From f64a4ce60d77f7909f99841eb9df6e308168a4aa Mon Sep 17 00:00:00 2001 From: Flatcar Buildbot Date: Fri, 25 Nov 2022 09:41:45 +0100 Subject: [PATCH] metadata: Monthly GLSA metadata updates --- .../portage-stable/metadata/glsa/Manifest | 30 +- .../metadata/glsa/Manifest.files.gz | Bin 518284 -> 537682 bytes .../metadata/glsa/glsa-202007-17.xml | 2 - .../metadata/glsa/glsa-202202-02.xml | 90 ++++++ .../metadata/glsa/glsa-202202-03.xml | 141 +++++++++ .../metadata/glsa/glsa-202207-01.xml | 61 ++++ .../metadata/glsa/glsa-202208-01.xml | 42 +++ .../metadata/glsa/glsa-202208-02.xml | 101 +++++++ .../metadata/glsa/glsa-202208-03.xml | 42 +++ .../metadata/glsa/glsa-202208-04.xml | 42 +++ .../metadata/glsa/glsa-202208-05.xml | 46 +++ .../metadata/glsa/glsa-202208-06.xml | 48 +++ .../metadata/glsa/glsa-202208-07.xml | 42 +++ .../metadata/glsa/glsa-202208-08.xml | 147 +++++++++ .../metadata/glsa/glsa-202208-09.xml | 55 ++++ .../metadata/glsa/glsa-202208-10.xml | 44 +++ .../metadata/glsa/glsa-202208-11.xml | 43 +++ .../metadata/glsa/glsa-202208-12.xml | 44 +++ .../metadata/glsa/glsa-202208-13.xml | 42 +++ .../metadata/glsa/glsa-202208-14.xml | 165 ++++++++++ .../metadata/glsa/glsa-202208-15.xml | 47 +++ .../metadata/glsa/glsa-202208-16.xml | 42 +++ .../metadata/glsa/glsa-202208-17.xml | 72 +++++ .../metadata/glsa/glsa-202208-18.xml | 42 +++ .../metadata/glsa/glsa-202208-19.xml | 43 +++ .../metadata/glsa/glsa-202208-20.xml | 78 +++++ .../metadata/glsa/glsa-202208-21.xml | 42 +++ .../metadata/glsa/glsa-202208-22.xml | 44 +++ .../metadata/glsa/glsa-202208-23.xml | 88 ++++++ .../metadata/glsa/glsa-202208-24.xml | 50 +++ .../metadata/glsa/glsa-202208-25.xml | 284 ++++++++++++++++++ .../metadata/glsa/glsa-202208-26.xml | 47 +++ .../metadata/glsa/glsa-202208-27.xml | 85 ++++++ .../metadata/glsa/glsa-202208-28.xml | 48 +++ .../metadata/glsa/glsa-202208-29.xml | 46 +++ .../metadata/glsa/glsa-202208-30.xml | 61 ++++ .../metadata/glsa/glsa-202208-31.xml | 111 +++++++ .../metadata/glsa/glsa-202208-32.xml | 168 +++++++++++ .../metadata/glsa/glsa-202208-33.xml | 72 +++++ .../metadata/glsa/glsa-202208-34.xml | 69 +++++ .../metadata/glsa/glsa-202208-35.xml | 126 ++++++++ .../metadata/glsa/glsa-202208-36.xml | 98 ++++++ .../metadata/glsa/glsa-202208-37.xml | 77 +++++ .../metadata/glsa/glsa-202208-38.xml | 57 ++++ .../metadata/glsa/glsa-202208-39.xml | 74 +++++ .../metadata/glsa/glsa-202209-01.xml | 56 ++++ .../metadata/glsa/glsa-202209-02.xml | 48 +++ .../metadata/glsa/glsa-202209-03.xml | 46 +++ .../metadata/glsa/glsa-202209-04.xml | 45 +++ .../metadata/glsa/glsa-202209-05.xml | 153 ++++++++++ .../metadata/glsa/glsa-202209-06.xml | 49 +++ .../metadata/glsa/glsa-202209-07.xml | 40 +++ .../metadata/glsa/glsa-202209-08.xml | 41 +++ .../metadata/glsa/glsa-202209-09.xml | 47 +++ .../metadata/glsa/glsa-202209-10.xml | 40 +++ .../metadata/glsa/glsa-202209-11.xml | 44 +++ .../metadata/glsa/glsa-202209-12.xml | 53 ++++ .../metadata/glsa/glsa-202209-13.xml | 42 +++ .../metadata/glsa/glsa-202209-14.xml | 44 +++ .../metadata/glsa/glsa-202209-15.xml | 64 ++++ .../metadata/glsa/glsa-202209-16.xml | 46 +++ .../metadata/glsa/glsa-202209-17.xml | 60 ++++ .../metadata/glsa/glsa-202209-18.xml | 59 ++++ .../metadata/glsa/glsa-202209-19.xml | 45 +++ .../metadata/glsa/glsa-202209-20.xml | 71 +++++ .../metadata/glsa/glsa-202209-21.xml | 43 +++ .../metadata/glsa/glsa-202209-22.xml | 42 +++ .../metadata/glsa/glsa-202209-23.xml | 112 +++++++ .../metadata/glsa/glsa-202209-24.xml | 61 ++++ .../metadata/glsa/glsa-202209-25.xml | 42 +++ .../metadata/glsa/glsa-202209-26.xml | 49 +++ .../metadata/glsa/glsa-202209-27.xml | 76 +++++ .../metadata/glsa/glsa-202210-01.xml | 42 +++ .../metadata/glsa/glsa-202210-02.xml | 54 ++++ .../metadata/glsa/glsa-202210-03.xml | 45 +++ .../metadata/glsa/glsa-202210-04.xml | 68 +++++ .../metadata/glsa/glsa-202210-05.xml | 43 +++ .../metadata/glsa/glsa-202210-06.xml | 60 ++++ .../metadata/glsa/glsa-202210-07.xml | 42 +++ .../metadata/glsa/glsa-202210-08.xml | 54 ++++ .../metadata/glsa/glsa-202210-09.xml | 76 +++++ .../metadata/glsa/glsa-202210-10.xml | 57 ++++ .../metadata/glsa/glsa-202210-11.xml | 42 +++ .../metadata/glsa/glsa-202210-12.xml | 43 +++ .../metadata/glsa/glsa-202210-13.xml | 45 +++ .../metadata/glsa/glsa-202210-14.xml | 48 +++ .../metadata/glsa/glsa-202210-15.xml | 42 +++ .../metadata/glsa/glsa-202210-16.xml | 106 +++++++ .../metadata/glsa/glsa-202210-17.xml | 46 +++ .../metadata/glsa/glsa-202210-18.xml | 44 +++ .../metadata/glsa/glsa-202210-19.xml | 42 +++ .../metadata/glsa/glsa-202210-20.xml | 42 +++ .../metadata/glsa/glsa-202210-21.xml | 43 +++ .../metadata/glsa/glsa-202210-22.xml | 46 +++ .../metadata/glsa/glsa-202210-23.xml | 42 +++ .../metadata/glsa/glsa-202210-24.xml | 49 +++ .../metadata/glsa/glsa-202210-25.xml | 63 ++++ .../metadata/glsa/glsa-202210-26.xml | 42 +++ .../metadata/glsa/glsa-202210-27.xml | 43 +++ .../metadata/glsa/glsa-202210-28.xml | 42 +++ .../metadata/glsa/glsa-202210-29.xml | 47 +++ .../metadata/glsa/glsa-202210-30.xml | 54 ++++ .../metadata/glsa/glsa-202210-31.xml | 53 ++++ .../metadata/glsa/glsa-202210-32.xml | 56 ++++ .../metadata/glsa/glsa-202210-33.xml | 54 ++++ .../metadata/glsa/glsa-202210-34.xml | 76 +++++ .../metadata/glsa/glsa-202210-35.xml | 61 ++++ .../metadata/glsa/glsa-202210-36.xml | 42 +++ .../metadata/glsa/glsa-202210-37.xml | 60 ++++ .../metadata/glsa/glsa-202210-38.xml | 42 +++ .../metadata/glsa/glsa-202210-39.xml | 43 +++ .../metadata/glsa/glsa-202210-40.xml | 44 +++ .../metadata/glsa/glsa-202210-41.xml | 43 +++ .../metadata/glsa/glsa-202210-42.xml | 44 +++ .../metadata/glsa/glsa-202211-01.xml | 43 +++ .../metadata/glsa/glsa-202211-02.xml | 42 +++ .../metadata/glsa/timestamp.chk | 2 +- .../metadata/glsa/timestamp.commit | 2 +- 118 files changed, 6916 insertions(+), 19 deletions(-) create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202202-02.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202202-03.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202207-01.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-01.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-02.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-03.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-04.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-05.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-06.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-07.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-08.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-09.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-10.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-11.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-12.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-13.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-14.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-15.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-16.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-17.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-18.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-19.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-20.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-21.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-22.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-23.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-24.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-25.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-26.