOtW^?&UCwC(XlnKpW7|A@JNemUkZs8wNrJAO z99C6Tf9t1bt-(fLhj1up&?UcJK`ANNgzkrk*qU|~cK^Su)(@8V>i>Or>ijM>go>L$ za`Wk<`*rKv*Jxx=JFvxO5aGfT>kO;DXH(Vx6}8=#1KTx5n=?>Vl8^L@Sp*_oLzl&p z9Az@vAvbC1)}+BYd+2R9snC@7Y0aIYeB!bFf9&IJbWVpC}w)XLu)p>7CD%c#UZgKs3Ki_g<`|J69k5k(HjhR#ESWhyAiz{cp}EeQ=uj ztfb+zE_>}hbR>+#Pck?#S$70mYnoS0+q%+05*$?|z zgTlSlv3*GF?Orc<4Z5^E;pirQ`F`^t^gV1=NmPZ7x&As>7xIquO@66UujoA;oO3UG zu;Aj5$v(f8*V}d#*YpmB@`6x)KUBAR2|bEw@F2?GJ1KrTQ02A0Ldd+!@};Vdf8kf$ zEx%XG`%4v9a@`bbebJMWXsfq$-r5uJ1}X6Mn|5#tka0LoMtM8y7T5^Rcg3ksvIHLz zL{$}3trwtLVPQF?-Kpv$t2m->__^UN^~&oc0?tY;V3FZX%s8~XXn@_u=XE*#lv!u3 zdpybs^`!$DUp+NVt?%udaXW=Zf0du~aL#~K$Gnz?lbqApuO++qQR(yGTx(>@Y1ca9 zIKOnr;-8_+z7KB+dQc}Pcs*j%N9zcsf33APXXUsPwtrZ~svn<>d{s3rv8oCh&Q!1DB##79HmrIB z%G-3?3^vaW83(*tf4|h1&VKy8mnVyTDxQ+>suMP28tjP|leqtLX`qk++k7-IF=(X} zJIFc>2?If`C&lTb*U-5g``AukC8>62v_(?=)6)pSY2$RaI|HJ?Kzx;3i`~UGj|BwIuzx~(xfB*aVum9(Ny8qAr a>&q|x-~aVr|Lwp35C0$gN6%--QV;-0I{zvF delta 17338 zcmV)yK$5?dvm*6~B7lSegaU*Egam{Iga(8MqzFNOb+);ZH>aMJp@j)leuFq>XZVPhUsmgv10PFVc z2KCr~E7d8obTQ=I6P2y=O9yiPZQ*>susrV+)Jh?@d*cLrnNAK+Q1N;P7$!FDdWhia zs_;!TYMd9sRLb8+UPM6Y7uXtOYtUuIkYI*XX zR7n1SelF>judA`pL3Zhp@+~`-7?j^r5CW(@GtgAcRK-PQ;opu0NHSBq$@@*UNdL8e z=d)MqSD7V!@F0}xc=lj6kSr4WR0Au9d^Wspdd+*HBEd|vb`_`$IRgyg#fq+WM>`j`{3XaGywZ~H^}BzL@BS;T51V$Xu(Z{5^tBE#U57Db4VLW zNy#MYdwb0_Z&h_Qrcd2EwWvDD?j(YL;~s~!t-6RYrb|UW2rh$1ZDT!HinHS{?;p%1 zBwvLbzO2?S1N>uVU)!6`YIuv#MSybc9~}tXf)Y=8?V*;Z^DNZQwQ1}yRrt84j!cs< z!Sg#zOkp$W*J|}oaneMwsw0Bsc-&QI1wiW%Hd3;1%wIV%s_vl359s4zl>nN5#A&u? zP(O8WT!2#L(#M>CkYB^Id%#`M#-MXj6jSP;og&1ja@DDDK-3s>DkAZ0$vCRvu4Sev z(gC5mANiM)_|w_1=f|ASo_f{QEl6N$x~Fb$I_yw`iKnmU{;3BD)ZgSXre z-cN()ygaJT5fFuRQ}9;suw1?!=8OkbAx9C|q5yqp>i=F_kVG|8zLIG^xy~z4%04S; zLFVY*6+p{LDTd?AY8}6R)gOHMv*^s8<2Lc2TG{Np4*CX|NKzaI=10J4!^wzD~4V)K9xU*EP0UF9>lo1 zlch=WF%gu&;-uvjblv%Xg13HE7Ws*HPP8EKN;o)pO99n2KX|Cqh!o&O9-RZpPCYod zV-HJJQk6&8Tm6q>(#3!M{>Sm$8sE*)LHR=g0Rr8vJ*_5ulCp;_S;DU6Z%PpUk1y#UlUlBML44xqXgHN%xvLXi?g~!1nFu za}GANcBN{GUK)CTUyk;x@HfJCt_PLcE0uL|f?b;eLZ`PbYV>l<*=%ilnEWAf?S>9% zAq`2ofil33(;QmD*+BCqACxo=#^uXuy|Da8uiE)qA?i2@Q2QWQgq|Rpacw)gEzPIp zEEy9Zqu!$iGTI7{LB$#==j?TfqGaN!9W2e!%K!jKh@>Zf2YqIw5PpWhQknfO>Gs`E zWFOpWq}cO$bUoBDG^?Lo427zr$&GMEoh6)y+$lg@R}H*NISJAmh`nT}`_ywmSkaZ= zBbF42x=QGu$q}x`k5)hIMG-bZ07w3^T0bmZg)`qAo1Uu<6_gxj)-ovRJg~*#?>ZtY z-rw3=#dW_Rh#!@IMe=-pZ?3jYaUH{Ahuv(UpU7T3u!kDl1q5vb_K9+!8c8my7Pw;m!TNmln+hBBj)iFm3>6F(Y&!$T!cD zY{9_k8mCGj!$B{y!E3dGMw5gu)CQ;)Gi|CXkNpKwYs&IFdO5OaPnaWiDu; zdOwrKmySpX9e<1ys%WD0C`TB7ks5u95D>TKL_}|_H=F*Xg1yrC!r{Yf5V{5}o z?Vl9$)29xoIi=qv?`Rx<&t7~{{51X^sPl)wlylfMp>QaG6?EhcU`99rtG&p9gq6Ha z1|1z+)H~xL*G~&Dt4EG&*?*1>kMxyB7U2V_-2rUl+Z7JJ z8tsLOqEF6;qd(fYOln=em10$Q__A6*SIumKcSBLhwxPLGKO}DsK|A4t%C$Ima^|fK z9lZ!u%Z5C@{YD+&+D>Y^&uv^(+nyX0>YNHmspo#)#GasaPT10Rs=R_gl4^uo1?sh0 zNpWQ$?tj`OyDW``Q>)K&x}97guzMTrr9*S@IB40E^hxAByfe9$EjrTNR)6=hKt}mg zbI5tzTRo&~4K+B{$3v0feOXd!$oBQ$tM!su{FFFQTA$!@DbarA`*0F#`-VSqs4wZ} z0J=lxP;IudlTAbp8`LEBL1{}iEq4>TAC8={GY2K(a-y899G5Rj2p)glmxH`i9s?vp z3_5jRj_Xzyns6JnYd^!>%rQqnWtNb1l&Fk$JAi5<*y?ts)J_P?ux2LyhCRv7XCcvh ze^|d=HNOlL!w29>W$eJKL&H{ll4t>R&q~itcW`41D^N$!j%qZq5^9(^B1G~bdF@9Q ztTwU=Gn}K$hxg%<0fv7JrAxP>q!sFu=cdX{V7IyiFTgdnC%L2OC#Qs?f2fDH9f~OQ zl173&2itOutk0%bFsv%*0s@Z3*-?(R2A9AURZ#fSS|*gOWeW)GWQm6~&{dD%VLOa{ zIE||F<(D?buYqFw+*_K(PMvO==1q2PBD=L^wbqtm#v`bdSG9j@Y;seowiv3g@vIc= z$ZGoKd!Ja6rkdbh2Fk}fCf{HNPSXIPDUTs1v;oMKDFVFRFEGywP)kKBbrq%UswFBgCFKQfC^)r!~1oeT&{W_^{rUxnJM*4C9NuU(1gO!6fKO{r_DOSL*F z=#(wJjz?)3>2u>y`hkMX2WV6(>J0+rZzrSlZvm_&joYjaRl}C^6yG#mEj#m}-G+{K zyYZ_pG<9FlqUh=TsawRH%qn~wJ3yio`CQwdv}jg)JEDKj&KyxOzkLCCJ*Nr|TZa7@ zTZUt)@21AQ9yMpDp8Imu{A-}d33|iRyCe;8a#s_{ly+ZTgG?`p3cK2ScD}*syn4~C z)E1&52;@vBl7j}##ykqjzPj9isb9v@62z%^YCom#oqW!KTPis{())QG<*4Ny$frNgq7Sr@D>19 zP3mriv#J8J&N~mew@T79!9jH`QJJz!2QskY# zD-q*0C17OBQ^`bMMcxpB`dKY%m|6R`DF1&;8~JD`TCu4vqwLW3om}d5lW-~YY$+@a zL8RkZ+kglN7EK?