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-27.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-28.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-29.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-30.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-31.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-32.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-33.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-34.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-35.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-36.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-37.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-38.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-39.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-01.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-02.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-03.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-04.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-05.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-06.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-07.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-08.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-09.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-10.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-11.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-12.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-13.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-14.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-15.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-16.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-17.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-18.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-19.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-20.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-21.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-22.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-23.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-24.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-25.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-26.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-27.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-01.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-02.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-03.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-04.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-05.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-06.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-07.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-08.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-09.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-10.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-11.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-12.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-13.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-14.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-15.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-16.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-17.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-18.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-19.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-20.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-21.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-22.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-23.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-24.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-25.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-26.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-27.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-28.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-29.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-30.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-31.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-32.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-33.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-34.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-35.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-36.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-37.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-38.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-39.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-40.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-41.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-42.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-01.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-02.xml diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 2696b3f48b..adc8c31162 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 518284 BLAKE2B cb5fac863af3ef8aeec2b30770dcc46b92cbbaa35f883be3558623dd9e5b3307de19f033786959c2acefd089b402b92ae2601f1a2c9fbecd7bfee07eeebbf7b1 SHA512 052cb56c55e024e97ce62af25a94a63d53c61d2136da88877dd492ef68703ac7e8da03f6d57bdbf30b2c7ff7dccedfad2ae627469dda5745354b99d6f6e960d8 -TIMESTAMP 2022-02-14T12:39:14Z +MANIFEST Manifest.files.gz 536244 BLAKE2B 47908e9e54099299278f14e5112b789aac78178d7406b6880e3986163e8e2aeec411757dbe131202da7291c508ea72a7d158f7fe08facf6e36a23a28a992a7d8 SHA512 ef16d73b0d889ec01efae4d55e398ba1b384a7b46066c129d82b336f46e8804d0dd1765c65c49d93842dc829696efc67759ac790655f316a70359fb8847d9e4e +TIMESTAMP 2022-11-18T11:39:56Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmIKTXJfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmN3bwxfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klCAjA/9HwFYsxuRkPGRrV6K8wLfVbDVy/k1z37D9snjOnQ5b7wG3qlFapO+aD5d -qRiqgJGNRmhF6j7YJ9jfTw3jeCxeIn2lR4S6KCSizAofr5Nzl/DNobfSqjNoDWew -k8MZ/zu5WS7iHeSgXfX03fB/dXiwpxQBT14REa8pCfxnnplPKeu+FxyLRY1CCj8S -xS/boQOaJUYwo7X9ODKjM9D2zQbhuQIn9TkCAZMCVDxaz93ITLZUEM+lNAKKRngo -tHIDi3PQorvgCbrbCog5dLXi90Lziv7kpUJpF/rI70RisP4vbKFGXWA5ySs2lKXD -CJTXEV03p0CZx+FN8l8KsaHG9FM3V1f7jVJdbs+x8cAxM9ycVNZYMU3BHJClW7CE -MSUB9bdH+GB94qtj580+d4xq1A/MsWSvsARlWo2YgWoIetvCLlCp6qNSooKUFHiu -UmlyYPVLWaGBtrBYIEkJCWrsBG6TgYweMXVOpXNv0SLuUiv2PfynzThHeF7KqCtY -G/Rd2hO+awkXUS3DnjSw1Ldduvd/gOrwa6TV5KYdfBI5pfvn1CmbrUJFjcscigX2 -mTy1MQuh0HtqYGlUGmGKF6vf7dJiD7RSxM4EGA6ySepCQYtlj62zC+d/smlU9mmJ -4U+j6d1yk0cI518+9Uxj+xlHX6ItY11h18P5UASSIBFbwxajMhw= -=1Nn+ +klBofg//VsVRzTk9MRvuKpQh5uKwkc4MXC+hY/TOxmUKNMuG6ZjaNiXdjz0Z5HXr +R5OlMOiOdRsBp2y9UHAcyjopo8OdIf3g6jzdpbBcEBw/nx+iHsP8ebrsHqiXSLXI +77XS2/pob3vYuSndXbfvLs0ZemqBXOcflneIQ9rkOD/LnpOyH1o3RYPnahoAVqQZ +mytgfss+b7cZjogvbiOCBqjPtTTHn6F8rDq9Jmn7KsbIi6hIzHDcKa4CI/C4f74n +MKi992d5ZLKck+zkOEU+fYXy9xuoALPxxM8tD4LvyfW+2DoVmgtERDw2HPxWTBim +7yB2pmcrkv5sOeNar2ftZdFRS7ZX26OS9wvIE6qZbh6cnjTKJB71mY/DwV3V0sPX +1nQLG0V5Ors9wtM93GbbQY9Qxh8l9WQ6/jpNiwqoZLfPRUcsgo69Q0VxOd/qKXOQ +sKR5opWTozn6qL55+CuqH3msq+agDkWAYSjdmNTiEbEv6inlSx+zJlGuChA6Ve7c +0e7UnJYyQQiyir8bxXtJPZesrIav61Q/eM+X4LtGrxeGFzvAmn/yl6f9uda2w16w +yG64E9BdgHZEX8r2QCIGs9iJE9DZ+7dgc9RwXVmEDxRiZ96395ZzHta++PypIL4B +MkK5S669/ZseQz/2LmceECvdXIKt95dJKvmgVpcs/vU+eCuTu/s= +=/0PV -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index c2498e00e944188d622167e467e4cba819041dfc..1de89307450015336a0b4b74525f91ada2fe8d0f 100644 GIT binary patch delta 69746 zcmV)iK%&2l(I3+2Ab^AcgaU*Egam{Iga)(+pb|!s<&_8mAb{hLSnhv>5kZD8J>~EH z-&0+k8R1R>W~#QRHqI~+j0DcvDTn?K?wf|^dh8kNeAD^#V<{SW{+B1_x3gBg{KOcGLW1sVC404w$QmZEYB0oH9C=en4+!)HZ34AQzc00SjN zQ^*!v%O1TN{5>?SAA{IH|-}1QEXc z6N!h_)qFCRRX#@mp=TXZL*zffS4ZtqDOh6TxK615VU*&_4&7fM4!oGNx^gz3tpNv- zPD2fHxAfj{657`;c$O-y>WL3sKn5cT6wL+V{t;r|I-MSttmt~)J2t3IXMWc86? z^DmcT76-3?o8s`7UTsrNvZ!u;ZsqB5*H{Pzi>uK6ScLfIR^WO5cv|gMu{plvX3yq(8N6u|<=TC z*xdvIhYrC)v77HAR@G|gvR6QQ<>;R3EuFjt*Xn-=a@=q2jde*r6v4Z@n;7ck&-LSJ z{rM->e16T#+jLty4F;{)6hY&8*Ory9;NQtDxQQShs8w{`Av^k1b$Yh0omJT9E<8fM zC!f=>nVx$;uG@w3?J8gOkx7mb*h$Y<Y|U62qeTi^YiVxYU-u)oO~zk4MpA2<972<_x@PA)k&G0v;mW( zA5ZJ0(;PlG(V}n&P8=&n;eHq2Q#Ji|RYBCY%p5jAx z!P3#GQ^0W_cG|0cGB$9sL%TNno_zlsapr%7_7AIu-E40VNW)G126+^f9HGP3E@nB^ zSntQK!7H?{( zX~DMAHa55&%qQ_H8PEM!!MQ8zK!DPuY-~$%pcXgshA4t=XOCduo?5gyK6Ju7iS1mX z;#9HQQLZ24A5ZI5m;X{L%kI;-1q^?@cB`EjRTYHjMn&(RyZEZl^Qh)S3?rvoB8GWu zX}+g=0HnERd1N55O1196xTpz2X#8YIna-WW6I(=FV%^G?vK0=PLJNPx*4ld% zUDSS%3eSS^p>fdt&H5W`=IwVe4#FT${j$`h^Dj-JNM|iD1CdpMf zN9sYyj>6VNXZPlbW7j{EljF)2 zY~3?QWEM|jxn#n9a^nu-dAffa80;j7T6DuCJA-*@y)I*A>{^3dNvr5RF;q^M?!5zZrYV^BTeQEt& zPo-S>Im|-}R$abwBDWskP1b`q&F6N;wt-c+{3k1!_<-hH-ZC6d1a0^wf>YZbc@Y0slO)_!?QI)8;N3ATY zrH}G3yjRO33sAtPY6bo#mlB7U$T`DzoCDNs_tZoJa%$^<3o5FUGx4%HUu|0t60)>H z)u){2!kp*Vhj!_?6jg|7!Oq4)u4MBSaN7gTeG693J@sBz0Kh)c!E5g z;me;rABWcTn*$z8s_I@EQ1bs$blSqKiFx17GeCq`(oAf1oOJ`v@S3M#-_f!ecU0I4+g4%IA;!Pn?&aXMu)Nm&Vfxw80Oz zQRa+7g9^N#)^L~iRDfAE{p8X*kHE>*OTEdFe8LbrrQCmRs}Dsh>U9WXhI_fuwj!Ce z^9k-NiDHYn-mx9>D*QozNdTc0Q?Luck=)!|CrtmHJH6hlI-Z}K7-a*TS`F5fHjmoh zKF)oww#A>I#%exTad@6x@OP2Aie4ZgP7$6Df0~Oz*5lqTB5G54^-vSZ?gzx|@O$_QG-CcK)zN&pK?&h&Q)PoxzWW2i<qM^ zFnB4+$2)dEWihK^Sz~MmE zRtY2G)RFEKwqq)x>`_VMqrY{z)}WJ?YvRgF@q4-VmAeGN);foPe!0e9A4~p<*(##*d5q><~`HLugX_gT$)$hswoht(wEO{Q#fnGYS5pS+d=WdL`gb#td?xHG4> zqW%6b^eEE*N@GPA3=cP$l3GSB|`_`)`Z7^QYSF(f)#%f zpq%+hPWd>{tOX8yrxkb8!JN%~Rvyef1+_J)#-%-h_-v`&d%C_?T>5{kU8`dpIQ74t z*2@e1_|zbDjku4gW0AJo(m`!M)p&7NI$1z!TFN>XfA0;8Ou({megv=!503<$XSW$d zT;WrA34#u>U3=$fXn*D!nOiGbEIGo+NjQ~d;puW^ArXHL^miM| zrIE+^7es<n)+aZP^S{IxD)!zaEDmhH}=oO>Z8sPFrid_k4H-i3FyMP;1Hp6do9{ zfM+g(ff){eBiHLt`+wWV<}lR-)Fa#dlPYaL#x@pFuWFA{DdI9se@Z1(t?b8wg{dt? zG==0=N1(zl1o5W_0m}PQE8~CNTOxI%;c2?v?xkNIIZU)^JgM`lBJ6gACigJjRmG1W zJbo<4^OoJ14Dh6(>6dax*}2`g9K&&#>@3>WX8j(*4kxxDLmT7c=aWH0(fwX8nNE|u z6E2SynATHOio2R7irO~X;2%17Dv`FF*Q=*{FY|Ptl=DY&m#cB+_`QEp0WPdrfsCW1 z(N^%fh(H7rY1I#O`sbfWK=^uE9rggG^H=3CR1{Sm(hjSn-uj;C!BlQj0e(YLG3%*C zpgvyF;P1YsML^hpx(_Sk+!~dyHNP9zd20AxTuvBMxNh7&wuI_u4q~{FtaLxIb5B?= z3&Wa8PbUR=qt|pfY&Cy7(YQsD`;rWvQ+%3-N~h;ieHyYkd=sA zV&8D+-*WI5tA*fj{dih`9kTqjpQ!76g)nqbn%RXrl^tWdKz53I+ZfnyGG!~#SFu4q zf>?mW&I4FZdi6}~D|=y+7@k8<7pTU$`?Af=-T26kGm^5P!H|Dp0yY5c(v;X( z$yH%uq4gZFnTlz8cHNB|R+K_*kweBm5e~a7vU=5Tb!~3lF!cv@35NJr%BlFX;l23a zpt@_@S#rxAVy#(OuX~SB{r72o{1d+vJQI+4s?*ydLD4W_5p-BXuoCDntZpJOFWbmG zKw?5Hqa=BlLtTG_h_tNRf(px^Yu8!2zZndI|i1JjWBtKo~RMyqcG(p{I`C)CV^MLq*E@mhbe7x)O zHmWW8IM8H0##>aEE$ydjoa&Tc)qOF$O45dPj&7x`xVcFxwvzMX!Hj(_4+C)VmXR&!g6CI)6m@KmSC%3qSK)ad%quYlWJSlpg!@dIFKKZjxM5 zI=ICl!y3#nLKS>8OWRUnoX2t50Z;P!q>|qT6B5TEcwsVD(?>2_XN0#XjL^to|8^Rb~6?a zfb;3}da%*T!*PGrz<=<5^$LqoH5S{8Q-Oa}o~urQ$qD)34p=D8k-ArKH}_GR>J^Gv z=v@r|m@5WLbe}EsrIK~A4eeUSq3vsPzsED5)!7rTjj*>MxjU_X{1ZtfMOmco zq=&=WfHVD66kNRQn4a8iy&_a1eC!qxLiHB|Pd&RSq1qz66i#Yg(~+vv&1Sgg>Fj^^ zPz07(=Hf{9DH0bR0`FPfg#LB5URXX|U)8`cGl$KxxYF%9A8*?rF&1nB_&zz%umih+ z#4DBd+=&bhB`e`d%#Iq{5h*xZWDGzPcWIyaXn=NnLqE6%IN>x7mu*0;iW}E=PIPnI zb`jqwRx`Yl&j2m!^Mo_b?BHE$p>lte0)DCvKCIIraF>aPzFDE9=)@0TIJ#R|NEhyZ zSNBMF^Ql5w`PqdoyPMLkMW#8n*0a~gqwvlM^PR~vK^ zB0pPE@o-4&Ubh3}L>#h7yDck>TBkh_@6c6<3(3JrdufN}!`egeU|shlW-wQO;aprW1& z0y)%r+;$N8(mYHp3c_A3DGGo7Xl&q^BxF%f_pHXu-4wS3w1O@~nUER&sXaU-$y`!p zlb{3_es?kI<%Bp1YVbRb?J}xFoQ^Fnz8*R52|v|#)XcPG-2%^p}qbYQ1C`F4Lhmu>~a7f{S)@hoa)4FHl|`Ty=GmRE=De>5q%S=>b1;m*wh zF4S0yV{6f!^BA|aT`eGwNZ9F4*K_m>2W#9nOwW!HsedX>ce<*Wq#XCUW3iYtLsU;8rGF zIPw(SJt9C{+p)k({S_7bX|On}Fk0a`a~)wI4y|cL%4e8Q(8SzP-g8q6zC%@+L{q5= zh_e;AD=<&hs<=3)LY*vNgpbN%-SP~{72d$X;}~%k$ZMG|d^_1z6b0vh3a&Ck;N9{N zXHLzG0dme2j>0=Qwp%Edk242We_mC0vlNsAe}h{#CoKWJ*Rv%|MH!Cf@j@YSpRFj- zg@Un7%1l}*=WcbYYnS&e%h98*&<&9xD(0myrseo8pyoMgE<;rP9!P_S_By9(3?^H` zqE>sh65R&8ngfkP(;7|Be&DTFhpc`@`KXef0yo(T8b*R zEGtQ{jDr(0mWDnS4XdJJE=&>Sl0JyUyXgj_!hL3a!+YQZ2fYDs%{neZ?)B==9a`D|0e^(!R72=Pl75=Mm;Nc-qp8CSM68AU?$>$!{-b5nMRW*%{ zW6yOcj|+3xl`47GYO!jX z=^T`Aa_&3V4N-sM1+A5ZJmA!}cr!t>IbeX5|#@w(>06}YFf z|3_($UKMIB=$8f=G#y(Eth!nQWO;`LehILy&WqN)%+z@Is{p-gWs;=^vcb+-JBoVUn@HUZvyL=2R8>& ze{e-5jpwoR6bJ)E)qgy#my_vNeM^-BOB_00oV{@6t*?9O9ljvlhoLs zy!&!#YAKU(s2FjAwC7SI#XtkjgoEkl<5B?V`~>9&w|Ml3kaWAuOvXFkIq^_};69yB z1Yz%51EEYgr{xGod8nh9i05=po9?08^$9u0E$ zu(XZ}k2?_dL*F$|7k(R}ha;INUtNfUkUlx;yG}c`6?P#4@m(L0MR%Q(r3bEQ- ztQlUXQuMQy;>Y9GEX%nCt6dh|e-hyB=|XQ zq=X5OwbJ7hd2zNA-b-%h6P?OWI0ej6u@zUfk?^{^uQ(hB0tdYC8 z&#$rDU$0cH?cHN=3blQ7&rGkBUt^{@Wo_t4xpe4m6m2FP$lZ zR+~@JdLUT#uT}%H9zs1%)#7t=kQ<NN1&6a z%K%m-hlsfmkW5aNH*sjpk@c;3p2XL)&9-XUu5atM!{C%t8IzA|fA2jU5aml%n=UyJFx#)eR)PuP5 z-qb0sUjuxW%U7CB@wp*LkJN$+>_dK?kz01@zb%nGChJ0yGGW2>yUVE43W zh5(&(ZQDS1xv>V~A!zd(E*%~UCv({-Cq!^-Jx5}Se;_DQ6dvr`#ru{4emt$ex_tQZ z=G+4{Tlf{^#(AHI(-;lj4s>)@>8jQXRdbF8VC4Yxle@|uBg}=*$aS#CeX8jP$#CpJ zq2NajM8@RN*-LU+fH$JUOgrx9A~At@Kf4&9DRCyZUx8PiDtDbQHR>h3cF|gIrGpf7 zD%AOCf6xHQfvAsKxo$%cat}vflEH>}qHcsUP(Fm>>p<>64UTrsgFBqbe4tRQk($) z*RI(0Ee+0q#Rh5RXG__z8ps6=dEBs6r2_(I90;eoK(|s~t`1rQ&{K7ry#tDzum&gU z$=H6>Ama6^27Xv|Q}rGsz&Tdr?1piXe{6wVfXd;o(@gv%G;4TyKU*rTIVU>^Lh!@m z{%20@!gvLAI1N~R^;Yu%W8DGxyX$Lx4)R!48NFyZGL$_1Jgr;urfKsX_1@&1==(>u zB6B=WSv8JJx7C}sxxKxN=5)UD0TxYrRLxyRp=32&^mH%RatOCmSrf-m0VGzDe|Tn( z%5U6oUV=mLKc3bb%YW5Q+t?0(>wzOb)^znqQ1r;U>D0u81f1aA5P2|hw<;R>xC$$5 z-&%`D!-^eeL#bHk23d5~?An;^$m8f_D9+QZ4=&Vz@HX8nQV8oE<%{ysoNTv@?grK6 z59xBGs_s#G=zEt(3|zf4jtMJC3R6r)F$&ID_kKC$j2PuAGqq{KN6x(V#j& zfOOqrEI@VBd#9E8gH^|u)5DkQkN3nrn0k?L2B)l?_0)iXfD&kh0z}=p8+A@ZfHfA~ zC}7ntI}v^-57Kc#&7-tQe{=y!3$dhdb@Vr!W?8osD|rH>*c5|G(^j|Cu5df26_>(0E@kp9htg9Th#Vp>@a5rNfg>0sZ)NJ> z#GvYT+}g@v#5WiF96>rAGq{|Eu{p>q6&jtY2NRcM9z<m#+(G@NpF`zKhvanQ`0=#fn=4;>ryQmGRP?Q;-h*)PwMwz@35rdM zXk4&wq1#6zNh@48trw`h1C`y$8kgNJh#82&erM;^9*zuJf4|l<>QMPbZEGT^!C$Kp zCkFI~$QZWP220@nQ`e{)f zfIrHYWDBcyfAQ~6eGATeDE()+eD-W%`L`wk?d_|Ntz5xv=C`FwO^oT9ZoU+oO-c(Z zAO%8E2v6s>S)5ErPK^^j8=zbNQ2x1qqg8u4+&xx9tdc2yJgwIj`j_(X+TOZEdd(!) z?nFVql-IWK?_&7ywCm<~x*XHbwp}No6bhimX8X#Sf309iz!6qKtg57!UOx%~iFT%b z)3?I216#f?p$551&?Wr2nDUYOAz&A zq<4OxOf8rd3sTSJa4+H?E>j{EQf6ZS79K4}a%;^D9n8~yvFeomt2`Wtz-pUwS@Nl5 zjjmr)e-mM)rZ_J=dM-SNX6hWM@7iTYl>;w_*7-%H40l_${VG9(PkYm#xA=Pq+A-_ueENne{@G1+VwHsKpDr6`c`^j`TC{I0(;)h z7rKte7DwcXx7#dOInrSJ<`c+WPq+$?_E;#y0%YhqV8BwV_61gaY+vyo%J9w%Mc~R6 z?hW_ntblrwo|~d0I#ZOLE?l1-GWYwP1k9q-ZK8LLF>IVD7V~Tq5l~VYAy#<*%r+5#W!Y=pZv^ zk-0X=K0511eFJ7Co=FyRI3#HFcV`plz4JuUhb3?EAa5YJ{fn33>&wr|N zkT0NfYI324f)q zMiCL&tzFGp_9auim0uvBnK8)*{C|9I`9mH$)u*xdJgd`5r1t8*eyL}uYpNC!w?12OPyV>3lQ|z^x99>vaGSom9Rrb_ zQwfAQZbfw;A(a+Sa$poV$t$PE5LXnHN59B)B7yc-wXCQl# zRYwV-(};wkG%wP$#tOtqQd&PWOCYj>leL}T1$TkI1I!l19W2YPaE<^kS2w=%Lfw}o zYpc*o{&q_9JU#S>E~A4B%BlWQgUI2(9kL2)>>Mu+RaXoAf#+G1b5v>yO0O>l2>-UB zprC*S_|qK}m{Q}~-&HrtsiDBCmkMP8+M|yWv?HjSW({C!xRC9-y5rGwK~}fE%=Jd6 zkcr{oUVAh}w0P>Y=#)RN)M4$sfnk^KM+dM2<-p~)p-2a!0R|ubp*n9mmq|(o`2#<7 z*q2312WWr4y;F6KCT=5yw56EpI(GX`H=h_zquaS2H6-AKd^=}vxO2oqF3eokqv6@< zA8uXkSKO*Ezv@qYYaD>ivpTX#fNCSfBVagv>mk2u%@2A!F)@9~jn% zB&PsHU6dyvXa1KZC1o1P3ps+g}91x-0O(Lx4 z>DErKa%M}u5DhMWulvBa1EqRDWZTXcFZ<3u4JRp|4}xgiIgRTHzrjXg9J&u4OT&iJ zo!-|yW$5RZ^kMH~K3a_H_k7rieH8fV=b=I`r-g7n9az?@3F7RMp8FnW(RWu_-${5W z3Z$xj^5Z66ueyBu+{CDRH1Lg!zlEjsXW~*`@pjs-s}X-pjK}GoTdC&mQV2mzt5ew5 z&{3ui+lTy-;-I4MqFb2amOxdavp4GPxMHBLRFf2hn`>+X_ua(^4(gwmM$0Z4Y)d-D z3!yWR;9(Iqm%~m6ISGF=HXPtj4I&4Z1WyNMf8rY2R0xAJ&Rgwgx248Qjvx&frStK_ z?M-sHj;1`tNEA%7m!?