}Mex2PVzgDjiHEVhJCKqzVo|Co5UzDq;#337Nov|McJ?RFgrBy4 zpfY$}HTR@XxF((~hPXrqmnwUvU0uo81>hUa;cZcek_D*3H`Q9B#7*1AfYJ$+l6QZ~ zhQ2QKq)wK(P0CKE*<_jBwm(!lCl+vi+0Wlr>&O0xSNyQnnxX4>qeO;!SCq@PsEeGC z>69%ge|Y5-)P$mV-V?lqE$d>1+1HPOH4tkMNXmfD&YXVdOkJ&ldY3u1I zhj!P^OPfQh2x9%PtImFF(Xs!l2a0>G#Pls8tSS7}zu~PPEDu0`<1LWNvAfJ1|66dX zSNEmuwPcxRSg>+_47~R${gRJ$+kcsyhMH9fIym>&>6}4#2F(&iVPs0;>WqJNBQ+*U zmZab>ze|Z7x5ck|`EMbc)iW<`#iNLah9IK>)hBgOw4?q=Ke{F;pKMBQw*I*6O9qM# zB7g)E&Z4u*#FXG-9eVhHvgPxz8#M%WR`HlrAyfGT=QNxEonPYCkIZ7a;z!)tN&vf7 zXDchSqRsB$oq=Jz2OzKMCQg4TM%iZtu>|(>a!N@Te$|%8O8(FQVl3|}L=PdA<&ZwP!XYVL zSf&m%Is@4bTAXu-5>k`EMCE?$BJol-?@h8%IN|!EVMSs81WAE}vVQ7ps%kc+tNPiU zolZR?k3r9cr3M7$XLx_&eR}r+4C5I&KO47Qs=eY%N{};qQw`U0@`==`T5~QZqQ_sO z!h5xTNH*=`Bx?F{n|=ve2We$`T}K^%+4;)7N@I!20&W8}+t*L@3G1)v3Zs2h!LOjCN7^PZYQbZh6(gG0|N32Jzt#!5A+i1nW8 zvK-qAL|ttM|Pu5K$F)rn({8{$P2(_nW5sY)KCLB-8e>t=;@+)OLTlb8kxKXStj*^U2QCd*`*) zJs%-h3%7OCs48W69n!^yR@-b09j&WAqRw_nF7~34cNkuPX%~5nSLNeXeOX>$NBN;F zdQ_r=kd+-U7dALTp(de<&tNl~9c3iNVlF;Gmz{O9stTI4i^R^yAR1HOmp_JXoB}G* zzHb7E)}nu7?N6!_#b0vbkIbTj=kL{0L5A$!ZPdt2(PoK?%~6R}Pa`8?@l4Hbco&Ed zeXEDePYtGuN?S_)62uIbB1bCeTVXpPPE!X*C05-w;-ypO9ws9aRTbLbg!$UY#i#yA z9PxbWxmKyFifX0+-oPsBnN@iT>NYw^LEWXxU8H|Z%}RQ3xXc{Hq}IISESL8h(=M6w zUSN}|r-n1dT?nLc|t(eS#1Qtcz=@D8RF%94y10ukCa)qAmnf;HQ#Xw*|_rMoUtl zt6xL^DLD$DBMwd}r&`GYAQ0Im&j{b@#2=YOxB9!P9;Z6K@z!Klt!#%y9XA|JxAAl7 zOU=2_w}!%p2v72(&~A?eK2T!NWn^kTe@lO~*_V|(0?DGylJi!Pk>Wy8_zT3OB#X$3 zSN87s6}P000fGVOmrgAz#}VT z&wGF@ik)c?5fEru+Xlr+ojtbKr%;K?M#uTrz5Ml}=^h_ac&B7h$50nP!H1PUE8Bn1 z7DH5v8$4a~aRU?7i?gBg;G0pGK` z@y~wL0fH*;$_JRBjD#|M`6jGruNlg=jgnLi{;b(0z5 zp&gm>*jquQ1fIG?rTl7E3x*vt_RWfOvGKHhr9FzV3j|J@Ka?VjURFnirNpNEM?kwN|h+Tx**2s2z4uA{T=TV1C!JWsfc(6aU ztg!)lDnn0heW=G5faFo(f|7qKhxgs-Hctm6iA>E0r}q!3^>SZ1om$8<(vv7xzN}XIwLhvK z0$eqC6QbP9^u!Q5>?8qxR6acqLV-RFmD)y|AT`W*@r~7G{*iv7)3kqeY(eQH@$2%Y zCMC^9A1Atuq)GMoqKMd~9rmrKsO8HGojR{Vbel>?-db-RW}U^N+vyd#irUx(o@I`_ z8XDaQTb09>vql_rR30=&q?=xE7HWf&XLhg|n{(*P2{2db1e^gcBPm|`aP41K>vw4X z{J4WqNSc#uqb(>bV9S4%PqrOa`Lydg(x0hv>J^??Ra?XhG;+_d#0E|X`mW01 zuTDY9Cv!TlC)E!q4(h4998vD9<7^5?fRTm*&-__poKy6=9^QY+2%{;iXhl_LXZf0I zR==#)`77c1F}jkJ-~jTvD?@0c6$RstrV)-M5%ohPMo!%l(Tfa)0JoI^!u>-__m zU^^S2&{a=Xq*j9m&66)1EP6g(-t!Z3$8#&xl9jDlZ<0;b&;$%GQ)TLcN;ZvEo*N&p z*-mD!+2wLx=uv-%ms*wTO40FEi##-?$>tW9k78{Cy=FiuUwj-O*PaI-U2)&@dCKFp z4GYaNnmK)0tzS}ee0TQwx`z#~5@(xzo84@e`r+19=b{)(NSHuG9VQi6&{V;(PElBL zoYx8OI2;!!GKKXxygK#ZlbluYJfGSO`D%nY9>`t99|C{e*NsgBWyDi;rmQL_K$}QK zj0$oD9@&49N}nn|v8iY0Q#sKWBWGMY7UyWZeH0-$PFhdzoNVvgzI8_(+g{IMliPWd zyKF*I(dihF^kubvNzETaWExoUG#p@+K$)Dw;p1)(Kv$-mD#|}z8SX-_xN}sO+#4YC zz#Tb?o;H6Q57K9XZBXHSwkvXdgN3i8b3OT-cjD_QH%rAvAjRLWvSsu({x!|o2HVc z{7!AU=iilVBsG&KjOYE!Lr9qZM7CE^b48?CnpeEcbi zt!{J~%bOa@0&j)-(DYtb?&v;Mkyp^3N}EFc2`t6h+MZM!HyN6Tdhv-)#~p1iu*03o z$iaW%71w##mw(o`DF1tRdVETzlhWIHE811SULlfz_z6dJs1PQIo)580;yxyUfr1vO z^lZ90C8S37@@e_ggbI^;b>v_Zo+(VatZ&U7;3)M^4t#MY4$8+Y&W0MX*YS| zKxSK@$eWnp8I=mgg-^3Hy%rG>|FQdaRem27HWCOF#Yo>%0U66AL1zgg(3Ca6BQ99g2@ z2~ws=)KvD-4SOV_j%H{Ie0*80UmnEg@T;OH_f~$7`xG;yjxF(WTqHLc~flzD%8`Ymbrkq766NqDq{xz$qI`tsiGlZ)SCx`4Fh z1e==d;5#xqWpbNa(waZCv{`P2Y|?L5vVbpJ2U>B`DA`wW7DB#>bGY52nB}_-9)Ldm z55RI7-V>y$8dK2dK_BSoE3Rj(Z>#kpHNW>3vDCp`N(xfXb`hnTv-7rfdv$*fF&Ilw zptzGYqPp&>&mwQ?l%}mO0{XHiK*$)P1fk~YhnJdCzuRLQJ8d5D(xId^XKecpw=G>=n7p#=4if=*o~dDvH&zaHT_HFj z=!rQVN*!l9bVb?Q(SEa>#?*hjLHV*;>3108-A|QGd)gj{Pw)zam7^HTRvt>Ad zeS)(&*L5rGt^sQzv=k|9b%MBupK14JHhXMK&np>y0Nt~qxrd{?l%A|RB|Sx&qwKQU z-&PM4PFdOSu45M)w=32`TyklEW`UO^G3&W9G^H!b38~6HB%8#82P%K-jYz6)ICz9W z$dhH`DdX`JmFilRmEagGKt(IAay*)f=*9D8wesINF=+-Ab^1y`-C^sT{mHwtf=W_w z5Nwrbzd?;x19K#VbQPzi9*CBRu(j#MoR1FoK0a4)N%WD1bAo9oPik6krNoGBF$}?=IdgB!+ zafmmkazGrZrj%QDa_~??4iIJ#iJV#LJA}W9T$5Dq`ZA?