{6K8W)!0`Yl&JgxN74g6BV8*m3FHUXx~p-l_8E}*E;49`+c zYdD0{_=Tq>E&`S`t*Os_sK2F{jJ_-oU2P}~I0Oyi&=ZGFNQA0rC)@pYu4!1b-QPXyxB03cNhE8yH zw^Hdy& zQH>F=Cw#V|crC6+p6dO$)T5wBR=CD309_{4K^_jV&d0qi1CoN#whbQA&;`bR^m%nh zKJEEQ9`3Q%QLUsF$bfobTbVC`p?WI2u;L8P+5W?P>f0r^e0iaVR4h1hto0Tqf0&PQ zZi5m6WQglf8U()04F^WRoS)Oh)hB97qn+DWv$ztuhxM*Wnkk&1aS69i(hup;yTVfi z>CW>!)l>&ZpB(J^K8ik-ClK;)8y18l+O+s?}b<$`18CM*p~H!%6ZLA4{sq@m{H9$e}2p1!@mzT zJDLhW3XdFGB=HwYfdzphPL6&vjC3UjtCp8j?PJHi;!)h=OQ7yqXFik%`th`06`S-m zk@Td)pEzuf=nATH@`9oA>hv>+PI*UtzMzJk3pbKIvVYZSfmEn+#xqK+Yj4{$3Z8ac zqM%FocIl?^Z?U?la0_W1f8EvrXZek{IIw14#~V4k&a}g!PP_AMJAFaNwH^r^E)`C6 zI9u)qKm~0OQCl6Y0~yand)obdgNB;8o5VK_ZGDZe{O9RF7=pC`z?=( z8;^FeWayRR;)3tGarL}JXx292e*U#SK5Au<79OSB&+1Sm9ei$?gIYK|KYhIqWdxe_ zy<1z{J^pDEO5vf*ODwJ#A5j%(9TxUxhnoOf{C;iOv|CYWHL#fd>b7b?-Oi!JhUDRk-^)09@4TgBKVken+AUQQ>D~0w{e_MKc{&na-#pCBwx^r@! z@yFA8bzke(o(~A59Gv0iDB>&!>3GLCsO*)_zh$SruRm38QkqfcX37)-MV z?t-f)?Z?yl(*RHHbGD}T6-Q9z+YQ#ClUIWO5{vg7+tew++S;k!Tmcq<${d0LTr4uB zyP57XSYqOYo6*%hSN`ys&e2JdxY2|vm*LbtKLJ4ce^<;0AolUA1}F9&x~r&8KII!m z7Im730CxvXM)>E@{j470M8!$m{?9@;Yp)2bam~LrRWz=c)kEVcg=?Iy7pDOTo2R3y zE#)h#1t~^8plfOVcv|%}rTeuhtQ>;6)rs()m2eB@;@dL2idMuyi%fEVGD-)K#?u+x z%Lc*SmtR!}>j6KPOI8Qc0-7b4A6ExKf2oFxX5crZi^pEo+*ONnUQrQ1PK877ml}Y1 z@BOJHPUNd_(hA-IM(Y;uy8m!hqf`Oxp{@<+grhKba0P={k}gi~ZMf^4`dNQGtv8nc z)a7}^{U8!4?lqrK(&Sd*y6p~hEc(n^KRTQuxw=|g!?jSb8#smU!Nq^{75(wF z;-7Bd7xUp%O`Qx6%^rcp&G0aEXO_m6kv|GLkl zl_Uh{=JPG$zs8D>Vh0ka;~M%b#JQKmqH5Rf#4@;4_>_YuG_9K|v>l>W{R zYr^`Yng{(~$Du)XKwU2DfAf*~oZXgaaG4rheeMM+kaLh~a|lH$PK?YZWL{2xSEbSH z-~ldq%JKSjwqD)W@TH#Npg`eT$po}~hd3Vxq#m>tISJ#g!`7a{hK;D9`hhc`U2p}8 zRg~}QZlbFx;us%SvUj(^G=1Z*X>(U$I(t(0Ce5apw9r`k8GUq`e^o2gY*xiYV3QuY zDm|$fw;Q%#P`+wzs)Z2?TnnAiazIPmhhmHHj*mM3oJQqg;gac5(H`EjgPICxAeo@V z#b%v3yMb@D*Di^atUiOTzOo1B2e+H?X-hL$>Ss7Wsg8&a zd8KAs*)@0Yx)l%Avkaegx=_erekIf1~?m7!8kPp_)vMpSi$$%mo>ZNE>AaC|PQf7v^i?sV5?G~-k>D9f0#q0a3p zU^^ec5}XoDZj&bB?n(H}9Gg?^h!KB1t(RI^{`7p7KI>o)QoSh^k_=-$RN;#}0w;;j z>Wn2AjX=e<0@`xWn`$X>#qJtz)@xDzd)wHpGdGQTRcTyvXy_XCuasj&6$kPt1enI} zRn+%&e-o#-PXF~RUT_r)ygZdSINT8+*tn+-Oi`YXk1;hZ)5hv>N$t)%axHi14j$i@ z{F>T_eHXHILY}NeIekM|9x72YGv`e8tD8sfK$@7>zs!bE1eMb zs-eP!Dw*+2mQ)LP!g<%ZsJcdO$1z*YpMd+>e=n8N+wC&-GuwEI-EVNh_9h!g)6P6N z>t%p*FMag-*%VfF`KVfm5yvl!NL-|+C@rQG#{{@7b?brZ&hlHb2axfR>IFuzu~3RD zETX^%7*S!ZmLfGQfLkA^+sPxT@ZBLm)Ef_4GV?*-J#FHaE*jS18KF|qal}eBvIXTrBp4nOgXSe z(~-SUugB_q_^Q}EkIPC+*_;klDR2nr6ki*ft@-uiZWe8x&!q*mU6wo zK&W{J2=a#y?ut`Qf66sa0xkm1s-&DBQU0w~_N^%OxKuxtesSnv z8rhwNs$x)ge_iC$>p~~uWH&II;8l&;;(JPgTR3sob2>g4MbW^$X|2h>U!BQ5>riJ_ zvpjfa=E&;J@})IW2NXqz9A1Un!FRik=3*n@!15^&$sKqegT9NG&1>gpNzC@1f78_D5sIYh zy>2^3ID6q_xlZUo?{~P!R_r*JS9CgZsvYPuRq~-6%o}{XQ~6qwecoE4ew*#uR&9fv z@M>Lw4iyKhS~+SNyrX=r{n~{_f2UG7nOV2=LF&{1vvF&PUQKaXat=?+wj3}_@$cXy zB#$BoV+C2NlMEUu*L7MBqH+;kPt>gwFnI}CGIzTxE5JWf9KUYjU-$J}9hTT@>29A6 zBH*^U)pSb37|v;PQTQY>!B}fiGDg%%jJ9{B>D;_sqXQ6+qWS1~$_Ytpe{dER7nc7B zVpxtFIs%`x1mVeR19rj`KZ@y>a@ML$3|(w2!#sNogNNgKp@KFJW=%yz?LPGBCI*oM zJlC45qti`bKn{2EIbB$au59i0tiqLD+uvjvgEOEP)_H34mbA6`50-Cl_oH%ra^e(! zKDyI}#_PEr%MHA99kGC+e>}KmD_zx*(*b#+P`HXQB`j4^TTyfQTHDEe=;CyYXfb5( zRKU=#$W0#xc)0fA${YBaOvO>MQ1nARR zLf=Z>6N!@grbJc8!GU+tePCdSI^wgQ>a+}Zl}jy(vUAYfedAIlf42 zbbK+NtZMTL7GbOFAyz)28q$5PEij_$uLt+pEMfoMkt}lJXRo^G>7pvTA_|A=Kwt=tDUlLxqs`>0xnv3a z2B7KG>9br!SI&_3f1=!l#!c?dn%TZCN^mrBY=$mf($)-1xsUA_db|7Jp@egk#kv0R zwEm_>uJeQC&wHJ>T6%{qVAamgTj8ZnT)u6|-#YnehPc)|B#Nhv0Dd#HtpvM~V8?Eu zVwA`D?g$(Y2t08)glQjL3FDzX`b~6%*c8Wg+jaKz-Y$s1f2T|RJ*Ov?H)&pW(tmK0 z8rZ4YTL;#=i44ZN6#0=ifTkK`9>@o3w|<%Tz;xF{QTaBRb09#FWuZ^eVyh!}5Hpek z;SkiqkN@?w-iqnR*X9b5*UcyeMUPgUM($_ZqWiq>mXffSQ=oka0rPeVF$23eG>+6( z6$=tb(iQfqf9jR9dKyB48K z2*-t=UAJn=v+4fQLe?D;i@FDK7=q537?-{glM7CC%js-+iyEhQ+}hCSu#%}F3&;|h zs2=^~-aSzMaqm`5R2r8c)*Ywg;P6v;1&W~@fW@wmSX_3@XGobS$>KI5&rSC-rJmCtorO~@L$%Y+|wsC>cBFGRs~B%{dnduwX5Cw6UnXT z=74K-OEN+cyFS%Q@&Z3+)Bfmm6+yY9Wj)I9CzZ7S0r|bfr!b&%`$)W_JS+s1$afW; z5&NdQONx?N*U)DW;Nc=ett~rjQ2RKPR*TjZf3#zDTv0m%gDJn@avMuALU5^5;?K+` zcZWgwo~O&@e5g>nf>g8ocv>&_qw7nJU*B~*BRq=)lIQ#uo_4wcB=elw$rs1*hdNi% zSYl(B#JD*ua=9G?h5c%J`_EgR8x+q}^{*gSr$BtFFove*=i%7rWusXg%<|cNz2TwG z0Ion$zkd+qdgn0@;e~c#Fy5&}LRT>KR2d^>=XWx{%SuM)iRLY+3;lZRcd(aN#g_Ffh9;4h@T zmQi@mBM)K zIJ~TIBB!4qd^r6tp#Y;9)vs}>R|cvXCx2Q>L-4?O*Z%HOC$8k50VRL zKpCsU&Ys>XC*JnlhckNf>MH0?opKy^?1D1;w(55Pu=GXOdzIkCYrMNkLHW711v!sw zJ|b?#3euyp6AN0>uV+9v2C*Yz2n|aH}9-ehVfe5_EDu46g^6t{O zfJ2gd2H%|8XYFpybEsZ=#E+9Haq4s=p75&>|8-w^_6f7oWN#`Kt2Hh0IzfhNIJp1= zJo9jTF8w~YfxY^#Fk9ETk04XrT`4uwgN?lQC|jqzjc+fj=9i0JF>CyY^6!4)*915? zbQ~~qqSJH@7y#U@O7P#0Eq|5VPJL=@3Mobj$4`>Os!NDlXQVJ|V%qhA6ZuTbDjcx| z)V3$Xm!u`1Puarxz&ne4Lu&&|VV{}i!=SzN<^-v^_J1CrkwbyO!gF#J^w>o`3$Y_X zgDVKkjX-^ zRBM~V4&|D%Dv#E(IDa6^`Lp9DM<3gA`EWZ#<>bcD_&?ePS#2@a{`<8*eY?@VFXujRq#vvW47-7<7vHA z7QZ}&r{gtzb_IWl$G4857ZmiiRnfJ_a^)u~3~#ZV%io>~h?#ry&G|j0E1gl^%J{0W zRT1@_XF9a^HGhJrqjak@2HJggTZxpJ6~lVhAfSxAa$@h6KqFQLH!}ewum;GJgn*c{ z*WUN4C!Dlbubj;{>tB0s5Mq5f@M)opYw@f#jZUY1@C^HyZjWeLbm@|Ml1L9nMgavs zp4Jb=^wV>(y>s~JJaF{Wh;tnKXGwRAdG~z;Ihg#g35O%cFay}0UjL(;JZ%ci-rzEV4+Ll{5`@M zemt$eZGX=E<>ynX!>Td5;MWG^YpRbz+$>wAJg-~ZiOYZ)5B}f5pX3*cY?NsrB`oJZ?cg3(B7Y-ev}6T2T5zkfLE6>q>ix{YF&sETSpb4x~Wj-4k? z#BRf*1&+!w13tklkI$yC0vTFMKV*u!xL9&yWlXDuqgy-2dOB7KSKSX9(zn z#5ENcnaTZE7ig;`sr$#%`iHl;FP~oZDYsNXG46q)FfT7bxU!?AWjZ@obWa_|>*Uya zw7{bwnVQf%N?@U1#cCv6xlN*)^Hea5ZB9Lxa}I=jMd8d<7vHAt-riE?|sv5#hFjHJnHDSKxWw((;xb;MWMrMyG0V*)VKYxbZVU}xZ!usZks!#GZ z7I=iOcz|7yQUoR*65Otos0@qQ?|=# zx2-(fjYC?R5ES;#90!Y^U4zARef4DX3~yY+of*y`G)paC@DH5|YfQ+I%e}9?6=I84##C2>@3!Bmi4)o2q^M zs@Ef-Aro-x!z953PeR-KDt}$w@D6rqHYE?Jw~~wG0m$*elRNo|O92Y)y$Sl6#|6Q+ zLFxvzIb2(u;?}T+?8Rl`ux(S8#ry~6_~U84oa4VbWaX{`8CVXKSIf+Ei*aW=HY4m- z!J+&JXhwTXfWlI4axck)J^I#zH2@vGco?Gt_JPOj^6Yl+eY7N*T7LshX>fwjS=L+R zIDplgC-TPJJL~Qc9x8~O3y5s{;dGch^Wbg$mif4t88j_)fJ=dUkrl8XdOeCRWA1y_ zvQ4RPGEz=%R;6@@m0@&8gTzL?tmhU;TG?T~A5W{ibZov@wfiwHJgVoF0+B}VL?^F< zdcQg*>w|QV^s>XZ=YOeLAXlv^#Cd`n;YylCxKOWy3^_jP;y~JimtE2B$5bwXW9N}$77YV;kvWj|X4kTrji0-0hh>>k1`?(;Qt8(iU zqQ4b5hR|pcdX*`!P}R69qBqn4$nyzFC(JXYJ$s{4<&UTJ=a(~Y2Py+ejf0n9ZwFp~ z|Dvm7N0QnDJepf7MosVs+5JZeFNAlmx_)Wts^IB*n4Wcj=|>BMK}b$oQF9DPlE;#?8Sfq+kALskq7a{ zTe0$3IWA2!(=7?B@lQ_8y7aoXnD#_}n4^l1U9O;X8E0RfJcn@#><*H+ZT4h^VRg+M z1Ej4&cz)~!KolxR*ySeut9f&Nff0W_t+%`P2g?sdmxDX`H<6J~31-#?uAgegKKck% zhxHO?k8Ifami6>cD{yv;6rN=pES$s~4UMi<_jt3e(p@c7)h4)K>CmBD%R};ilS@2- zulm_SCk|SB;HsyoPMsAE9|YeIc%#J#VUiHR&+vIgm4+^L0KfxaQVv}7w51*iM2`JA z447S?)giWNfTg8Ce@csKsamWJgf)z%6Mg;hwBn0Zf9ahD2PnDVNtx78!FPKAF7NSW zqsQeShl6PGa92)ctZRU^TAj(4J8=g<1gptz=$C(S2TgzE#68|v)NX}gKn6~iK#D@| zjz4ia9j|sVcL0jQmdI>dSt2`ZhAv@Mm-UUlgDr3fzc9D}xi5T-IK zn$kT6L|~p;##}5yoU5Ola{bu8Rm)g3TSA$Vzm<%*_wexTG2Or zdW^dFkEeh2s&9RD$ik_oYv8Q(E&U~PvaiCI15eB;-c{I<;I^LT1Fb-fQ***qD$MzO zT(PBkE#s~RU?4!cA$jixY*9R>2iGaMdUWIBjI$Tjnrr;$qsbCB6)mY4r{TCaKe zFW0uE)5)}r2=99ik|MALP`>wZ^y%$3dYXN&LGB%CZ(IS)+oL67yWCSfxd>V)Yr5e2 znk5tRDfnt{WNw29dyEmftiX6s7@OZV%13!v#Fmnas9NTbK(yVs)sEPrA-uhAH$FtW zk-_RlOn*usXK{bn+vH>I)?-#T9az|HnyG@MvCwqfOFcSp-J|A@J$Y`4BOuzn{CHY_ zYGvP>D}py)$s7WY;!wXbV9H|$r&6@^IZt9?+wwzGcg2&WXJxp7VAWPsmut7D+a%bl zXKHXG#goIJy7n)WjGKAsyQn-hD0nYmerB5Wtbe(*rs1_`)f6s!x_5gf2d7v&R4l7I zKm|+N&X>^kYN#BKs)DIcS6mbhBIa`kUED9NR?eAo0@^CrQQ&{$7ek~AA!uCcz>nkC z+4}2MhwH0ilkT(dt!*kseX2X(^LFfZ9Ak1&ICSIYbLuEgo-tIBSMsHFl%=PkX!L!P zW`Ep~ihExIR^;Bd3UFH&+g>oR+f6QFh+y|{*GcqNKQqm|ZEaG(>q>j=+0#=W6DPHm z4yyd4Ly({;&bqBik2|OBAQ!radn!|S0l73FvD0*Kv-0RZyA!obJwGk(90aoJJ^OVp zII=<%Kb}_juhRoDMn&^Trvzv@fL4$vHzZ>k2mt070? zf^xy@Hc?;aZa6zvu5W9&o-MTMY6JZI1l)AzMhvL|!fMmgVzO&{TOLH2ZAbW9N`Gf| zAj$RKKz>%s`^VGzn>%e^-B;HqqkaieX!z-j#0g?1Z`K7|HMpOas>+!L(%5yXR@vry z2JeLHiEhSfc#YUh7(|UsY(kvry7+&8}FX?RrRC#E+?P5U;PEgsBT+vif*5o zlnfd?