<8IIp8x zku6*bEU!JT<1LZ|;13dPLQB!hMVsf|#ZyuO(AS8`xp*r<)+eh3D5GgK8-;i3+TKv{ zumkJu*H!xk5NCtxCxi-nM152vvQh;YY-R&Z9IKHgb4-cYz@F4mn21t)|eQ^DA zs<@(jj@Q0p>kofX2TdRZ&<7A)(sB^9^mc1Pd)($@!Wdyl5#qYMBGF(3Fm3d3pfEVB zrz?HVa;UNjxi%OjNtlZ4jl<9!Xsz#d*5YFvzRAn9+OC>;%h^L)_6|Q^F=2HvJxZTZr#z^l^93y7XG7)Nq~Qp2|Nyr{o) zF94AdMEIb@=-k4lfW@RFeG973lbg;g4115R5Yd103fg`Pyh!pY)j2e=rC(E1PtMtL zZDl$rizB}a zbKLjyWwlSMqIrpj4GGIv>*f`pF>^IP<7HW|%ZJnAj`qj67?EOjddF^dkv6l6-c z&2w>#s@w6AZ=z-7p4HF|EUU(-nhtNEIruHph*iBTe^nY(bLLTDIjNJ8$6d}qejI-) z@_7d?vJd0SYUN*<#dq9dqu89|$tkS_ihMK#EQ&yDWyL`yZdh?E@0hiTIka4+cj#< zao7ZBRU=u=u{~ea;!}h*$|zMF#kqgoX+)q(&x#mqi`r8a$e|%`-~1yL)UM1H69;9d zBV$&d_!fJt^li0%ZUZS0KB9c*lLhu`@Tk`#Zr&9EL-%Luh~gv>!0F6Iq3i8N$jKsR zTz!`sU_!Q9*fR5vTJ03IC&z{Z9kyzg2Q-j6qW69FiRL1UQK_Uey|DZ|fj)oHA-lsF zp<9h+37%JWo{^L1PN`1w7oB(jcTu-Wut{|4Nx+z|^JZ(eqSz@9R1VMJd`nh&NUNOt z>F}}h?oZrqBUAUc^BKGDchbCywV5b1yIOsGcklygMJ zbUFZQ(}^8-2<)e~_Zf<{oD6dTi?5Hs`ac6iKgPZNt1J zdy7&Mu(OIZS0aCP^?3+>nfRv`OPN(quN3R_UQhmtI$*cv%tPZ1;+Gz(3ekZcy}nSr zD}dz*R@NTXfCZRU)*2&*_qOZqMcoApRVVq{w6h*LK@{! zAgw-s1n&>|NT;&Xl8HrsyP{8G*Z5xO!2dAfM=F9S-b%k!b9q8z| zl68+95`BH{SKNOJnmb**T{^wT?~6y5^d-t#06%RTcON9RMR5(_sa~*)3PA2h)i{+y zMG6jc_GDl`q+B*N1qNx>q-wqld?)Hj<>{S1D@C2Z#njdk&|z!sU`mcg({JUMqh?5xeQ;sK$SAviZFoPg#|66)si11`D!q zMIO&`6g+O{p|;IU6$yEF$Znx5VdnOBhvdPL4r=8|_V)HeWmhRmjzir_eoex8@^l{9aZEcOU{^N0Gbugm-jV+res#5eZUf7Qkd0E1 zEKt)ev;=>(R5&Y6r*hD%!+eUADvss#e6ct(Lwhh)Luy-XNL`R@r8*5(-Vplv`K@T1 z&Hh?Y%5Cy<6wggsFIn=ELh)iG5fG{{AVj+z!Om?_2wknLp>PL9Id~w9>0wZ}f>T!Z z0R7a(gU4&PzqHk=X4eZ0*ricWSK6#Nl$+KehMa$@$Q3a&Y4aRzDcbj!DF1UCm_EC& zL9NbC7+>-QMg?Fyu(kL-VvTxLS$QLhM2ArH^RSK|+03c%gY7ew7nH=%+Ft(~_JYOc zUG&$~|B55yao*ij8(3hJ@F>;!zG?0NB?oS6Po&Ly+6?FG5-8c)U`nv0_Gp&!Kr!zC zYf^uU!s%6FIlFeX>}1}lFS1PdyhuF31TY;gm9I;huX3HFKJdi78vvwLDysX-YW-sQ zkLdzCZif_gML~$rLH=eN;k3NIPjv{D7x5^Pah=wc2S6T?e3PX;3{~bu{gi!5D-)3n z!~9m3@hzK#qR2w86_52TmElldyn|&wtR5MHW@SN(d0@vd_3G%uTdG%m>o3V`oQ{uP zmnvuo8-KJv%GEkZZ=G7bg`2iWZ-N}a@Nc;?SL>&0qEzI|%f zqmEBXy>Nh>byfGr8<{*^fZ*@Rg-de|}D)?5ut=12g4_6HQFI@-z8H%9&`n-nR|Hmpbvd{_bKFNq;Y1 z`;E2xA?MjtU*eEank(fCh_DdS*Y}Ck_z`3YN_H}U;^9)#_SgpMQgfqIZ`tAddPZl# zvbG?E2Gt2QYF4-98LFXO7r8dRjmYM7ApU6bDdkZBCqh=Azjem}gv(UJ;ds`4JW`qW z)?<%aOoGrgVb$SaQKK$X3%LZG41Z`uEZDr}$ZC*v$Mef-{VE)M z7{5xY2n2)9;y-)zU1+jFeEK`0v#Z=cTsSVpRYrN%%U8GE_V{EnZ5LQ^7s=;bkMaM0yzyX(-wQ)FSM%eSoPH#*Qa1-5!!gb$^LNe>;?~o7K%8 z9V}XKg1A!()yLrphuP;*=G8k17NF=&{ZxZjNukJJ@7Y)0XepR~uv%jq$a)sRdxuls zm)giu7CUd}ooteT(>L!>tG~WvM>y+0milkhi25g0Ia}%mI;0QKHwls(^|6vN*bna_ zuD>T&T&)*N_Z{V@#eaL$q;A=Z(#B=Wsa{TBB<0<8ok^ffLT|Os;p0rcOuDSr*d2-k zKl;w@){%-WinxK{4h;eiZGm^M`%)oH;~`*%lZ9TPyzjSoB@UI*;2v6|Db(&Tz6`lD zlL|?(TKC;*+)+nc7=4{>2!Y*q@_J%xM>TT&FB=fx9EPU{w@{2Do)I#y>01$FBNaw#}( z()m`D_`7eD^}|VD;#T}M#%S-jMes258WPBKZ8No64Uei`XVi31Hs6*yAIgK8-Srt! zBUP0i4ELq24hKDN zpAu?UB7a>RY`Eg+Wmpc-O)JAog1-`oD|Z=JYg!KxEVDwt?ASnZ%1Zbh?R^r(CaOyxoQF9UihqhzN!e~yZ zi20ma?o4leoK5ubkD3-G)3?=%KX<1eJcyR`;eY91(M<4pticq;Ui~tk^Fn@A;H(;% zY>`JSKzTw{barK0y#63*pTdKxNQlxPdVjg!D)m4GLFB8hG=We+NV4do*m5_1tk*2Y zqXX#FYJ=aUh-BBM^VYvtAe9xhZ(hWC6{=VOOSzPsIl+H``&ReS`e z(=RV{YCRFue$tr|2O1ffwnI3)6v-9YN!RxAH<1K)Mx8NKjmZuz^NR=P#OMADnt zU!(7B#K{7)S@JF-wi+M-|Hyzb^{^GYQ6TNP4LA>*hg87Z+UWR`4S%#| z0TLYGw^!U+`kNL28%IN~r8j2B<+VI8*MLfZx{P^XLTZ_qhJzmDCH6ka`#9Jt@+ANk zm!5s)S%WC~GLK`oWr6PNAs`CzEA)NK{`tStp zZ2E6e5?leOCJq3%y}B3=6?i38UX4l-sIQ7v*5w(vSLy{4X4kjlP|M!Fek0X&oyVOl z4fnhh=VF_)5K3}7JZykr6ATIttp)g(L%Y~g{b2zfuWO{b}?KO8KYY)m85)OZ{<$-+7%frx>uuD2-I_k;m z8CI!*CfQJ5!%9pJUL#0yY4LS;%G26IqfZ79oqxuz7qFoCr7R53qdaoW+OtI}ESN9- zs=;8!qk?&yJG^1+p%7$RC*w9&YS-7j$?o%4vt&!)_ z6yl^-3f-JbP$$Q3RU}-&3`Vfeax;$$<^%L zk{~ymEU4zK&cVGE7e%iujraKnf1W2i!}c(yt|Og!|Lkpk%Cadnv##Fm5KsG;)p}`- zyz!PDf#Z)tc33;ZQ=|_9S=GNa$40{Jj-2a17CrFltSkes(ydeKg593mZhr9U_1eZ! z%3K~g>#$!