|M@pR;m2zI-Bs7G%6~^i6^GaqE0j2SC?7+HRem!}Gm5iZ=k{gR(V|U0Uy;J5 zDA{qTIP7EAo2Ye_uBDID*a{sk%VZL6ug=wj=Bt+O50#4Cq~svQhj+TDd|FVKU~-(U zo{C~THZt_?19?f^t-J*EYKKBc7x#{}3|%WtMQc$B8^HLtB8 zA+ViyDzg2Vlv{kKqN(&C?{to?J`Lcno++G&beH2JPLKDq%hA&@xoS1KKAmQ^hDugM z>Ebok$!hD~Lviijl7D=chk_H1GuuxDacIOgtYAaC3ri!X%*GRSzh>)VoWol4Uqnoo zvoU7MTRStdSy2fmddgGzv0C-T0RQTp>gNSaPEsJ#)gHl8UaGiV!rGdxQmDXdlfZeg^G+URQ+WsRA8`9n5PuORBL|(rgkT)rv#%5U zJB(*n^L{T=cxmJ9WfD~|_+?iAn`jxYxqVyhVS!q}Oj8QY(Y2klYnr3PlO%CyDYt0Y zth(svk=v4nT|^s6uIfoD;aq?9w_bPEZG1V@P$g3<+oqu$>Gq=fby(GD=b;p$C68`T znu|nj>NVso_J3<*(@T{|Q=O#=QKvg10)L5of7(-Y%!wnw3CvyI!|9ZzYM@#xZRxU) zVmf#F-gfS0XIWu7{j6YRa|f~iI2b?N%GC(blmR=V2pQ~moI ziKnPWJK23enIuQvMpV*sZEQ7=dz?R3>xJdNoZ}bo)PJU!JmjV$!*asmW@kKY<=WKD zjo$LNbIa0EoKTh=QE{HB27GkF#r{0C45g6%g_L@a*BZni=W4G@B}+}rNA$=P{zN9w zB$K_dd^_2VU`8d!i8z`HDNeC2ahKBBj=BJxo& z$?r~6)PHnyU<$B837F>lpo;6Er=x(?Dx33`dNhnhU7aPM>8U<=XESzQ$5wNeR$0K_ zNlp7^qosU!ryP397f^80B1NJRC?KjuYNou?#ec@4l8$mBBCovBq*u1Fo( zOg3t8wv{$G0I^$sfqI#gpv{o%xEVjl>g!a)R@0~We^)EMRTk^le4-Y?d`&Mj!M>y! zV0UR%=SMy2)fbbd?i`mws+T?R%WqbxD-?y2jH(M)j;em0+gqCg=upRx?FWA2gfz1` zn14X?1$7|)^)0|?U$d`)G!FEPk`-*7#s?0osw_64*y?lB22MvRI2QM>)rv1};1>_V<|YNqMLnzw zhg6o!(dn#Ujbmg=Tjkr~6^R`B*7GiSZ-4jGWnkRRTi*xtG{-uNV~$yk2$oe7K)bls z<^uXHy|$bWdH%iG}LJ zDy5#i0GN(QIJTwXoA*J(j4rV`CYec56lC?0JIL|^hEr{;OHh8S)*q9yeR-i%+<%MX zL)sc+lJx)i%k3x*x|%9Gw2OW798!23ks`8iAjSBrMnw;XHh#`1vkR8P7(x;S>QzG` z))IpPdE-2agA`+_HDOwF1L`!u8&VL~BPgO1`peKLQ6fjE^|9T7DSJ0yQ$76(Hl^luugG0SvuVxFn37hs9dd#B*Q8dA;EP+q48xUz(!p zc_>N%WGC^OdU74Rt$R!6V}CPjZ9PE0>NrHfPshg5QC`owa07y>tIacU} znl1K8Jsn(l2m2Ia-J_8!S^Kw3L42?e*=hh6ES&6ECs~V!Dr1!2TZgYS87V_0P)#a+ ztk&yh|H}(KWJLiSW2!8YLi!*Rb}jHND=!fhLGs}62h~aeP?hdowSR<4F}K>S-m*J@ zP+p?K`_rLdvOK9>4VOhCANuLA@1<{Xcsi(^dVqC*=R|winRla{Z#;Z(&OLd799tK$ z$~!}%>H)Z;)EC@k6_?b}lyxohPQv8U#8K_<(>~idZ+$%hXhQ)!bt;OPjKk-wLcOK% zXxMQ6Sgk*m#q`COPk(A$kxcnA`H*sDgU#wD0}QEan`UV|O46*0vJ4Cf#vu@~1&8(7 z>7)zM>?X?SnX(iU+{)6)Y0Sl=IJ-qO1^iSE#$?APACt)cUM&vMuvY_Ot9^#bb|ej# ztrKcOkx zhn%Z0A2knPTkFUltM$jE{MJY+f%1^22H+EbMj&oG%h}`;d3zuk#K}a-qel=tD5=yE%o^NZx)$3UOzJxF zU5Z4v;q07q6RkL80g|Rhqy*uA@&a9816sSAyoEvh0)JLgj8QeK;kT3!dG?#A$C7Q(0G#nzOyp2})MpdrSa%tE%1byhO!bIaEW_S2k-=WGP{epzq=Fp+By?`|{~@R({QNY**SWsoml5Am4j!` z;OjSE)u960lSH)Jfa^Qcse*t>Om>G7-#~QFy!m;ap8ESt^GDozb(;Iv-XiZ*vDD%1 z{S8FoRZJE%?skf8cHpD4Y3DTBvW>pQzlq7gAy4clXA3Qn2G=C>w~Iy8|NIe&W^ z4NKUOHLLXeKM|wh;CQ13fA=6FN6{gBPtc=WmM&2wAbpyNRDmT!bQ=hNkTm?Yuk}jjyyY0m?ES@EhMlEo8$w}Sq7o2mIPs7~u>?*sxcp{E!Fh%9aFWuW4m*P`Vt<}LR_pC? z_vt~X&8H6l$z&#h=Aq0!D`g|sOl)Lg(_ONs3H@WcZG(WQWkLLLdGngtP-Lxb{%1v} zFuWcDr?X?z5wi1n99y4b(||Z+y8dLI^E2ne+Gs5=CGyZ;MRv;b+`L7w?{OG_oIdZ; z_j!S&0?jVEA6&C+g(5|=c7MktoJ)0RGX=h;8N;^+ZjD78 zPNdWYQDxJFw~Sk$SrQP@N5P|N14@a8N>JjN(whgtCj&KxKF$u~dVeFw!>|>HZW=sY z_v~Ipop`S^Ig+}1osLI_LnFdr>-4HB-Pn7RzNu=&;TV%j2Tkp*nx;%9fvI*whq@@U z@R2`O>(y!gs;c*xo_ZNWO@)j6qc4u~@x-EwEPm@fCr|2BWvr-$$k!7)B&kW&2;+co zybkXmF6q!yHirWMs(<&{I7uyDb0|}ywc)J{Lp;02qHoqnE&}j7s{JL~Qcy`I^}$vZXvI@y<)N+%Yft z+TMJSzJ@a1itZ~%KoKdz1Zw4Cjwa_m`gf5)FYO$cX~Z!xKHTLZjb`otsOBkzWm>Sw zgCw{0PXHv|KYyy~cc=M_k))dzuguC>(Jl@#0VaEqUc*#zJZQ77X8|GKxr?~2rgSTy zbOV~He2h{scG)!*H2p=fZ1!$b7@hPgr=B{L$SzCo-RdbM<$W07X-idkE1{qz(N3ek zu4!;CP5C&s^HL_$Mu#l<=KU=1SNHg9OR*4nb%G}csDH1^my>>bN@Z4sc>5g=p7IRK z4U@c~3j8t4e*B2?e=3V?`Y+FwHY9(iEuW~6xU9tFfFdN!r_p>s-_i*iUCeiS9rF zLi8~>dw=`VgR*X1&FEKEQ9Yd0locy^GVhR-%DqtbwiY~Pd){89PD_kYA)`f{jI;-9aS37`63DON^wB&*q=Q6f;| z`dtwFxPjyDl{PuW{a#X1QNSs|6m906)aSh8937s@&NK$FP1c8HNWeC3FJ~sE7snsJ zYI`2?u5|5Fb&!ROdeAlR?GAp=W3z=^=|B9kR_}@m6TDbFDK7l4tQ~357Tm#>On+)p za8fc^YKG`!67Wi9zEj~OX*tO~v6Ex|v05)I|HViGo;y^a;#o=kO8wj-l|&II8a!d@ ze5c(DHGUG14i%2IkBn(Np-Dnc+l_+Lb|?NZ9mqQ<+Jria|2>?sr0ar&Gd?5oA+0=Q z(vNq6*mpcC{_IZ*!%<{*pd(gPIe$@yYQdKxT``iSI6%-D=60I9I(@3+ zl5%s@gbMrI)uwv1J;1T?wQx{)WC<+ee{V64@Sa?W$Jcx!wZd}7QH=wjqrF`x_jj3= z)W!ofJjZdeg-h}h_I`rgwyN#B%*L(C$i`ta@K$G7Y$M&r9J)$FC;yS4dw^HA#If? zuf&VvJg0V+4m3=8H94ra0D$Ciye5-mrLTlot^Y5A*sJxLTxp-2DEbA9@W}I0*46h- zWRZkrgAi!IiO^MeAAu|3Q8x@$VYf)4-lXn(|L^e4YMi85Iu4d=EL z-YQ#RSn~+#I?-zOesy|XeriF^SLWaqhsQ^w@&S`KB2t)|L6&R&SgrDR=kw)5HgDAp zr-CMrhI*~Jg${asRTTVEg&hR;5;n*6Rkk9iRb)u$F(|ga&qt)m1P_40&2!RMy zPsZCZRK4>+_J60>G*wb*I(t}e9t1l>N}(gfVm5ZCa*b5@%4#fjks#V%uUvp?F^=&A zT|pCkDnD@W${m5!Zw1)$Ps+uci(8qDlGSu0F3zT|4fT}G%B?;X?wfe`W3}q5s?J}2 zKH5zzCvUx#U(Q5zDMY##tv)WpG zUB~wNJUQW2Q5NE{?F6u^1IOl!H9wtZuzz6xky9h71{C2skhu25WY=p?0os#qlfCZM z`u*hFsapMPni5s$A-PUn&;TAR*DZZdx_oG-4P`cHq3*u7Mk1k6`M0%YX4C)PknPp_ zn_Q`1J%5NRhDWP)HV!+0633gkLjf`?mZxj?9JHY%Dp7VMdpAwX9FEE%hhro6i3R-lk{iE-pi=5NfDKm1|(uQC3;NVoYwn>?D9%%Id+^$>e5wn+zJOnGJ4RQ zVTk#p^^{l@qDb4|TN7nUPQGN)#Y+TBjv?y+8-ItA=H)mVr->(_uFiYP8z3|71X6pQ zR0ubl{l{v(R2IJ{S6BnDp><+VIY+sX=Tf*yLqtlftqNNCjguv9Pa-BMIPHaZ0UYx+ zrF?48Hk7#-D)4HIb*e{1hSTy2pgz1s1Uqh5OZ|2zvy|}uu-!J1k1#B2CEBlOd?~V) zEPs0)2-W^tieR4Bk7F*S$jL9%vyMk!!Fy1JqErQvz5%RCs>mtTrv(g~+zvo+95b}7 z!7-8-^4{A0Sgn6O2r}!Z8z_>I;W)ggE?#0@Km~^|3%}?h-$^ha*P4hb5K|B78hVKw zL5n%(3zWX#yaCmznr;U%ho*ZYwzE%3Ab(TwN0P%JX5Ejfzd8^R`r2pCXCz)!ZeuG) zQWq^&NWvkoAvq(!8V|+4`n5q z_S<)2vF>n66&-`{L(TLHLA>r0!xL6mF5c=mbsMDXAEZ^UW_R75rCPB>qo_^}8`zFmO46;hqo^#^!H-^TlS>=|E9oIGeUvSW26~JXXd1l|?6s2a9o~TE zr=FZkX9Gt9r4??knBKQ7b30Fo0!KT3tkz30J%6!ur7O-8DByrOiP$L_Z@u_#R@qY> zcg1C-kb;?QDqq(H;$}^}TIe>y?mJ4m*C9r5+LOlS*)teU)>J$)B~{L#I9;O#*@2QG z;(hz7M4H}X1OhKm9RoR8Pk)feqcdW&CiDg%Z|Yh--KPM;YaYHd-p+lv123&24y`v; z$n%AHW?Op*Q@m&DZQh9@-A^Yqd(TY5<_-N=t@PIo?4P}*x}sX{N;P=B#Ks2DoKjJg zNLLuMk_Spi6s(i4qJ7rBIFQdg4%4WbEaY^SS07b9>?NWNp^j#Gihqutx+jNs7*<4JtU`_ofIX!vh9DY)*qHnU*4QScWwnvjypL`bqr~l zlCu<{2+G^l?RBbmCx1aqO9j52j>A=x`=L8axK$5vW*MZzOFcMu6mY5NxTjFBVuH%{ zSp#rnWfF?B0VeOt2kdD3nj>P*LcQXlF1UoJbqtjRJE2q=6xDDPpw0gpdzbS%q{|~* ze&xqO^{u)=TCqy&#n-%)HJe_o(aD&5{5pw$Sbx5L-M;>F9gx`gXpKdF zlb9bAzp%NV2_)x|1F5n=lpZVqpqekcOA6{d6!ax{I71fr&m_OI%J)4qAm!yo%|Gth z)W@SpcdS1Tnf~pgFRvAq$6BE|$0jt+mZIk6HozUsK|Rt#q=*Veo?No?TUp4 zE*%T_VO#b9Ap#<}hHM*e{*8TeIk}@r7nOk4wALFe z*P$Qd$#(UM@ZNHkS{xBo+5X|wW7Q$$GJ(+5&JS5Z?Wc8WhzxqBc=*wS_`6R8ntV;% z@lZqyd2|G0h3XyObMjs{Lm-^P5wk1j>gQ8n0Dm`bgJs`3>bHbuHN(lJ8>MIC7KDP-qss&1;MT6X;QqGO-3@sx26Y?MCx@Qz8~35c(n8Wc@q zawRHkduzZ4wPsNcrycWD5S>sI`sQw;miR>svZ1dHAw}E`QXz z(eMp6l!2=`!YtkPLsPae+)}ndV9`ldcZ+TPrU-!yz4PPR)-&gKDDv6#sk5ozOe0&B6MCwWxPMer zASv%g|1k(S(~C+g`g5B>s9(h^%V%TTUiXuejM&66+h$V~x*!?Fzc>i0{I9ZYbX7V3 zUoG9eT7OtRd})mo1)FqsBI;^}GYU_{QLDqjh$;db<8c1b+gAm9i-t=r5N(^3kq%fn z)D0kzh|`GS$*iyLW~#{)cWPfPrGL0y_XOARa`c`OMt&w&fGT%aeR@=0iuHq9vqkPb zuP>0EfdiDwp&$G#krOy`a|ZHGz+Gl|)Kd6#zgsem%f2?>^-@r|>jB-U7q6|{MIr6) zzN#C6@BE`qeBCEfqkJl#rYIWlr^+=?`VySGF_R^Q9kN!01{7w89=B#A>Lx5!mrMcb=PjQO9%<|OES0)Q{NC*D4W=SE7&c9yAqV9%xpMcQQOokmiTJV& z&L&@lz>;=zXAXUiDN#97&N?k33fWin%J|%r;=sn!d6;aiS{%B3z(TR=V^h@U>T7#v zKj(F5Fx+`CK-p63_{VC!xPO6P)0|!e6isgAJru*IN;Jd1N=SAD(|rx6D6BvwA)O=< zwb9#d&NmRBYG4l9%d%tfN%|)zS;d7Ny+)&^t;N}a>b(KwLiVPHr@7)sc{r+H;>@6z zw${d8ofO+o%2Tsr05*196|Yvz`<&Z0K*=+(42fx%019#OPgazY>3@=5d8N+prXboA z?OK=s$kuj=KDUAxzU4UDuz%9`68_B3m_5lilBl2tZVIYbIen%fvx9~aR53zjlL5KB5`H$h zQpSaLITt(?Rk<|OcCf!Iw0=-QQFs1Wtv_xc`}51s$A1y;K@t5(`CMI*WljQdTJbY* zs+XDBtDK`g+NTvxV%xKJj=S-m69r|NQ%C9)57L=~Z-7)CrpUCQi$Pt*qgmw{URYJ? zsaPMX?l1(Y{+X=-av^9S?63 zfqpi{34b1e?5yXNf|R_oaP1*30-oH#;I;Bl5ah>d{q^PR_;hUU_DD(CbX%2#Pb&&O zUqS;hr)>6Yw_`)<(eN*%LmhmT6LrPqEHt$lDft}rW?k-EUvp~0Bza#aimX6?+kPkD z#V*VzO|lhv7as-BJKs5z6@VvO;9ISJ^7G+Ul7BatPKO-R7iUSlyqkPB+EJD7I=qNc zHvAPlP_CW zN`E`O)tsffB~j=@@?I@K&(d*|!luij1j>wI;S<`X6%}O%AI(U0E28e)Hxx}{6XFH? z2Qawj>6TQ7;Qze|q_;QcUOc6dCD0upeU9(e7pW>jDx}Z*`R{6_KSik!d;hYVv{4%c zRhnq)7CuywV&i)UTY`31)vQ-l!_{{WoPR}1d1OrWrp?uGrt!G6^NE?q(R#d!Z3d+u zyCV_uwT4cd7H3n6-!c#a;)i6@ZOW5cuBrh;LaZ&t zqY>T~t5vGdf&H5kH+U8^Xw~art4{+Ci*n|mI?V%5*-uj{YmyH1v>%%*y$5~1t$(!