&a@I?knt$eSmCZ;E4LP1?elwCdwM+GEMarDkk6R6#*PMnw>Z~C_QQRxwiCxU@NEluvi-7iDQZiS=2LpB(MslP^qxQMu1+PV#jC&|Rut1%DaZrSWU1G{hz(?sBvo z!O&HM)2lsN8h1BKI!Tk1b@B6pf{*SzLN$B#50)+o&lq^3o8v0 zzwE7FzWniFay?g6oAW)@faMb%;gs>@thUzF=4EguDA`*!54`P|R&5@ulB_m@FZm8)GM4d!2>?JJehkqyv^`2o1 zJd8rd1wlIVa?WRjO2F{SCMk?{K7GvR%t4V~$>_R~e_5@c4p|HzW%acwf7xIn#(Q+3 z_KxP@G(28>Uc;*6kts%i(3bph9yczj{Lk{XzBwJMn)P(ZT%8|91Sww}t{|!Ke}R*| z{i=98b%>Jx%>t~fH_3*OCTEej|#%4MOxO3 zOO*q-dt9nMCzP;Af7x2)YaEpwUIs30Egn^uh#1jXJVLzpn<=j^tMyU={}|fm zo9H{Ji!|Sz&#I@EB3w55uakpMnKMA(fb@%J=tb&L2bETqUT@ozGjnhX>YnFsYIJqE zK}$ala)r_~Txa`}3CLJUCjlynx9f`DPilbx-J{d%w`|M-f52O#cm7Lx-=77v z(h!jtNb)A>+FFmbPi@B|DXRP-0;Q7#vwMEUOUQj4*ENN6kh6%=;!xv@cy>M(4_{X6 zmoOhbeMCqqMd-BbTjW2=!c@SlQQkIZVO!Qsl6tqvOC5OKn(+`pPMPx>an5{M7LmV` zB6#)U+bW@|HJ#LWe?<^vgvug_TX*IJZh-h-EwUzENO>rm?bR@IsP*!wmq8r6sr9{( zVn5tYKC@xNUP)5ntV7$r?aUXKsj50;a^_1t!Qlj6 zyS{+=-xgW=a9ttv^$krx_?i;v8Gr0iOD*fYF}V&A^6dzLe+oBC>xnH-U5IZ!&=n-U z%|`SW#zs30JXQz!ReA!2-q)V|T8DjJ2S~`b+Ne{Kyd(|?1%P9Kkmi7@UrL+EO37a; zEiRL(UI}9MTpMbRI zc&?)m5WlR}fAuR5`!Tvg-i>zoqAHVH6j3oKyFi==ik-t}m{fysOhyJk;>{`a^bjX! zuGu*pDwiGBJW|NoaRPl(U6Qe@@V(i+tttamS#Kbon+&Xr#tU%iBSZCe?nz`BOtztl z^f#qWMbLz*#$M52_qhc3!6`h&Rf1T|>ln@hpmXM=e@g+MOf6`q?dDZAR)5+aw*oXN zs0ti734?pG{u|)>0rT-gY-CY7sQf97X(*=lPuW-dA2;)ul`erI9E`IcLHu zm4;ldB>6-vc%AvLONjWoJWU_OQzfLmcr7xufCKWVn%kwf?I^jOTHEgQl?-5TPA%wA zIyHIW*lxCoG|Nl-SmhrH&~{u-PS&1#jiMal zs+tbN-%dn+-0d#go6>lZ;*B>bj;gA#6; z9>(9G@1`nxRnib?B0Ep+@GU>2y-B#usdj3k41Qsq@Z{NQp2ynOvjjWPD7*BK5amRr zM8!v*8nG&oO*tN_`BCYUy}qp0kLwCaf8d=H6>sD(ha0z~RMjG(=;2sHQEE-;Qg0lq z#)&**FFvXjWFbac@_|e#SCS^JjhE862r%S5BXt@GhtMO*k1+KZTMW8)@ph5u|JqxI zTjFWZW;$vJPgMl3p9Ji06@&|7(M%MoE`f8Hsu zyup;DIimAD{Sa(Bw|jaobWe#c=8xsuuzI zP;R+Mb!X$fC{@H8Z1`;VbPa|KV~e)9 z@hKz$YD?+yO0u`%?_28)1KiyeE+?gbS*`Q8>GN^b>>bGjauO%<(l&S-$!uXj(6W*1 z)IEHWyMZ;{Oda|RJ@L7!+!h;~B`IUe?&iai;S-@oIolzLoHY)E>L*e;e+Dp+>=}Sp zkTz0Aepf!K77_A@Fhm-%a=3UhZZ}dam3wu9ygP%jNQ#%om~5qemkvVH=^jGuqfQ5B zFis%hrLfNF=xvsBF%%O}V(-=$3_PP1pPsh*NPJnXAF+|+L&EduNwE>BG3vP-@zMQa zjeAI5o+KK@RI2?-s=VF#f8jmWQev{nogxF5rcZ8mb%+^yQ`?vT2`=O{osOOmwi0oZU+amuhf>+I06g*-S%Dtafj_WhvWc zX~_a2@2J$ym*BV-wVu3Tdz9wjlp0sdzUtxGEhjMyU0+t~58fh@f4<|ER+;Qjs>CAx z@%Gf=apzvCRtOT(Nrs3pC7orKyftayj-W@aXAeWNy~MJd?`O41+FOi410v9=jadcz zbnv=CT$11Ying2Adn^j50nqju^45+?rEN9pyR6H_zZ!SfP%)|5!j8WJXEPVaW2qYD z*Z@rxA@Z`}sqzr?e~44ch6=-k3c8&UrFM zl*dbDRcs_cX#Bl==T^V0*00z|e4j*$ zTm>yCm-=a=jK6aBzU{t2Mb@*b(Hp>aNdsKM-T@k z*;8-lwf-=by=qL;k7YkG*u1RzZl^I)=kQW>-t}GzjCDJ4d2W3;Mdr)}U*gtlyx`*` zvW+F=XN{aR52L=JZqIBajs&2ZU)p>5Xs^kmsOL;ueA$c0KaA8s{zvby%BG-He8nwx#*~26+ivC_0{{;!;1lpqZK$v16^EHv z+E@--$y0$}!Yze_lK2ULzWqWe63$&G=6kF8Qa-TnC=eUv`Xaau?e-{WC8uuc`j^%E zr6koie-Xm#HQ+kWCOU%I)X8;<@=-L>snwB5_tH117`H;+AO!2|B#*&108nfl!ON2- zfPGZzzIe!gys)G{#5-oCo1zZUY%9z5>+D|59&bU2TPGZSOgKGc($#HEtMZz*;>I9W zakwr1Ie*(bN-`{!Hc6Xjbne+@ca%B1crbyxe=@WI(mI=M_80}7L!o5KPzq@sw5_aX z9$!}LhX}!8|BxQ0>S{?fN4_M1HeGQ$=%_JqwQa7I5^L25+2LUwL1X7DMHY8U^hryphJ);aA>pqRFRcgCro6}atYi}vEM{c>gI-pu`P)#^Vd&vjW zf7p`m4&XgZWs{SC%EEP|Pu6R-kq7jg#}@NZ97UOzd(ZVMD3u>-2aUd;gVh{1WmS3N z+4H<9PV<+X__{m&@Q$xe0Zjw4{5IT<)8yKygIh8dsI1CH01PYSl&bfEwgVhERr4UL zthxtDgM5DWHmOTWY4%Ebst(lzruF2LCbr9=)_+;h$6PbdOB0l9TN4}eM)o*aCV)FiP!dHKx|xb$ZlE@HYs z;i`!%&n;U-KW9$<^_Oj%tMx;KD4#?7M0UP4=_+y%FVh8E=Te0=BWK)b8B8APou2dW08%wYp|#O7h)u;fU{4C{Y^uqgBr(Z-{*0 z(CllxKxqjgirY{3(mbt&8kN$Wtn*GsJEsH<$K#d!;(OoT2F5e0&@6ztH?kS6X@6Te z#?}Vwd(c$j=g2X>gd)=H@Pbx^Dyq-HNe*^!}K$`URoLJn>2C}hG= z1y+FtcF;P`)7$3djXQOgRQ{`X6fS0hByh(zbU-csDC>`a{4 zS@l@c>EK1OiIm(~DR$2kr&nJtLVuL<`5;PfDR~%Kw>ml4m)Rw(OOL2qd>1v!Vt0eJ zrQ00KW;P#MzJ`vkk-S2-KXmdNLdhkU@5p?@8PDh2-ufXzgpa#ZU7(kiiqG`Mr%*Dq zYOmx`EhMUSJWkb1dFy-bD^~R@lWIj%gR!g+gs(KuNs)oqRAsL;H?a-xgJE)}uj1>+Q zz|l1d9X1W3(Ub>fl?yCZfk7c`O~X8lQF9NcDF_lGlJal= + + + Joblib: Arbitrary Code Execution + A vulnerability has been found in Joblib which allows for arbitrary code execution. + joblib + 2024-01-02 + 2024-01-02 + 873151 + remote + + + 1.2.0 + 1.2.0 + + + +

Joblib is a set of tools to provide lightweight pipelining in Python. In particular: + +1. transparent disk-caching of functions and lazy re-evaluation (memoize pattern) +2. easy simple parallel computing + +Joblib is optimized to be fast and robust on large data in particular and has specific optimizations for numpy arrays.

+
+ +

A vulnerability has been discovered in Joblib. Please review the CVE identifier referenced below for details.

+
+ +

Joblib is vulnerable to arbitrary code execution via the pre_dispatch flag in Parallel() class due to the eval() statement.

+
+ +

There is no known workaround at this time.

+
+ +

All Joblib users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/joblib-1.2.0" + +
+ + CVE-2022-21797 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-02.xml new file mode 100644 index 0000000000..ff38eed4e5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-02.xml @@ -0,0 +1,50 @@ + + + + c-ares: Multiple Vulnerabilities + Multiple vulnerabilities have been found in c-ares, the worst of which could result in the loss of confidentiality or integrity. + c-ares + 2024-01-05 + 2024-01-05 + 807604 + 807775 + 892489 + 905341 + remote + + + 1.19.0 + 1.19.0 + + + +

c-ares is a C library for asynchronous DNS requests (including name resolves).

+
+ +

Multiple vulnerabilities have been discovered in c-ares. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All c-ares users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dns/c-ares-1.19.0" + +
+ + CVE-2021-3672 + CVE-2021-22930 + CVE-2021-22931 + CVE-2021-22939 + CVE-2021-22940 + CVE-2022-4904 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-03.xml new file mode 100644 index 0000000000..e9e5d75505 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-03.xml @@ -0,0 +1,42 @@ + + + + BlueZ: Privilege Escalation + Multiple vulnerabilities have been discovered in Bluez, the worst of which can lead to privilege escalation. + bluez + 2024-01-05 + 2024-01-05 + 919383 + remote + + + 5.70-r1 + 5.70-r1 + + + +

BlueZ is the canonical bluetooth tools and system daemons package for Linux.

+
+ +

Multiple vulnerabilities have been discovered in BlueZ. Please review the CVE identifiers referenced below for details.

+
+ +

An attacker may inject unauthenticated keystrokes via Bluetooth, leading to privilege escalation or denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All BlueZ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-wireless/bluez-5.70-r1" + +
+ + CVE-2023-45866 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-04.xml new file mode 100644 index 0000000000..e900d76586 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-04.xml @@ -0,0 +1,68 @@ + + + + WebKitGTK+: Multiple Vulnerabilities + Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution. + webkit-gtk + 2024-01-05 + 2024-01-05 + 907818 + 909663 + 910656 + 918087 + 918099 + 919290 + remote + + + 2.42.3 + 2.42.3 + 2.42.3 + 2.42.3 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All WebKitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.42.3" + +
+ + CVE-2023-28198 + CVE-2023-28204 + CVE-2023-32370 + CVE-2023-32373 + CVE-2023-32393 + CVE-2023-32439 + CVE-2023-37450 + CVE-2023-38133 + CVE-2023-38572 + CVE-2023-38592 + CVE-2023-38594 + CVE-2023-38595 + CVE-2023-38597 + CVE-2023-38599 + CVE-2023-38600 + CVE-2023-38611 + CVE-2023-40397 + CVE-2023-42916 + CVE-2023-42917 + WSA-2023-0006 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-05.xml new file mode 100644 index 0000000000..b1ce5562b5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-05.xml @@ -0,0 +1,42 @@ + + + + RDoc: Command Injection + A vulnerability has been found in RDoc which allows for command injection. + rdoc + 2024-01-05 + 2024-01-05 + 801301 + remote + + + 6.3.2 + 6.3.2 + + + +

RDoc produces HTML and command-line documentation for Ruby projects.

+
+ +

A vulnerability has been discovered in RDoc. Please review the CVE identifier referenced below for details.

+
+ +

RDoc used to call Kernel#open to open a local file. If a Ruby project has a file whose name starts with | and ends with tags, the command following the pipe character is executed. A malicious Ruby project could exploit it to run an arbitrary command execution against a user who attempts to run the rdoc command.

+
+ +

There is no known workaround at this time.

+
+ +

All RDoc users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-ruby/rdoc-6.3.2" + +
+ + CVE-2021-31799 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-06.xml new file mode 100644 index 0000000000..0fccef02e6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-06.xml @@ -0,0 +1,43 @@ + + + + CUPS filters: Remote Code Execution + A vulnerability has been found in CUPS filters where remote code execution is possible via the beh filter. + cups-filters + 2024-01-05 + 2024-01-05 + 906944 + remote + + + 1.28.17-r2 + 1.28.17-r2 + + + +

CUPS filters provides backends, filters, and other software that was once part of the core CUPS distribution.

+
+ +

A vulnerability has been discovered in cups-filters. Please review the CVE identifier referenced below for details.

+
+ +

If you use beh to create an accessible network printer, this security vulnerability can cause remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All cups-filters users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-print/cups-filters-1.28.17-r2" + +
+ + CVE-2023-24805 + GHSA-gpxc-v2m8-fr3x + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-07.xml new file mode 100644 index 0000000000..bab052a4c4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-07.xml @@ -0,0 +1,42 @@ + + + + R: Directory Traversal + A vulnerability was found in R which could allow for remote code execution. + R + 2024-01-06 + 2024-01-06 + 765361 + remote + + + 4.0.4 + 4.0.4 + + + +

R is a language and environment for statistical computing and graphics.

+
+ +

The native R package installation mechanisms do not sufficiently validate installed source packages for path traversal.

+
+ +

Installation of a malicious R package could result in an arbitrary file overwrite which could result in arbitrary code execution, as might be seen with the overwrite of an authorized_keys file.

+
+ +

There is no known workaround at this time.

+
+ +

All R users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/R-4.0.4" + +
+ + CVE-2020-27637 + + ajak + graaff +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-08.xml new file mode 100644 index 0000000000..3253401f11 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-08.xml @@ -0,0 +1,47 @@ + + + + util-linux: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in util-linux which can lead to denial of service or information disclosure. + util-linux + 2024-01-07 + 2024-01-07 + 806070 + 831978 + 833365 + remote + + + 2.37.4 + 2.37.4 + + + +

util-linux is a suite of Linux programs including mount and umount, programs used to mount and unmount filesystems.

+
+ +

Multiple vulnerabilities have been discovered in util-linux. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All util-linux users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/util-linux-2.37.4" + +
+ + CVE-2021-3995 + CVE-2021-3996 + CVE-2021-37600 + CVE-2022-0563 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-09.xml new file mode 100644 index 0000000000..af3682ee36 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-09.xml @@ -0,0 +1,44 @@ + + + + Eclipse Mosquitto: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Eclipse Mosquitto which could result in denial of service. + mosquitto + 2024-01-07 + 2024-01-07 + 918540 + remote + + + 2.0.17 + 2.0.17 + + + +

Eclipse Mosquitto is an open source MQTT v3 broker.

+
+ +

Multiple vulnerabilities have been discovered in Eclipse Mosquitto. Please review the CVE identifier referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Eclipse Mosquitto users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-misc/mosquitto-2.0.17" + +
+ + CVE-2023-0809 + CVE-2023-3592 + CVE-2023-28366 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-10.xml new file mode 100644 index 0000000000..ea5f16ba40 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-10.xml @@ -0,0 +1,134 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution. + firefox,firefox-bin + 2024-01-07 + 2024-01-07 + 908245 + 914073 + 918433 + 920507 + remote + + + 121.0 + 115.6.0 + 121.0 + 115.6.0 + + + 121.0 + 115.6.0 + 121.0 + 115.6.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-115.6.0:esr" + + +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-115.6.0:esr" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-121.0:rapid" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-121.0:rapid" + +
+ + CVE-2023-3482 + CVE-2023-4058 + CVE-2023-4579 + CVE-2023-4863 + CVE-2023-5129 + CVE-2023-5170 + CVE-2023-5172 + CVE-2023-5173 + CVE-2023-5175 + CVE-2023-5722 + CVE-2023-5723 + CVE-2023-5729 + CVE-2023-5731 + CVE-2023-5758 + CVE-2023-6135 + CVE-2023-6210 + CVE-2023-6211 + CVE-2023-6213 + CVE-2023-6856 + CVE-2023-6857 + CVE-2023-6858 + CVE-2023-6859 + CVE-2023-6860 + CVE-2023-6861 + CVE-2023-6862 + CVE-2023-6863 + CVE-2023-6864 + CVE-2023-6865 + CVE-2023-6866 + CVE-2023-6867 + CVE-2023-6868 + CVE-2023-6869 + CVE-2023-6870 + CVE-2023-6871 + CVE-2023-6872 + CVE-2023-6873 + CVE-2023-32205 + CVE-2023-32206 + CVE-2023-32207 + CVE-2023-32208 + CVE-2023-32209 + CVE-2023-32210 + CVE-2023-32211 + CVE-2023-32212 + CVE-2023-32213 + CVE-2023-32214 + CVE-2023-32215 + CVE-2023-32216 + CVE-2023-34414 + CVE-2023-34415 + CVE-2023-34416 + CVE-2023-34417 + CVE-2023-37203 + CVE-2023-37204 + CVE-2023-37205 + CVE-2023-37206 + CVE-2023-37209 + CVE-2023-37210 + CVE-2023-37212 + MFSA-2023-40 + MFSA-TMP-2023-0002 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-11.xml new file mode 100644 index 0000000000..049860c19e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-11.xml @@ -0,0 +1,53 @@ + + + + Apache Batik: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Apache Batik, the worst of which could result in arbitrary code execution. + batik + 2024-01-07 + 2024-01-07 + 724534 + 872689 + 918088 + remote + + + 1.17 + 1.17 + + + +

Apache Batik is a Java-based toolkit for applications or applets that want to use images in the Scalable Vector Graphics (SVG) format for various purposes, such as display, generation or manipulation.