& z#h5d2aqZtc^alM>*|T@_D+gvJGBvUSmR8sl44Y4bF1M{+kY&Zg}Szc z+!TNTTNV2ljiLjTZ}F9!4!HrFPxdxu6$P=oqg|N@qRyU?Eb=P=2Pvi^z zSgk*DVEVcuQzcEN0K2=$vtaY^^0b;fSGt2W%*txaS8tjK-GFyzn$#!?!8`2%I&<)0 zXt|ubPQkX}kD_R$qmSAQm4B+kt-W?}(Dq-K{->8;h-P&|2S3 zwQ>=*6_=17mAta%$S=jl_q?h8sfYT{u_`sNmd$R`a&f+Kcz`K(HH8H--J6_#<~*%k z%l)HJO!;+LUA`LgL-7qK>;W!ysZUWW!9s4@9RmP`FxtFiv8ApnlYi>A(HTI#Cfz+MS2yG-xq1HKw^7Vjv+n z53POrQbh$wMZ$9ySq=F$tv{A>3r;gQ)?-)z!K$gfoc1ThsQkE<6*xl0X=o?b_}-60 zX;jUV^Yvr3UV}bgVt=~I2Jj8oF#*_~$%eUV5vbDUmQ~SyoH&p+Y4B0~SV1}B`#}Mb z6sX9nsWI+s{g&C!GASj-9UKl@C#uv{uNx`Qw5)u*#MwUc^CSBscT3Zqs-{K1)pjOG zlOKVTnoi6Ht`m%LBpu%3e>^E|&alJ*#xcU1v*G4y-tC@5c7HC372@D^VAf&Vgy%|@ zjF-0z`i-b}^S_pWd$sC|O8J4OK&NHj6CChJ4c)D!s7<(+Gfnl#XbTz)4a#8h<`|&nPE}B*fp#dkDf2SsCaGKLpw3Lx20}xUrg30QE+?vIQ|U9bOZp z-IRDx8&515f5Ai=u>tt)f8F`S_whvogm&(T`tCN~2=zrWLykn>4`!0*$C-Jr=C8@4D zlh5v!W;cjHfb;8+Vj~ei0U%9zS@l9KsU?LZHcHT>BuepudP?;PmUJ3IIB!64o=DbUK0YVs8MTBMHaMEQL#x0KLTsm?x@0B*;S|h=eHuyNi#`4_Jbh09^#7j z1BZim7ORHJZcypF^UeI1)V3(RH&ao{H~TlJbfZIC^qyPw!$M#7 zR#|(=In=WKCZm&v^%V2}=On&GlF~O#H*Pfu$A3r_txjG71GrW0%O%Th9cnWN9U-El zr*%^Ih9*Dpl(C?;pDa{Tm{DS|ub#C%zUwkb>$u^)qbK8%It?~91_3xa>GW%8ACN4+ zl~N@OR0WlokY#@tAlPdc`fiB$T-Vq-e42~JefIF@QT=J+N+dj`AA)Rt;+ zZ+~Bh-ZROBH{ULYMV3VH!|9kGtM!Ms+E-)Vf!x&<6T2=&FeMhtah4Sr)Sk{3VcjVGWf3@HcowpE=7!q=^XmY%9rzag@=%92474Z3`bBK#$i|1bB5O%$chs+2c1AVVP^Q;fji1 zHzDwj)SOhE2elW6?DR@igHJ-wRdjoQ{7{%-yP2d%0q)$>vMOAYHq$Rk99QOGVj*c{t*I7=#x z(&Wp~`(@@cfP%B4dpdX86XUdMj!IM^Vd(EI$Vop|>xJdNhRC{#l%_0dLivWl7J5>n zXQ=HblS^`o{o?NBb2~-$LH}%het)Y5R$;EKMoKzY_~ek%32XwE6lF!?(iMFXyhz`- zqIB&c8u1xaFdsu79TA?8;&xXaS%d|&QXN~`Ozd#_q1B}Q_LCbl1|^&0f~GW0PvaewgdgTHt? z0V9)&FKFW>pDpX5;y$p7JNH?avrnyhDe4^T$vbO3w<~*PSCT|oFXfL7bo_%NS0zgV zq8gHqd{2n6X2Q_41J;?)v%IgZUeIG|Ns)F>Z-d0{Lac7U~opFO)EX=B( zLZUpR)L1fFp>o!QFU@}`Q-2h_9k9AQQ*xCJy5sb0P&$E&?jNi5hvfkn9}0Ms)l|YI zN5|WwAlr_h-PBztP1_F3gi{iN|hQZMyXM)6SKs!Yi^%bACMwST@fb+kT+8pOrv zEcl@g1(iXG$@Z#Z3n~#4ChsYh@s5A{2Sgh`q=wdPb3PhT92!Sy*zv!smERUM-x3F^ z3Msuow%`PLWq$HzS8;|#(Uo8pai9mM0D(KB#9%r+w%z7Tq4^|bJy%NjL z!Ch0CPD&ttvtx$!+WY}UUZ;Px5f95x9DCH{gH9)p@1^K+48cQ9^t*L(;wAYat}U`n z(He%fByFnm&)x}&j`Oj$a7Z9z$>^<&qptwR!)^)(gP0P-B>eGBFExiQ3MQ{sHCQ}i z{;^tb3+4}jOE?1P1zJl3X2aT4(d4pgS;7`k&?ak)XhUENyi@jYgcg6LUBS?5tBtO>yqVU|qqC1_R{+7D-)XGcEGfD}KUct4L zH+?-)k=d75+k}v!NEoru5jpidy{|ME=40d%R+E3&XdHG zz3n@R+oA&GpW2Vr`XdMSul|-&Arc&QEOD^tvN3bE#_mw@h5F-mF3}$GB;aTE5#LiU zMIxKVIXuYK^_pm$LHEnhqA|8sb$T4&*i{mCSNi%zZ^rN@$n6~@Wp)|#As>V`D z#bR#B5gNztMvIO5{bRNM$bp2t&v=0y3ps!{*{?aSpy>&jURm2mdu44JIGJkE?NOXS z?0P7XdOw{)p?I{T+>`t}N3k6%;gLx34pB`#nJ=xe*u#JKB%K#v2Ae~Y8At3*;HoS~ zn`P*CqmcjIWAp}I_Ugq}ifmX(_MD<^ZsX-`(D$e+5 zb?h5zL?eHD0~AdWO~_;`NI(YCCN`-wH*!|j7R^$2+m!|F9zZAd8?#3=Bv9K&9(H*% z;5{H)!bZEB(B8(O-fY_v55WJiuX@z-)R^mfHseBV3f_a9@WZR3be`Uy<=`Dr->CFn z7e7kop-J*%$j2;6mEB$SPgeJz81?vCb;a<8SrU5W zbak&%iJ^|*8MAZiyQ!l7D)rZ;1Xr)D(`pAxdjcH^7e%#Z1x6_3G-i383`ElFP!*8z zp@4HhSPo8=gh*b(c(iI+>>(<~(DzNxeH6{kq}tw7({U+`eQ0E;KHcNXQ)Sd$kr6gWY<>Uc@*(Q?*1Z&rZ_Mbet>mMcj%W7D$lNdLuwg-)@1 zKY5cI9WDOck>w~KQG-t1h}mC7H#~*h8o7T+1y-klRg1qu=73U59=dMb+LB5)CeW1v zR<@I&oO*T!b_`V-&!yPsr5$5X0Q=sJ>a<(ziY}+)$8!C#14sIH74DbPLM9x}{d8t~ zOJg}A<1N9VTkpD4RH%;>6}&XO>ZQcOK*&KfmP|KyVra?ziMLV)1UNZ;PtThjd_L#xI%SNfY zG&!ZC^=6A(1(v9tWXJP2~UE2Q5% z+Hx|>JcI1-J1GbNxH!DqzX8Kz-!aJ#RzYe82l);i8P^`?<69FW|8tE|-VJ}QmcEz} zB)>-odgCW+ey~jS0bS`Q(zei|KBu}%>%?)&T(r`R_HW4A`#O^&td4cI(B&YgEb`sKl$^8a(1EIH z&r)03IRi4U($=!>oJ8G6kF$UFOnoXddxJf9flZ52AeYf*?C~0XfaD!gM)e=7^_trM zTCK-no))^}0|J;^;mIp$oSN&<`d#cG9wjsDIHY8S@^43wIT*LR4ZzyKBAv8*$(|J6 zEcU(GlhqJG&XjGQmK!%onHIg0kv@fD_1Z!U+Uba`_q*C^-BcQ6#fyKiuer7&sbwXl z9{51E^DX=Q$PFOFkvi?K&F)>ooWZ={Y}LFEi-W8%4{73#{Jv)&mA*L~iiZ7It(Qkl z`kch!RgDU@cTt;?+Jf&uy{|&is6(IoLt91OI|Tykaf7)dQTmb%rSJ)Lz^O!@qfpY3 z)IcO9$pceLN=MwJDyV;2M3pl^{&y(9DCW~YZs-xjN(gOk3C@QW+CwF496tU0S14T(fuvXeyCaNN4ODo!80DY1^#vCIy16!kmz=PeYP+fmd2^}COY9U@CVe%^A zg$^)s9MRi*4GWtoT@}=IIXrwkN@;3L;oTO6Gl%!%30M_f@^N&J(+iOg)YjzG&u6Or z*@m)eRR3%=)*@CtKS{S%-BTK$uULdq+FiRUjZBtK8pL6} zi{t%cwaOnn{hEKq=xmPjQWrud>6~CpP84uzDo{Jg+eflvNVT^BkJa|M<7}r6Qtffl z8>Gm|p@M8nle7BITT70WcA2a{aDjkLn4No=o{IO8T?;DepPU#T8+y89+j%r7$hgrA zz>aODaz5D!r*cEtfxc(|n2W{!({YybA#0sPp@Lf0|5bnMj(JNtCmmf;7)@N^msOzm z(rJncU{NowUnlW3wO>AaOU;|9x`X$Y1T=}sZt5o6=mxJ!Zgpyzz&j4dPHrzqMG1V6 zULOAP$k!d0^|T_vn)6+^_6uU^eMLhA)>E#o>;%V6(0<5~BfMuC3WFdI|59?V2xrN!1&g#gfbi8N4ukO&aj0 zXJdbe5|R9fBQ*MuXZ5-j#Tv5~5+hMtyU?jna6Fo%sJ zDbw*UAW}XadjyW6kW-_>ms#gP;DXbAs=D(&?Gf4Ns{aNVZe^3HECM+GR0+iaJedk5 zY)abLctl$zX#n~ z^UdD8|Ke;trT*bJBl`n=O_4lB^iGzqgY|hg=Jn$u zfe{voqmWct7+SYr~oi+*^prTs)vO$1zp@$zQ@jbQw?IRMd?e@|1x$Td>hPsFY@dy?hh_d(DQ;z3n zHq0LBb|5j_)X#^Ug1WWb_o3{EO?qd=?6p!es&`2KVOu8ogsEJP@{k^i%^7ylha8w3 ziR*i=e=23HYS(n0P#Vasp|Bj*ETeyL%L*$6mr2%E51Q+8@=p`#wi^=yf@}zIRX1H( zg{Pf6xm>r0GE5*1wd7V8E5Gp8O9gzi_^l6n%PqT{JX6!kF>+qBmZ>*bJ%DSvE~6~! zzPi`i!igx7vx2UAFj-Qld?#hRWF5k^ujjRC7cHM~>I^X*(@5HtD)gr`XaRo}zW0^| zvr~NCstUBl@i-JiU(`cE8UW#Ok{Z$zWuV;pQZAe7CRl!6o5f@$U@+4}PKN#cktL_6AD84g)j%}PPasWXE1cOE@GIP+EAJE>?6 z)6Y|8sh2lPljFzc4JcRkzVEF_cw0YK>!rXo;#Xr{ZKp?*lc-je(ldW;K5;Yrvtq^y zxvCRC91#v)9vbJ8K}WnQmn`)M04sN#a&}ew`lYO(0H~_;5~Y>5mRvG8m4_F5W3p)B zy;|%Y0KeiAa%Jw_$9S4HaQuNTZVrWjJ{~I38MgzJK1j=c7O($|j_pqEP`1Zp^A3p2 zmnc__e>zGv^D$XOoos(QbDW#5G~(r(`>|U2zgPPd&m`w;?f^zSapt9Bj<%)bvQ1e~ zTUpoescg~YRRs<`TSo~jr)}-r04u5_kF@n+c?QQ$RG{=JgBR5-8YO@_qrBZJrSHebb#ttq)|z920Z$EIlEfB{SSdP9C#uedc&W7~7inn|$0-TBbz#SLkZ3M~Ivt@5I~eYpzX5=+9jjRh$X zlwaKDBCJOZwltUQP`UB)*MkNGMfSwt&=R6JG0|>=&0Qf+jBND5rqZuaE8Gyza}fza zE%zf~_Ny^}l3#!06Rr0ywR_}Dvw_HnOWkKO7y*%Dm2gj>-EvxTsM;3L)h6!NEUh^! zs&$;hSlLYRD5hd=AQ2KJ_^#!ez1~q_AZeHsjK5av<>>RRHj+V}4%$x{X!Zk%F#3Zi zVGKm~TT<;_&8yg+miL=FUxp!H%7IjX!H8SaXO}2MUMqiArEG&bgH?g7Q>ec>B_=z+ z0uZRT{nU?p!Kub?$|Sd4OZ|b# z<`!2(RdZDlkA(4bI-jzoptH(X%Pm-D*(!tC+v8sd;;%8^zq}r1-7;E4SE9bic^qqKH!pE6Uw(N`k22rg74(Bjv5_t|Ku; zU1ajnBR;t}EHUDop`eX$pR2>l9vd!}Y4CZm93f&^h;1@0@g>850F_3{2O8vRF#(yG1XckQtQvT zG(>58E?d$KAjsL1cgIF)US5tjTbXbkH71&~N z%KEKAO^0MpOI3+!sVvjRyNcv(hw~QCIYu2u5(VG22Q|c`i``u{x|H*_TV@&!^QM2P zZ_}k-n66zE8g}Gt!(7johGz*{CKrOD0_+Zr0t7Vxn2A$==9?NYx2-C=Lh%^4Nks}~ zd0N)7ef7P3)7#8)gQl&U)nL4oKeT0DLVGe{p{d&}zmwXRjIne{{n2TDPwjt^nl}r0 z94aq+V->Hh;HU%EqqexSnA$`sXsUlXY}Djz+TYteDu>T?jn`Ua3q7zm9o<)ir`>9- zg}ce}WieKYLHbiOF}XD z9qy6jcBw0^xNTeNFv^2TpgIRf?xo1m(A)Qkx9-%#2=6#Q2y;40PUW%AAFF>A|Lajh zhL#P=Zc&@}xWK^5mpVH@AR#(f|6eL75<}$wgmy%#M0q)q&Zu9hov9s(08%-FbK~ZM zt>JM#mmEM=$1`{pb_~g{ooZmPEe-p9W_D; z$7~Ku2Hl8Lo;uVI>cXwts{elryL|$#smVZAoS9vFb7!7(`_vtyQHoWjz+?gpZs0xEYCwJX#?;Qna!{;MXbdnF7VxmOE<5p+Qf0w)goR zK>R8PC7YuMkixlL&S!NZ$1xvXHb0y7o17m-2z!1ClX;D$5x315rL%t(c1fdh;06)I zag1#t@sPg3gOris*7L|l9Q)7XT^(7{)fWH%*nuiJ4q@RCa z`S|L~*RMM9WO>Q26ubQ99(PZRx5mnN!Cc9g-5w~Rmngw@ek|Y)@zm43q5{q~r6Z|( z_QS3j^Y6U#(L)G&WBB@uhErHJteHp{Saz?{dB1W z`c|Fi)5hG_lcwCFJ6tEy**;~rN3|N2U34h-wp0qs4ic|Um0RA|@@7niaL{ImH%(c_ z$Nh?1e}g{tOM4jPUsSnNd^K7^DW>K10dK?08(=s=sw;RuCa`~i0?eqLr}DXy31??d zJDa?my0$u}IJ;%wtf`oMcd&6y9gm471*{3ic?bpog7jG}vD8DoH;0nG4}}G*J}p&1 z24HV6Qm{*0WMmu?xMwY1h*x!t6M(Go9@WD16)6RIDQf9dpK4%HLJXDB<1{M3I*mwN z^IzClfT@}Hb2xnSuU(+&qCmBCY!1@v@1I@8HD1bhn|19j+}f?#s!ROq&8 zPWwnRRqmE}9Q3K0+i-+3j5>hOY85KGJ+Ka!4CStnL}0_F_VGX3#?D~NNB*+~3H1r( z#G&wt#0H}D!CG>bH@$iW@~c1K2)K0So^2&X3YW6VQ6e*KdO zHnBLoN%5m!XX`qYfWy;Kr=|I{S&?q93e~Wwb_v1f-VPl6+Jkz)5yi86i6`-dYF*o} zCsTD%Me)_ExoBv{@SIo7SNu`>{Eh7&^}A)G_5)AJC(Ad{bN%pZlDrQE7o{3131x?h zKV^Tx_UsNv@i-_wIGm4{!kt=hsTy!WyCN5lDD5bYvhYDUPYJkGT2cwJL!Rl;aO5FIcBS{H2`^QmyjqQJrFFW+1Sru9Kz7G;(4vMppxp<-&sa`IH zF85&WijVrD0bmsJ1q{EGiO=q^B&n(sx`W(hU}~anS{g5OwW9LP!m3Mk$Z_MTRr;4r zedLd=FpF{urHYzmR{)pke?+$6JcYcRHk>x24K%6)vYE4t$^hcI_$LPdG(h+bhhKlo ziv3KyZveYPDtw=<;+4}u%o^HcV-g}Mbq1>sdLY;rfpl~CVy(VyKBPAz>x->O*xWJhh;V6XrU5s5* z-08J!tB39^s+M?F-#0~*4qZ1I5DA2L`>g3t9z7J2?x6nD<4y!D0v85)2qBug)g3EuK1G^)K zx}C?Bb>BWII&DdXH-va@c5A#6!E5cg!@Enkaj=4aA&yGKquzWJBUFdCdcx+|cWUZx z*>EI6dF!LupJ;k>r`;Q6leAcMbt?F(UP9W2igSyp_oM%a@~^4=@D=4LNM_J(=5{hh zPZ|Y?vv>2(pPU^SN?hQ{ub_YFhJ4xvLKK$kFzkp!>G~dPy(-_#iBezsIsGm=r%Csx z+~ltTMe1C(Rj6sZoA|xAG_WAM=reFp$*@IJP1=0{Cv9y^`G+k4nTeQoz<}aKa9$j~ z)5`ME33q!WjHC$S;TXZ#;^84^D$M7w6Ikk-_>-hMS7#j`vhc6C^*4X%Q@&P9*UKm; z(xwrc63AT~G5`^ar%z=8VpT*Lu(X`TQrd}H=klIZYdh6ARaOTZkkhgR{+p#!Q?q$B zq#IpKQDO-p$GfxsINY?o<>$wqb2wg^IbOEODxa6t+;Z$m=`rF()s8LiA1;+F3-8)dIgom?tMqHNUXA&$LJ>?$ z9ebAT!!Ct<-xO|o|5)QJ|uDSHL^DxL?#Z{p$D05{3*df;+O{s#0s325w1)= zB{vVXsE?`^$qqp;QLa=+#TY&$8*ky9Fc&T6t{2t~n71e9Xs&;DV`}ORhelPyIlTNP z8WeQ}Rbp}W@zKGpOiN;G9Fz70>!{qm6Wu@@!<@z+1v2o0Ikx!d!yuQS{s3o?e#tDB6jj7 zui*qmIQl_mX3yomIltF-6VdB6WYGwSkvBUOb*SqO4hAX6>zrG4cQr>Pj;hS^kJWlL z=KJSD(Iz-Qud|j$+GCGiW>Hwy%*GbikuFkfV1=d~|J{G)n2$5)P9IeL5GgY>7dpIR z^$k`p(WoOIzSVgu*J&@a-`-6rbWE*IsY{@LJ|dnV#heVr)t^vUy~qyP_u$m2Je?;h zZcD~wXMZ!+sy9qEZ4b;9a+n&+-FEpjj8`gw((Bf0NHwXs+vS<>N19!Vo$k5v8hRghnmPbP-kd`nKUJVcIQ>*;dP>>^~U zN?Ed6Q|uUPvb=A-cu@i@+h9&&n@HG{&YZ7&J4=7d@lylGo1^eh{&RTrrceHdO5v(4 z5sb!Q1z<%_t;J(kELRT(lGb z9rC^uOtS695j=?vUg#bq>+Mai2u+ocvIj;z?^jCHjqP(q_8d$5M91=yTG_l)k(qs2 zhs1x{on$KSc>!hkwI6smmE-cRUAx*+g}$rUvd=c#NF3RTQw?AUPC%ld{VJs#S&fZ3 zD>W2w>Lerm=OniGJZJkdGbOmI611{IS(K+_j?Q)-B;r$701Dbm0gXd#Ja1DPP@MlN z-EY)65CLQH zH>J<%W!6bS5goP%cirBq%o)gTvl4GKwE)vSk{3+U;IAPH8>ggX!-nO+mE z$bPzm#KaZEb~@fikFXck=a1ET&!K;b4?BZNDdX(ZMRrKu?rSWpRkvTV?@Q4n)yRMA z-&n{#_A&LaU9C{Kw*ln3&O@IhdCi||uA7Ip|5jonz<((2Er84|gYo$2sp_TctW zO&E9rG>~rZNP{IXPo&Ph7K~GHJAulYde^&o_h~CZ5;WoWIyaV}1l(Lz;4teXZShgp zQxUmF5}DQQ>#2@vcn=3NF{ym_-@itCMU#pXRUqN^aNZ7PcO~Z ziN^1os7^WJB~hF9iZfCMiWH)_I2-z<}8SzNhjUIuNGnCC*I% zlfUfr=(*?kt2*_Gg{7EXcA17#5{@8IppPP7=*MdPq0{tbU!XimlP>^Va|Wtx1%2W8 zY-+=(A=%kD9mvU7Xv#kf`L*i7Y*!;^;@2f#MEYU`=yD1GRdW~RO1^)4?Q-3vk)wF` zKD5IKw-mj1<+GeZ1EuKCMvXvKU)M80OEajltl-P(TJgkL+${SOZ;bhIQ7uamSIdn$J?07pRtwxc~ z9uXssEj@EAs-~-ouQrqEx_>x0-e=K_0toLu zJRklB7)X<7W&4efRZ0X{pE#G)#|IN%jy_u+65gX#**rMRz5RdJ8l!zE;NdH7wPTBH ztE*F#303N+5nihYjhd5!oA0_*kXkxiJx-{n-83E2HNafk_nigax-(1Dk*XPrKSXs?Tl-lPu(J1Nh1MHy+clM=~Hp(OBn!IJ2iTF^bnppJ20oN`o(j~ z|MODjzHNki@ksP{#@90ayjz~{-YMU&HId?!nG#HH{HuS?xZYka3e%_=1WEaJIB_%` z(1)(;f!(;LkZ-*gHI)xtUcW|hAw|xLqE|N%ekxu6C}-O^G?zz3eigOx%s*CZyfhBJ zF01F9w#|}#SIPfQsQ{~!8pGr+mQI7{LS>QU%klwIw4d2@TLsZLI(N1$#VT-dl0355 zBqQzQwyS^QrChbT%#`RFSAaIoIFv10$A`eRly=k9_Rxxw9Y)AXvFr47fNN`)jv)h> zH>*wB<4D@$^t$9X?U}r@V}DsW5@WZsZoB*jcBKg>k1T6ehkUMQHMpT_<+105{<~U# z6mZbfm+gvv%AFdkDNcWGgRJ#lI+f%Y%q#gyR zD(eQIl$qK%?85H!oW#ziQvv%h-ytZ`&ng$vMfqU)Lzb9>7>iQ7ty?nyaDj%d_q-){ zHkmWt2A;MU*$(M6)H>DBZvBWJAq^2IihjTGbJf9LJ?|U7Mm@yn6Uyk|$Itj5B z;1rMZ=BQScj;dO+IzT$1$9a{jt@8$l3}D&EHga)zwS9(PS0ztM#UUe_d8j2Qbt%p#t4k7EYt|O=;%aD|mEt2hp8XtxhTPB1QuuDAKME zCy7uuYCUl&;5<#oRKNvX@$4Sd_PlnY;GfVh^6-Fy6gG8OsyhH<&F_tN+j5Lf>?u-sW^HqJ2Ugpm;2iSG-N7}UMAzC| zH~XeF^3)r0{#dQ_U%DIUSR0fosH=bm3i|6RC0ax|wd0<$71(Ui>q=A!A;W0k6jj+inn%D zUxhHJqS?|Dx{n{L_0p93(q`dA0mAi|v+9)$wJnX45)N_|Z9DT^Lw;EWu_u3xQ)Z#? zD(oNS5bXbvFCU6D=L@L>$T$Qc2_DPcSRJ&gC2K_8mP0w=4%(eIw%$9+Q@!&)Cs~i# zfks(wQgH!P&gk)OEEB+%QdcyJ3Q4&FNw#V?U(uB%P-bP{L3@`IDQ)mv*|Bey#L;g` zk;6L{TNi6msu9y1CjNot|0sXpQq4bmtLl)myRl`vFAg5!QTN%p_~PxhoGaB-^G%PUfW5-u8F)sGO`xawf ziyaqPs7{*bMV_xl@aik`A&qmcxK&nX4E%EHbALM?Bac=Uc@j!E@3VjEd!;}O(fiV_ zcAfE`fdmI99k(~|nI+D^7M*Thplt#0ZW|c2b@VS)1e$z|JO-;X|wbX-r_H-XR1Gx;%pOSO6ql( z#kqNvnSE))fzvprela8%o@vA2su&e;hZTJrA^6kH*X-Sk4QTe$!#0l69$IZFX?#)34QfQNX{3F{s@1t-Gb8WUskz z(!ZUI6pp9s(x!i%-KjV{i5Yl2k9*URIwjX8K6-ej=9f;tunelTD441(_@xPfvet)! zYu@A!c9~O-S;h|A_KhGmsYY_d$^t5_X6P5 zLVO7xPJ3yfSq{gwRJX}bak9FrR;Rxxub}N7t=$2sv}b?fB>h;e7i*+`-R$REwk=_z z5+?Pkx2g45zw+=)zgeRbii-?Ui+V3i7Pgm}!T8B9vXHbyLXUFL}3TyaL-coj2wp1HxFUdCPq@zD2@FU+o<{jI zkgWh71X#!9o!dJ%3+1qt&Cq+g_iL#HzM~U}VZ%Y1rbHr`$iV{F?&)6}L|I zw;ag8cHbgTDsD+bBlhtpks>U2r+b3W>y)8lBVL`Q+j6%ycBDGf)RA@-sm3U8Wa*GL z-T!~($j-*vuzb3=j!up0F`knOY;Oe79HQ4(v^oI4R8W{&V0L}? zZN*9$p>(zf$~wlbuI;J0PH&SyuM@f!7WsIp--s2ucQ=pfxchR{oF=yX=-9j{;NOGQ zx_=eoi*!v@O9#d5R6Sowc&~nlJbeWn)ee8DMY@=}pPX{hs+<>hs<>N<)K~Alq}vCL z)QcWHWBVF(=j9Y{wl{4>o|0#>*N^Ov76qy=HOI?9lO&dHT&DWpX(Ks%N6seKetm5} zJZnQevvpDDyO5j1A&@45UV6ct>|`JwMYQFKjm5iZ3zvc0PGWao4Dpvj`A1d#qJV#g zn7*W0s2+B3<`Y$)kwB|*j-~LKi+!zI;~65iO{eZy1PC(N5b=N!mu(GPY5-*?Q`rRU z0>0!*TaWD|&FT_iO-V(r1_IGV5q8%8BR1kVBE@0iv}m+MVUxitx`~5OwLU#GSPp=3 zDXUTRtnnwCuSyJhoX3!AsvI2nHnV?Omly1|a+hx8&TBkWWmE&82LcO)y57e`lCXaC zPX8$2B*Cw{YM#7oS26Ol@$pjQUeC47K&}VbpTM@`7%xG0Fnf@ir##vb13R_ePVBL+ z`qfGNO1}r%2!EW`t>^pUY^QmHfvX;HCqX3M(W_-K>9s<0wkemY5rN$F zAKkz|3i$sUezhLhinzx$91+l!cC+t>HagFptxV%BRZFpg;|c#HK~@M_izotn0U}nG zEo+;S->ywNJ5mp94uaE7ATfVdVA{X7-Cp!5sXTRk*NM(B&P8l~q$=WrFjT89;1)N3Mz{dayiJt#NNP~F(@GeyWq(Of|CObb~)Dic2 zlmQIO&gpn7eMyQ{rI}q4DU_5$R*4`!2VpF;-n@}g)q#y~NvSsaZ5gBy@V-b~|&$`w=Zv;VXj-EOPw96wM zEjJB~fG%sB+Y#+l0<#D{m5J}RcY0L;*uhVQ_Rf-2>#d!lKRJI=^xT`+b5#nUaX(Q3 z5Y|_jlc}7Ax00L|rQLt5)*qJdUqUugGj#J)$BtrxXl+#pkkUNU60c6BP!9^Nx*Trf zC9iGtLL4XLvN}1ayx)V2rmoYcLm`UZNL*_gfgf51RLOu;=7|qGoMpF<_}N>ER*hpf zi|&0bPW7CN!R3FlVpc%@B#P||74RCFv1hOKk`}sdG{dXZwWzVjBpug7?v05vie@|{ zlR`DrsLh(wAcWiAHm~*hv0ATj&M(VqU56+IC9YMk=WZ48Nv^=A2V@}0aOu;ju&^Ez zO5N(f%?>P}Ar`mBt8yasOWe-ESw7?Ky|mB}WJ9*7O2&W6@~F1%6^y5_lzjTWef2t~ zU#2SEHts29n24@+CGhat#cA?FY~w?s=Cci=kCK!;;`@0^qT<27`(WKewOF<_cB-1j zhF+SiscEsEM)^Vo&{Pq=oTdDc6aN_CV7O1*ntO;(+aS(@F1s;OBp9Ndk!I<=#+-_E zQo{}cb>Dx=%nrEl#@R=0Q%;V34F(Pwi0RZlOVVVTD{h%zoX;1$%WTh|N<9TKP3BIEmd z?@Izw2V#HR3&u(cqPNLuYC&Ch9wa8c1}uN=sCm{d!*omK-Eq))_RAixc8n3!AyKz! zM>vV1+gWxL)og}yT{%;?Q;Iuzz=i{_MafL3+W60`KjPMl0p7k?x{GiTyEQG?yYupS zQg7EcYvBsrVH#Dh6)2eMR&z8T|Hk1os-{h99uC{@*^z(eYk;iV;6SJ7aPNJxB|3kc zz5wKavy^sb>(-AvEHA+cuR&aCYUDXCV>3w8ow$X}c%j~LJ`{CMTCuq%zhbGgM;sas zY7~y|zNO|9rRh<*QsEQ!&Y7LS09BBdwCcPbs@waxRcu|(2mV;C{NGXG$BTJYwtH7X zJ~d61&9f&MQ_Wi*L1W;ga+*Hu4`+V?fN>~5t!g|^PbirEAXX~gz|paB&5^LP#MZl} z`jPw}p2Jorv4#f;IzqOOQnN)N*}wrI63J0Ge^ZjMO%^s|I?2>(+fNnv-1^ojx%s{SZLj{ zLR26&>9VSv4K<&}23b56FFjG;dn=McQggrgYQ4rek1w$i zdDV)gw{5jcg?-DgxpYt*vVEpx~Z+iu?) zmNxh_tDss*MUTkSDFI?Q?_epg_IzX(J<$uCcPXeHwo+4M{|z;}6vKZm;J+akSK-7V zl_-?6H40d*4W3)kKCRBCh)iB#kj66Wsmc;32k0uqAvse3yD8NVZ2G8^=BW98tk#PG z{>9(oVCiWE3T!q>PnG>w-x{uJ<0J>K9SFavT8LbW9l(+6a@4gD)-d#P3Y62>)N(sO z61Su)B_tg^0!J3fv66pi)V~d05zBGEso=*Ooj#m6MQ|U=ya4!M@uQYc%3IH_f;S}t zXc(00)%`rHgDE+xxYd$dYn8LupkFN9tvq}!!=dUy`$%N!f z={8dKBeBaS6H88HsHZcXV{Z3~wAym4jhTD(by8kBCl+&=Z{<7i~Z z#M#X2*WP+D!25rv2LZUPx?$b?Mqc4Ve!eaOYZE4CSqBmnb|Ya6ipXbfa>`Ubcc91) zh@#HtmeU5a3j=G@EOv(fYwO)|WZ9K$yZ_q?wLqY|^VtAF(2oSD2TmsmT?hpUxYd7X z3}$9Ts8*aR>~r>7`S75VX48z*=Ik1W-_FZlXXB$dgOGnEhp=iM+Vk!8pmr~an3_eS z@r{+FBzK|J2+Bkg!Sxzl?d*=C|;reeAKR9Ryv1Sg-!*LuBdd_B>gIU zCr|uT1A>3z;|R$--J3&R&cN*f6gxG=wlMWCJ6;`0m4gT-(3*9 z#l9XHz5q22V5GboN^Aw(DTW((TUBeavPL9Yc0AISZ`)&Fft0qkLD*D0P#amTQ*6Jw zfeM{;ryzObBw+BvvBfpnK$dfxnaTcQJJvJnph6O2pQ#m)$I~x=`L5Hu8q%W#r3ck8 z3)+9Cbo(DvwVNF%nbL@G>kI2DQYU<=eBvL+CVwy~m2#|X(uW0d_FJFwi~p2c34o9l z=uqN6tHG;Z#g#`8`GsHq*`-^Ap6_;p+1#}WV?4e?>s57GDGo{4PMhiiqyuLM@;nY8 zzD{B|lFU{jV+BfGtM0ymvQ?>Nikxb}m~4N$K2AkD*4$bftlLu-h&OrpbRSidS7#&% zXZCQL&KFr1MY2;pfXoEOq$lu5TEJG0tC9s@R_jkPJzXC+`|O zJgO^X^8KY^618L1Cf$lJ@aq?w{?N-;VOjoJh&zfJ4PKyk8gVP>7QHBw>Kf76B#D0` zlyMvusymGzUvVots6>puWk;z*7UwSM^qtYBH-MI=0ZNwCye=gLf;J-58K4Yxfm9wL z3=fW}UU$bMfKHAOM`|yiz8W4$*$$U)$lKoSV$<)pllaG%Ki_yO3pBG9)Q6g2r-Yg{ zC9uf*IWJqC-dKjBVUT7Zk{ffC-gSSlOTqtC6JyICZ?A3k2q#*4eXFx7nwf?3#%ZDc*Kw*E~Y;cZ@ z+?VFX{;YATO62H$P$Yeuqf&hCE|@J{%RiNgykNOHvVjlCbsGLG(JMs7tUP`O9kkVtFmCUOBO9I&gSj zQntzCT8i}9#8EfC6=kivS7eiPcwIsL0Ouhqm>_C)#HQ1jP#IRL%)-`WXHu?3Ifopc zTP0u}&52gjEW{bRZ-*R&d5*V`4Y6cJW6mW3QX?*PjioT(dQlZ6(Kmm%QUlL{uxR(M zsXp?=rcLUz9IlRhT6S~K*^aynu3(!f+0&WRIcJ`RCw6|8n7B1T)0f-V_=n{`Sh|$J z_3(~@;|#)8eo@5M-J7sJi}~cxSf+v<+bIlV2g+S`mSlga!