+
+ +

Multiple vulnerabilities have been discovered in Apache Batik. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Apache Batik users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/batik-1.17" + +
+ + CVE-2018-8013 + CVE-2019-17566 + CVE-2020-11987 + CVE-2022-38398 + CVE-2022-38648 + CVE-2022-40146 + CVE-2022-41704 + CVE-2022-42890 + CVE-2022-44729 + CVE-2022-44730 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-12.xml new file mode 100644 index 0000000000..840328ed08 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-12.xml @@ -0,0 +1,46 @@ + + + + Synapse: Multiple Vulnerabilities + Multiple vulnerabilites have been found in Synapse, the worst of which could result in information leaks. + synapse + 2024-01-07 + 2024-01-07 + 914765 + 916609 + remote + + + 1.96.0 + 1.96.0 + + + +

Synapse is a Matrix homeserver written in Python/Twisted.

+
+ +

Multiple vulnerabilities have been discovered in Synapse. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Synapse users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-im/synapse-1.96.0" + +
+ + CVE-2023-41335 + CVE-2023-42453 + CVE-2023-43796 + CVE-2023-45129 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-13.xml new file mode 100644 index 0000000000..8b6fbe173b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-13.xml @@ -0,0 +1,43 @@ + + + + FAAD2: Multiple Vulnerabilities + Multiple denial of service vulnerabilities have been found in FAAD2. + faad2 + 2024-01-10 + 2024-01-10 + 918558 + remote + + + 2.11.0 + 2.11.0 + + + +

FAAD2 is an open source MPEG-4 and MPEG-2 AAC decoder.

+
+ +

Multiple vulnerabilities have been discovered in FAAD2. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All FAAD2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/faad2-2.11.0" + +
+ + CVE-2023-38857 + CVE-2023-38858 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-14.xml new file mode 100644 index 0000000000..8489fd1909 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-14.xml @@ -0,0 +1,42 @@ + + + + RedCloth: ReDoS Vulnerability + A denial of service vulnerability has been found in RedCloth. + redcloth + 2024-01-10 + 2024-01-10 + 908035 + remote + + + 4.3.2-r5 + 4.3.2-r5 + + + +

RedCloth is a module for using Textile in Ruby

+
+ +

A vulnerability has been discovered in RedCloth. Please review the CVE identifier referenced below for details.

+
+ +

RedCloth is vulnerable to a regular expression denial of service ("ReDoS") attack via the sanitize_html function.

+
+ +

There is no known workaround at this time.

+
+ +

All RedCloth users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-ruby/redcloth-4.3.2-r5" + +
+ + CVE-2023-31606 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-15.xml new file mode 100644 index 0000000000..0521e2c30a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-15.xml @@ -0,0 +1,42 @@ + + + + Prometheus SNMP Exporter: Basic Authentication Bypass + A vulnerability has been found in Prometheus SNMP Exporter which could allow for authentication bypass. + snmp_exporter + 2024-01-12 + 2024-01-12 + 883649 + remote + + + 0.24.1 + 0.24.1 + + + +

The Prometheus SNMP Exporter is the recommended way to expose SNMP data in a format which Prometheus can ingest.

+
+ +

A vulnerability has been discovered in Prometheus SNMP Exporter. Please review the CVE identifier referenced below for details.

+
+ +

A user who knows the password hash of a user capable of performing HTTP basic authentication with a vulnerable exporter can use the hash to successfully authenticate as that user via cache manipulation, without knowing the password from which the hash was derived.

+
+ +

There is no known workaround at this time.

+
+ +

All Prometheus SNMP Exporter users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-metrics/snmp_exporter-0.24.1" + +
+ + CVE-2022-46146 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-16.xml new file mode 100644 index 0000000000..8deff5eccb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-16.xml @@ -0,0 +1,66 @@ + + + + FreeRDP: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in FreeRDP, the worst of which could result in code execution. + freerdp + 2024-01-12 + 2024-01-12 + 881525 + 918546 + remote + + + 2.11.0 + 2.11.0 + + + +

FreeRDP is a free implementation of the remote desktop protocol.

+
+ +

Multiple vulnerabilities have been discovered in FreeRDP. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All FreeRDP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/freerdp-2.11.0" + +
+ + CVE-2022-39316 + CVE-2022-39317 + CVE-2022-39318 + CVE-2022-39319 + CVE-2022-39320 + CVE-2022-39347 + CVE-2022-41877 + CVE-2023-39350 + CVE-2023-39351 + CVE-2023-39352 + CVE-2023-39353 + CVE-2023-39354 + CVE-2023-39355 + CVE-2023-39356 + CVE-2023-40181 + CVE-2023-40186 + CVE-2023-40187 + CVE-2023-40188 + CVE-2023-40567 + CVE-2023-40569 + CVE-2023-40574 + CVE-2023-40575 + CVE-2023-40576 + CVE-2023-40589 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-17.xml new file mode 100644 index 0000000000..ca67fc87bb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-17.xml @@ -0,0 +1,42 @@ + + + + libgit2: Privilege Escalation Vulnerability + A vulnerability has been found in libgit2 which could result in privilege escalation. + libgit2 + 2024-01-14 + 2024-01-14 + 857792 + local + + + 1.4.4 + 1.4.4 + + + +

libgit2 is a portable, pure C implementation of the Git core methods provided as a re-entrant linkable library with a solid API.

+
+ +

A vulnerability has been discovered in libgit2. Please review the CVE identifier referenced below for details.

+
+ +

Usages of a malicious crafted Git repository could allow the creator of the repository to elevate privileges to those of the user accessing the repository.

+
+ +

Administrators can ensure that their usages of libgit2 only interact with repositories which have only been modified by trusted users.

+
+ +

All libgit2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libgit2-1.4.4" + +
+ + CVE-2022-29187 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-18.xml new file mode 100644 index 0000000000..73fa6e0953 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-18.xml @@ -0,0 +1,42 @@ + + + + zlib: Buffer Overflow + A vulnerability has been found in zlib that can lead to a heap-based buffer overflow. + zlib + 2024-01-15 + 2024-01-15 + 916484 + remote + + + 1.2.13-r2 + 1.2.13-r2 + + + +

zlib is a widely used free and patent unencumbered data compression library.

+
+ +

A vulnerability has been discovered in zlib. Please review the CVE identifier referenced below for details.

+
+ +

MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in ZipOpenNewFileInZip4_64 via a long filename, comment, or extra field.

+
+ +

There is no known workaround at this time.

+
+ +

All zlib users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/zlib-1.2.13-r2" + +
+ + CVE-2023-45853 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-19.xml new file mode 100644 index 0000000000..c8072c96b5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-19.xml @@ -0,0 +1,53 @@ + + + + Opera: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Opera, the worst of which can lead to remote code execution. + opera,opera-beta + 2024-01-15 + 2024-01-15 + 750929 + remote + + + 73.0.3856.284 + 73.0.3856.284 + + + 73.0.3856.284 + 73.0.3856.284 + + + +

Opera is a fast web browser that is available free of charge.

+
+ +

Multiple vulnerabilities have been discovered in Opera. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Opera users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/opera-73.0.3856.284" + + +

All Opera users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/opera-beta-73.0.3856.284" + +
+ + CVE-2020-15999 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-20.xml new file mode 100644 index 0000000000..7600622922 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-20.xml @@ -0,0 +1,42 @@ + + + + QPDF: Buffer Overflow + A vulnerability has been found in QPDF which can lead to a heap-based buffer overflow. + qpdf + 2024-01-15 + 2024-01-15 + 803110 + remote + + + 10.1.0 + 10.1.0 + + + +

QPDF: A content-preserving PDF document transformer.

+
+ +

A vulnerability has been discovered in QPDF. Please review the CVE identifier referenced below for details.

+
+ +

QPDF has a heap-based buffer overflow in Pl_ASCII85Decoder::write (called from Pl_AES_PDF::flush and Pl_AES_PDF::finish) when a certain downstream write fails.

+
+ +

There is no known workaround at this time.

+
+ +

All QPDF users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/qpdf-10.1.0" + +
+ + CVE-2021-36978 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-21.xml new file mode 100644 index 0000000000..1ceef006bd --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-21.xml @@ -0,0 +1,42 @@ + + + + KTextEditor: Arbitrary Local Code Execution + A vulnerability has been found in KTextEditor where local code can be executed without user interaction. + ktexteditor + 2024-01-15 + 2024-01-15 + 832447 + remote + + + 5.90.0-r2 + 5.90.0-r2 + + + +

Framework providing a full text editor component for KDE.

+
+ +

A vulnerability has been discovered in KTextEditor. Please review the CVE identifiers referenced below for details.

+
+ +

KTextEditor executes binaries without user interaction in a few cases, e.g. KTextEditor will try to check on external file modification via invoking the "git" binary if the file is known in the repository with the new content.

+
+ +

There is no known workaround at this time.

+
+ +

All KTextEditor users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=kde-frameworks/ktexteditor-5.90.0-r2" + +
+ + CVE-2022-23853 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-22.xml new file mode 100644 index 0000000000..bbffaf3089 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-22.xml @@ -0,0 +1,44 @@ + + + + libspf2: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in libspf2, the worst of which can lead to remote code execution. + libspf2 + 2024-01-15 + 2024-01-15 + 807739 + remote + + + 1.2.11 + 1.2.11 + + + +

libspf2 is a library that implements the Sender Policy Framework, allowing mail transfer agents to make sure that an email is authorized by the domain name that it is coming from.

+
+ +

Multiple vulnerabilities have been discovered in libspf2. Please review the CVE identifiers referenced below for details.

+
+ +

Various buffer overflows have been identified that can lead to denial of service and possibly arbitrary code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All libspf2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-filter/libspf2-1.2.11" + +
+ + CVE-2021-20314 + CVE-2021-33912 + CVE-2021-33913 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-23.xml new file mode 100644 index 0000000000..240a1ffe32 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-23.xml @@ -0,0 +1,42 @@ + + + + libuv: Buffer Overread + A buffer overread vulnerability has been found in libuv. + libuv + 2024-01-16 + 2024-01-16 + 800986 + remote + + + 1.41.1 + 1.41.1 + + + +

libuv is a multi-platform support library with a focus on asynchronous I/O.

+
+ +

libuv fails to ensure that a pointer lies within the bounds of a defined buffer in the uv__idna_toascii() function before reading and manipulating the memory at that address.

+
+ +

The overread can result in information disclosure or application crash.

+
+ +

There is no known workaround at this time.

+
+ +

All libuv users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libuv-1.41.1" + +
+ + CVE-2021-22918 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-24.xml new file mode 100644 index 0000000000..24d0c28c7e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-24.xml @@ -0,0 +1,44 @@ + + + + Nettle: Denial of Service + Multiple denial of service vulnerabilities have been discovered in Nettle. + nettle + 2024-01-16 + 2024-01-16 + 806839 + 907673 + remote + + + 3.9.1 + 3.9.1 + + + +

Nettle is a cryptographic library that is designed to fit easily in almost any context: In cryptographic toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like lsh or GnuPG, or even in kernel space.

+
+ +

Multiple vulnerabilities have been discovered in Nettle. Please review the CVE identifiers referenced below for details.

+
+ +

A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All Nettle users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/nettle-3.9.1" + +
+ + CVE-2021-3580 + CVE-2023-36660 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-25.xml new file mode 100644 index 0000000000..97103d77ad --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-25.xml @@ -0,0 +1,99 @@ + + + + OpenJDK: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution. + openjdk,openjdk-bin,openjdk-jre-bin + 2024-01-17 + 2024-01-17 + 859376 + 859400 + 877597 + 891323 + 908243 + remote + + + 8.372_p07 + 11.0.19_p7 + 17.0.7_p7 + 8.372_p07 + 11.0.19_p7 + 17.0.7_p7 + + + 8.372_p07 + 11.0.19_p7 + 17.0.7_p7 + 8.372_p07 + 11.0.19_p7 + 17.0.7_p7 + + + 8.372_p07 + 11.0.19_p7 + 17.0.7_p7 + 8.372_p07 + 11.0.19_p7 + 17.0.7_p7 + + + +

OpenJDK is an open source implementation of the Java programming language.

+
+ +

Multiple vulnerabilities have been discovered in OpenJDK. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenJDK users should upgrade to the latest versions:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-8.372_p07" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-11.0.19_p7" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-17.0.7_p7" + + +

All OpenJDK JRE binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-8.372_p07" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-11.0.19_p7" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-17.0.7_p7" + + +

All OpenJDK binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-8.372_p07" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-11.0.19_p7" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-17.0.7_p7" + +
+ + CVE-2022-21540 + CVE-2022-21541 + CVE-2022-21549 + CVE-2022-21618 + CVE-2022-21619 + CVE-2022-21624 + CVE-2022-21626 + CVE-2022-21628 + CVE-2022-34169 + CVE-2022-39399 + CVE-2022-42920 + CVE-2023-21830 + CVE-2023-21835 + CVE-2023-21843 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-26.xml new file mode 100644 index 0000000000..56b9740e67 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-26.xml @@ -0,0 +1,42 @@ + + + + Apache XML-RPC: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Apache XML-RPC, the worst of which could result in arbitrary code execution. + xmlrpc + 2024-01-22 + 2024-01-22 + 713098 + remote + + + 3.1.3 + + + +

Apache XML-RPC (previously known as Helma XML-RPC) is a Java implementation of XML-RPC, a popular protocol that uses XML over HTTP to implement remote procedure calls.

+
+ +

Multiple vulnerabilities have been discovered in Apache XML-RPC. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for Apache XML-RPC. We recommend that users unmerge it:

+ + + # emerge --ask --depclean "dev-java/xmlrpc" + +
+ + CVE-2016-5002 + CVE-2016-5003 + CVE-2019-17570 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-27.xml new file mode 100644 index 0000000000..d1863a0904 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-27.xml @@ -0,0 +1,65 @@ + + + + Ruby: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in Ruby, the worst of which could lead to execution of arbitrary code. + ruby + 2024-01-24 + 2024-01-24 + 747007 + 801061 + 827251 + 838073 + 882893 + 903630 + local and remote + + + 3.1.4 + 3.2.2 + 2.5.9 + 2.6.10 + 2.7.8 + 3.0.6 + 3.1.4 + 3.2.2 + + + +

Ruby is an interpreted scripting language for quick and easy object-oriented programming. It comes bundled with a HTTP server ("WEBrick").

+
+ +

Multiple vulnerabilities have been discovered in Ruby. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Ruby users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --depclean ruby:2.5 ruby:2.6 ruby:2.7 ruby:3.0 + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-3.1.4:3.1" + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-3.2.2:3.2" + +
+ + CVE-2020-25613 + CVE-2021-31810 + CVE-2021-32066 + CVE-2021-33621 + CVE-2021-41816 + CVE-2021-41817 + CVE-2021-41819 + CVE-2022-28738 + CVE-2022-28739 + CVE-2023-28755 + CVE-2023-28756 + + graaff + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-28.xml new file mode 100644 index 0000000000..c119a331b6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-28.xml @@ -0,0 +1,42 @@ + + + + GOCR: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in GOCR, the worst of which could lead to arbitrary code execution. + gocr + 2024-01-24 + 2024-01-24 + 824290 + remote + + + 0.52-r1 + + + +

GOCR is an OCR (Optical Character Recognition) program, developed under the GNU Public License. It converts scanned images of text back to text files.

+
+ +

Multiple vulnerabilities have been discovered in GOCR. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for GOCR. We recommend that users unmerge it:

+ + + # emerge --ask --depclean "app-text/gocr" + +
+ + CVE-2021-33479 + CVE-2021-33480 + CVE-2021-33481 + + graaff + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-29.xml new file mode 100644 index 0000000000..fdac8be5d9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-29.xml @@ -0,0 +1,42 @@ + + + + sudo: Memory Manipulation + A vulnerability has been discovered in sudo which can lead to execution manipulation through rowhammer-style memory manipulation. + sudo + 2024-01-24 + 2024-01-24 + 920510 + remote + + + 1.9.15_p2 + 1.9.15_p2 + + + +

sudo allows a system administrator to give users the ability to run commands as other users.

+
+ +

Multiple vulnerabilities have been discovered in sudo. Please review the CVE identifiers referenced below for details.

+
+ +

Stack/register variables can be flipped via fault injection, affecting execution flow in security-sensitive code.

+
+ +

There is no known workaround at this time.

+
+ +

All sudo users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.9.15_p2" + +
+ + CVE-2023-42465 + + graaff + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-30.xml new file mode 100644 index 0000000000..527cd4cfe3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-30.xml @@ -0,0 +1,64 @@ + + + + X.Org X Server, XWayland: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution. + xorg-server,xwayland + 2024-01-31 + 2024-01-31 + 916254 + 919803 + 922395 + remote + + + 21.1.11 + 21.1.11 + + + 23.2.4 + 23.2.4 + + + +

The X Window System is a graphical windowing system based on a client/server model.

+
+ +

Multiple vulnerabilities have been discovered in X.Org X Server and XWayland. Please review the CVE identifiers referenced below for details.

+
+ +

The X server can be crashed by a malicious client, or potentially be compromised for remote code execution in environments with X11 forwarding.

+
+ +

Users can ensure no untrusted clients can access the running X implementation.

+
+ +

All X.Org X Server users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-21.1.11" + + +

All XWayland users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-base/xwayland-23.2.4" + +
+ + CVE-2023-5367 + CVE-2023-5380 + CVE-2023-6377 + CVE-2023-6478 + CVE-2023-6816 + CVE-2024-0229 + CVE-2024-0408 + CVE-2024-0409 + CVE-2024-21885 + CVE-2024-21886 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-31.xml new file mode 100644 index 0000000000..7ee14da846 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-31.xml @@ -0,0 +1,52 @@ + + + + containerd: Multiple Vulnerabilities + Multiple vulnerabilities have been found in containerd, the worst of which could result in privilege escalation. + containerd + 2024-01-31 + 2024-01-31 + 802948 + 816315 + 834689 + 835917 + 850124 + 884803 + remote + + + 1.6.14 + 1.6.14 + + + +

containerd is a daemon with an API and a command line client, to manage containers on one machine. It uses runC to run containers according to the OCI specification.

+
+ +

Multiple vulnerabilities have been discovered in containerd. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All containerd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-containers/containerd-1.6.14" + +
+ + CVE-2021-32760 + CVE-2021-41103 + CVE-2022-23471 + CVE-2022-23648 + CVE-2022-24769 + CVE-2022-31030 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-32.xml new file mode 100644 index 0000000000..39f01254c5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-32.xml @@ -0,0 +1,52 @@ + + + + libaom: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in libaom, the worst of which can lead to remote code execution. + libaom + 2024-01-31 + 2024-01-31 + 793932 + 798126 + 828112 + local and remote + + + 3.2.0 + 3.2.0 + + + +

libaom is the Alliance for Open Media's AV1 Codec SDK.

+
+ +

Multiple vulnerabilities have been discovered in libaom. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libaom users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libaom-3.2.0" + +
+ + CVE-2020-36129 + CVE-2020-36130 + CVE-2020-36131 + CVE-2020-36133 + CVE-2020-36134 + CVE-2020-36135 + CVE-2021-30473 + CVE-2021-30474 + CVE-2021-30475 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-33.xml new file mode 100644 index 0000000000..df49bf28b7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-33.xml @@ -0,0 +1,57 @@ + + + + WebKitGTK+: Multiple Vulnerabilities + Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution. + webkit-gtk + 2024-01-31 + 2024-01-31 + 915222 + 918667 + remote + + + 2.42.2 + 2.42.2 + 2.42.2 + 2.42.2 + 2.42.2 + 2.42.2 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All WebKitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.42.2" + +
+ + CVE-2023-32359 + CVE-2023-35074 + CVE-2023-39434 + CVE-2023-39928 + CVE-2023-40451 + CVE-2023-41074 + CVE-2023-41983 + CVE-2023-41993 + CVE-2023-42852 + CVE-2023-42890 + WSA-2023-0009 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-34.xml new file mode 100644 index 0000000000..8670819ff0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-34.xml @@ -0,0 +1,229 @@ + + + + Chromium, Google Chrome, Microsoft Edge: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. + chromium,google-chrome,microsoft-edge + 2024-01-31 + 2024-01-31 + 907999 + 908471 + 909283 + 910522 + 911675 + 912364 + 913016 + 913710 + 914350 + 914871 + 915137 + 915560 + 915961 + 916252 + 916620 + 917021 + 917357 + 918882 + 919321 + 919802 + 920442 + 921337 + remote + + + 120.0.6099.109 + 120.0.6099.109 + + + 120.0.6099.109 + 120.0.6099.109 + + + 120.0.2210.133 + 120.0.2210.133 + + + +

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. + +Google Chrome is one fast, simple, and secure browser for all your devices. + +Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

+
+ +

Multiple vulnerabilities have been discovered in Chromium and its derivatives. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-120.0.6099.109" + + +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-120.0.6099.109" + + +

All Microsoft Edge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-120.0.2210.133" + +
+ + CVE-2023-2312 + CVE-2023-2929 + CVE-2023-2930 + CVE-2023-2931 + CVE-2023-2932 + CVE-2023-2933 + CVE-2023-2934 + CVE-2023-2935 + CVE-2023-2936 + CVE-2023-2937 + CVE-2023-2938 + CVE-2023-2939 + CVE-2023-2940 + CVE-2023-2941 + CVE-2023-3079 + CVE-2023-3214 + CVE-2023-3215 + CVE-2023-3216 + CVE-2023-3217 + CVE-2023-3420 + CVE-2023-3421 + CVE-2023-3422 + CVE-2023-3727 + CVE-2023-3728 + CVE-2023-3730 + CVE-2023-3732 + CVE-2023-3733 + CVE-2023-3734 + CVE-2023-3735 + CVE-2023-3736 + CVE-2023-3737 + CVE-2023-3738 + CVE-2023-3740 + CVE-2023-4068 + CVE-2023-4069 + CVE-2023-4070 + CVE-2023-4071 + CVE-2023-4072 + CVE-2023-4073 + CVE-2023-4074 + CVE-2023-4075 + CVE-2023-4076 + CVE-2023-4077 + CVE-2023-4078 + CVE-2023-4349 + CVE-2023-4350 + CVE-2023-4351 + CVE-2023-4352 + CVE-2023-4353 + CVE-2023-4354 + CVE-2023-4355 + CVE-2023-4356 + CVE-2023-4357 + CVE-2023-4358 + CVE-2023-4359 + CVE-2023-4360 + CVE-2023-4361 + CVE-2023-4362 + CVE-2023-4363 + CVE-2023-4364 + CVE-2023-4365 + CVE-2023-4366 + CVE-2023-4367 + CVE-2023-4368 + CVE-2023-4427 + CVE-2023-4428 + CVE-2023-4429 + CVE-2023-4430 + CVE-2023-4431 + CVE-2023-4572 + CVE-2023-4761 + CVE-2023-4762 + CVE-2023-4763 + CVE-2023-4764 + CVE-2023-4900 + CVE-2023-4901 + CVE-2023-4902 + CVE-2023-4903 + CVE-2023-4904 + CVE-2023-4905 + CVE-2023-4906 + CVE-2023-4907 + CVE-2023-4908 + CVE-2023-4909 + CVE-2023-5186 + CVE-2023-5187 + CVE-2023-5217 + CVE-2023-5218 + CVE-2023-5346 + CVE-2023-5472 + CVE-2023-5473 + CVE-2023-5474 + CVE-2023-5475 + CVE-2023-5476 + CVE-2023-5477 + CVE-2023-5478 + CVE-2023-5479 + CVE-2023-5480 + CVE-2023-5481 + CVE-2023-5482 + CVE-2023-5483 + CVE-2023-5484 + CVE-2023-5485 + CVE-2023-5486 + CVE-2023-5487 + CVE-2023-5849 + CVE-2023-5850 + CVE-2023-5851 + CVE-2023-5852 + CVE-2023-5853 + CVE-2023-5854 + CVE-2023-5855 + CVE-2023-5856 + CVE-2023-5857 + CVE-2023-5858 + CVE-2023-5859 + CVE-2023-5996 + CVE-2023-5997 + CVE-2023-6112 + CVE-2023-6345 + CVE-2023-6346 + CVE-2023-6347 + CVE-2023-6348 + CVE-2023-6350 + CVE-2023-6351 + CVE-2023-6508 + CVE-2023-6509 + CVE-2023-6510 + CVE-2023-6511 + CVE-2023-6512 + CVE-2023-6702 + CVE-2023-6703 + CVE-2023-6704 + CVE-2023-6705 + CVE-2023-6706 + CVE-2023-6707 + CVE-2023-7024 + CVE-2024-0222 + CVE-2024-0223 + CVE-2024-0224 + CVE-2024-0225 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 0634b94f03..81367c0d47 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 01 Jan 2024 06:39:51 +0000 +Thu, 01 Feb 2024 06:41:20 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 3525270838..7a936a895a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -3dfe782899716a3480c9481c69bca8c231c663a7 1703730129 2023-12-28T02:22:09+00:00 +8064a0b694d29fb2fca491d65494098fb43c2ffa 1706715575 2024-01-31T15:39:35+00:00