+6MFktPlzt&TIQ zx^-2@7f+yhr!rsqd8?^;^G4@$Y(dnR-*eT}pY5_~o>;Woep-5*v8@WBG_M2oRE??1 z*k4j07C-wS4Tz*~*@2{mvYg0uG?^ED1ed5D)+7Sb-XyqfotMR3tK~On{^av8VevpP>N00k3pp(eRMTB=k zPmqxv%P~DeiVSk*{V;SCOAY{iyLyDc65A`6O;6C5p9;tFosrO;4{c zJ&5$jm;Z=cyInSQ%BtRS6QshOlSC~0ev_oG=S?JhQK~nmt1lghLzzU(EApq>NuG+{ z%09Cf?O5j3k`%5-TRG)g2z5>EVl}R{Ey^<20aoW*Yb0pKs}8N>ea1o!ot=E9)Slp0 zsxRgFf|GyTlP#!T$)n8Ih?a-x1O2d&ekV7KGziWUSx=FEM5I}=hq(h>g6kT(Nt|9s$4b7$RL1jz= z(yYJ)&0mASqH3i{pZMVOsdS^xa|~5>F6o=2E~9^Y1`2@V&4W%HM62D~mZvIx z)NWvh;zt}iUMr#Ca9sPTs;4_eui@$LRhCXPB(zt#!165};ICtxhc28$(4IAS=Zy@F z`e}SyOAc*wGvH7@t6$dIE4!+*5Jq1%DIaI3 zw=#d2maK$js%A12wXVuff+L<82)V3C6c#zXWLC>w9RQ9wxbD5TN|2@9y@1__gzxQA zL7qz)bT)Zbs5IE1K5v5AEv@2ac?>so7`en8Lu>8m5iX+H3i&0~urX-X)T@#;apSY9&*Mns`{a$RdF)n zA?MtWYA7M}`W$U*dl30bmrr@ho&6TK{`m4A+(2NQWHj(WGl7$IbhXH2q)J}x#1OVb zX+>jMT?YqwkVr!7lFE&~huFs&b8lNP@nja7rU8d&Z7` zT;<48Miz(i#j!bql2hb3oAa_)NC!6J!I(2sYN?Z^BFvsgK7g8vl|KdnIS2%zQ~4Wq zXdhZdfCQ_JfFrA-2>^1;668aUPW;;wNI#v^qAA1G|0_3;Z+s~nq)#R#!DWWH?_Wqu zgj1G=#F%^hv3FU+MxDT^5f=3sCsa~@DeK9}-vdbFI<-H%rfz^Lw)2UTCh2mRKt5B8 zLL%xDycr66aEYo{Pp`Ma!6mBNw-H;9(MX+6l};5@8n-Q(B#FVLSx)lG5n^<}lr7bB^B5Kn7=-+s=7 zLCvuT$D?S1yT>1WGVPsi(tjy>z}T59n)a%|?oUT1 zNkPP5C0g3!xCixTiPw8*9|)q!*SI|F#L=834Qov$$(C(OmN;_q8c~@m&eaVV)FaUm zWA%htB+bd}T9A}^ExiDc+0hPvvs+|P5uaPpO&R30bxW$UX7f(x@n4tg{M%eqqVKZ$ zkh|>&2f6Xk2ZZzCEO+d}9S{^R!C%s|?mkX~c&B;E^_H^Xbb8X2s}m*U=yaAuxe8vm z^dWD6mU^k(o8e7P(S=Q7w}WEu;n&lNN9sIhqMcNdG(>bHCFremT}R%3lIO?1_U|ov zp*f9CUObmOXzaNyIvu#9;8ZD@h+aj^$Emh1k>bvM6TejtBv>7ZV`ig+1NCLKel{1# zD1Ol0tc31HvQMWxr|tE3sv|PneK}c4pyPn5SFYfQv^;j2hBK@s58WbXr(1wflPy&| z4hOt-zz9p$MwDJfb*{^Q?Gv0dWRFs%1%2vYw2{NhimclVnN5<_PG{srHPWtA@1yQ` zhU46-D2`JNp~rzwR}oC4FDddW zkH%%jaZJ@~Fhzr@!&Jw56hpQ^+~MrLf~m;iYZruaP#*MKnq{1+$w>kk@d11zi%3sI zh}~I#Jr@BD+l+5YLsu|9X*s+~90WvmSsqj(>=h{v9?#o<-m06BYG_|!aaN<(9IVrF zIwU@7Q}AJr^j}x2e#riOI4D+!G}X#EHI%RiPY?sQoGvCgy5_d^2 z+A?-+wj7jJyK^M4pE^0wak~<4WyK%$h#g>4ZiNRdReX_v>*_{~uqUWRv2qRo;G96v zw$`6f%koQojjqm=m$Kzb-}csT=~LpH90&q`xY+0F&J??_epn*9R16`2+DHK)KXrO; zR8)Ig-Tc+cvh|6bQD^i(?O||AwWMc<)Mu70DOL;`5MPNEk< zd6HQd1;m%P$u@ej4XUPth+9 z`0xw~AdY77e{Iw4jbIXl6Zj&TN*ADh9Z}P1)w;S;TLhI`C&fLBp;J_GGWbz*V@N^v+zd312V)*$<`TKV5WpO_1kwUy)^^SCM%URM@bf1q+s8*GP|l&8-{ zjbYXFDa`Fa>J?2{#)&IV6>xZ?_HiUH3u8H&$#=m=w_;Iby6cmm(PSdvP>_6o2-yV7 z2C}E^YwsOSPT=7sg|sH3*8LO}+w845k>`$5%kfddvTjB7uJ#5GE??|Uk$ti?BZw2Lw^BKTSYsUjL zLIggKw|s`($MrNN3;1kj)N;L0Xpj5sOUQCA?Rsqrv7H^ZpseBHhE9_A+&;9iZ`nxR zt>$F>OSZuRxYnJ$$-VJ^P3UW|W_%RCQf@#stuL$fdySDlPNE|!JS5v~aQ1B2YPJ4ujh0rUk9@ie2bI7UMqjDDE z5>(4rrw+MaS7h4^ry9Y}&DU9hEUh)7LRvtOtgW782q__&74m3*+k{o$rg*y5lyze3 za7fsX%iax#gFGsJQ_o8DRwQjT?NtFwXHcv7s@_xnyIL>j*AFQ?`@et(=!71o2N7yDzbwmDAPdkhJP@wkUZ zluJ=W^`cG>M|~52=GjZtd2ZE|insC(ef}tlY7bwu#~Fk?OIHOjCQsGt9?TzFbT;pW z+USl(a^iF-ylj|ND$okDuXq4hKiM zE4qaL1c*vrBF+w5JEz9f*V#D)Dkl&R`7t~T5w!XW2+9)2zO2@ZlJwC$H5ci@aRbpF z$EJxenjNu!J8vCDc)9UTO)TB#k-)*V5{C_GcUB$BOZ*ck9Ea%mE&`so)=;}2q5kV@EJ`X%@l7M5c%jpN! z767h=pjH{`Kra0ObKcme%XBNiN`A*d>TW2c|D zm>-=99L?Ac%^~W=r?VlY0QDFj;ueb~3Zr7B`hYOPmfoqdqEFTH2y&Ko)UfBbF#iYU zukyhGzp^rs#%l-e`(wB0qHLiA+T#HwB+3wdvY%@UeP#;EKwY9U%ca@sZq%(Eh=Ejp zTCz9_-h#5JmBXwldHqpJIRaSlF%%9N(ATR8ac&P{1u20+WDp%yMyEhNS9bjJaBd=R z2{J-{IVR_CJM(}M+ct(6*92X#LH&xR!S9jg7DtetcStiSgAKZ!7eRIW@>ZPpvbFkc zbNz9W>U*__13IQ?xG(p^gL!+!@w;nz?)J{vs;k3DYjjTUz)(fjUS}tnhf6n(E8R2m1Ddl`W*o(>-pmvqb z$C2y`mellvck)ozCVdH6vqffqI=6e`?9MG-=Qc$Z7|G+a(-BmdaPIZg44IwCuN68t z=>vpT-oO4=R`Xu1Ki!}DE~}IFU@U+)>Wka~_{|!>+J*v0Q*(h7y(C;+*|5lBb#hhN z(=O_}@t{MXq3yxGEg&eV6jZ#(Kb*!X4%H0%7&@iuoG7nEHKR4(%v0Nc0U82>iMxC? zXIGMT*O9#+_mCM$KWJ>x!DLsUdIj!KRRfU)6^HIjfG4&0i%7$pa>w0y(^K4Mn_ed7 zs#`x#CIFeAz{MW_QYgNxU(<(~sS}BVjSJ}Xj=ne%cj*oj)V!p$(bL3X?FT5tS({!_ zIk99RX)`=(DO0tN*M~uW=dDRCVT)d4F&i5CzS*L>?;fm*DM(HUU?a!zW}XJtM2$9` zWl!ahf_fRtfvFhPHgIg;sel1)lT<-6xxJd8%JQ9_Jw&fuv~^KBA|ywRog!NbR1n;> z1JvC?BDaFb9H^URChOEMfa_QHN09rDTc^_{TWBfdtz^26J#zJbC?sg8Q4`iEb32=; zFV~z-XjX^uynbBvlI1^k#|y+oV;;o*$O3qQR&C}1G+1Ol)S=2_Bm&nIj`g0bCXEjh z#`R2+-K+{4vS&8QGqP9iREsx2MbR&nvQMYLCq}>|`>dCukeKs?{9ZL8X=b4->NI6S?8UsBK8NHP-r0l{4+%Aq* zPX1M@o3qS^#46W|2X~VGz9@F(@<~ztvRW_e*Y~B*oq*6<7Nxs19p>VxecS-#Xl(c7 zk~Ki{z-tAVwo@{N#kjqXj{d1T>MELtK4&3v*aGfJgU4lWWepI@a0dHm2X6&zODNW$ zJcagZ%op{4ltzz^m=I}r<4`b#N(MQ9pvckd$b^b9SGokI@j_{U`9WuQ%$N$1l#;x zf^IfFL75=`YS|RZPzRHxl&-Vr;>NE#O$j$8Ke_nY((Tfs=aZVZROGnmuoTIyjIGmj zWQpv6_`o~VsOvTYXF2tL6o>3%Y4M==u+{3&$;zDI^GjL%XZ@N!Oqin$qN`+fz|r=w zmp+4k87OzD6voj!R-s%EVmaG!D^}2}>A=~s>J%IJ!tRkB0j21bdIX9j8^489!3u-8 z99dUff>4pSi^nljf3s{fO{5OgTute>PCU`gl4A|}vz2Bq**3OB*Q{BH`YTCrO0jf1 zq$M46kgHbbZA?3Ja`Px7DX+Dwx$CK3*&{)J%HBSoiYFih#QE*g=g<1Jo#zJ=Ld0ey z=I~O0#!Glv?e$71j^0;C*%(v^(o;wPWX7r9yHW!30{F9T3zrON%U34!DRJ&8@`S>p z-G_F6TIqTW_>HGpRa++Uc^kJilasgYs$r`=T^|nNB?uJgC;IY)I(Z+#Ab z3R#|)Qr;O;$<5tqr-!=XAhe(4uE`N3MG*uYi#~OB^g7*ZI?WV;0{0hq`YZfHR(P*g zbIQ2zi2Gi`sR2$J0E==C1!kG$mZ5?YR=Y3@USIn)(q`%so&^0f6hHZth| zGaUI@;P3{x(6%vC8-wJe<*64WyZL&5B}LGGZ+x3PVTl=Dw@M>dP=4wwSuXwZ4j>Ne zkbzn@T1z6g=zr@CNOguIC-oIT$&alhO(#e^ofRVfa{y6?Si9(=V&_ z3+6vb;4Bk4U$2P6&VVvRiZ`>-o~ntTv=5!dRQ}^c-O5w)1=mz8@KojRmR<{g+H>lu zJ$#Y1i*xhRzi<9=Xb{MLC`(xo{eVw&9=O^dI!uP~z~ZR)fGwT^ugrCF?`6Tpo31c02T2)(k@mubY%8nno*4(C0|oE^ z&9&}}V!QCXv1{8-+p)}Q{Z%6k_?p6<1jPsA<1f8l-taW);lLKWCwXUH4*8OEh&Q*k zgd{@6nXC!{3zQ$XdP{eDX2+Dn@e#tx^QNX^a zQuIORFd)=J2u-@$vbKjZmt7*n8OHS-oN-`b+tL}VmYTQ2dB(Q{7jVNS;^RFR@BVb2 zwo;w*`GYXaVUMgXlcuJBq{-rN^AP}MQ*u+2Can&5wAH#@G1H^2Qrm3jv-u=im$hNt zK2+TGr)WefiRnvH{1yK36}|V?1Qx0`pj%^?$s^SQC|=ZgBp544DSK9aa+Og;U3&_| zlz6W~DS)1O3xFc_n%x?Qx^xw!&c7YRFnurf0!NiPX4964KngN{=2z)cB|Ly+ht!y> z*@6eEj%t}c0R`T^}4C2#^4V1IYH;hl`)B^LQ%&HE4%eCWz+(r|Um>D8QADc0 zQz#k5*ildOGF)#``*fh;vs~H|Rc&n4iq-(Z;wOfsgj0`d(cNm!-`?+8js_*TrgLOZ zOZjz?kqcgK~H0WU89}@E`Sns)I%B+mSopEO6dbk6XPoDMo1HK++W_NI@#`@Yq@sBp2$xo(~!4022^# z(RJ_fc!EXOTKif6&$TW9^Pc?za>sk%B@EV_jGIHzJ|e4?NTYt~9|hNT{%U1Js| zKezKID;e$xPxrIQingAfW`*wHx2(`YYF_%!_FmMn4+rpO)*RS%A?f*A_ z;VoIho>7mK)63w)5Uw8x!I2L~k*g5pJ-j~w7Z4M|>7tO$>l(Lo2~qaG(7EiVv)44Y z_r-^n?3e79=WnMEnln3YVnoTHJb2FHsOKNQNCaY(a|@Wh5ai9M9GY8I&%7gdK=#?wooE&a}VtGNw4Ej(f-k6$r+Lq>K5je*Pd ze2Ik};4WNW=z+h=KOmtGt>(f5nj&%~6s(_tZE*9D+zI}Q+m5a~IEaX^XqT1dN8 zjTVE>FeWF?mH)aNXz7ieN>Zc3nbI}@wNYl%qeZ29Q!0#KI-9!iuep8os8q&2wyZ%7 zmH^eB_PJ|vFL@5$5yh8x`ggPJJi4;6-VhY;wY8;B`l*7hCUMS-&wdk=XHSjFpeR5` zeLc4*k>s1$CG`0~KlT>nbAr9539>}r+JSm~ z0+Hi$Ybe4Jhmre#Z6lJZiHN|iowsYOWi`)2ijWJ%&N-Dd1i4UP5CA%$PWHYP-Sz{W z*HlEC1AaIGqW_8a)G=$1Y>6HDa9>vIcmDPG=$=*;2}x;sA_oOW7cAn?VnE+H$bu-TT<4h!0_P@@g6tqC--bqZlgLkcq(SsvpXP zAeDL+s3A1bdsKPR6_=kklpk7}FC2=h{7V9FFA{jIAO4)gZ&g0nuN_npZ$jVLb8Tb$ zDrxh2DXpA;1Paa>YI&+vj9%_!Aa=pf-dsXsIyLn5YGXbppwF@Y+opilJ~61E?&TK$ zedx#SAmOXm+%&qYaxaJ@+p#AKz2>9SNm>dWEJtv+Ym_c{WL&Bk!3#k`5kpmSoeP>I zb53y;&yQU6IW#cI7rEnilD>ldB2{EqTUgDtt8T87tS*za0^ z&0s?6Pj`G`U6+jadHc$uW>ADL;w(EY21>DesOBFuZ-{lbF3YJp!WkFny4{Os1yaa% z+$3CZ+jf^z!td3DNNU$yzI)<3mEn17(Wo7g>Qe-A+5FChmaa~Oy{ZJj?>q`j<)ctS8MNZ{1xEP!B+3Hd2^Om`NcnQ8wMvq!e|2P5KjmS*_nz^Yw8Ob-2|in%7@c zPUr2M^4_}FgTaQ?$j+Zrw)SH4hCI-W2Fgj3Uj~s?`_1hEX7dI-c{;>;6Y5D4gAI`n zfVvtA7Mc3L@||{s?%ZC@)5V)|UgyyfQ4^Jaq`7Ul)NV-DIX7jx?FTU0rQIeq9-FCq zPoXG|4)s~QrGKoq)q(7F*&99M?ic0+>gSo7GZ?&+@vsgzpY$A3pueov9|`=E@W$3M z5%K!??gnVAb2xTKjiFraP^w^P-VNC6M@k@r#UUV&s6xDy=W(`?t)i0+1)L7(Dh|(o z9}m3S;R{70fYeblHm|f;vbJR>Us#?(BC;L5Jp?uaO{w@|Q?poEtvq`{La(uFK+$PQNGRXg5=*n&d{@;f5tvI6kk^BPs=8L z_(g?ET|&IMG+fE2W5xHDuj>+#DU!5*SCu<;KEd>BV@6IHrxBokcrys7u6l#=iWSvW z&lQY2mgaqI{2>t%K#*BCMT;NrvUw8)Q2RQG7l}dlhYcU+Be~X#9WU2{#9jRmt|<1H zOHl`JJd5Il2;b6k=Qpr^QhMsMjG z-fDlBKJUGCQB#wr9baY3bNcs~G|-3qv^HZlUzE^}(`iimsFV&YqRNtJ&6b)@8;j1m z1e|0Vw0QOs>hZf32ny5YGUYpP2}sbR5~a#-%vbZ&B%_vfCA-=(^>b7?1t8pmf>8w~ z5obJ9bnIHuDwfAD%fc>o9a-mp;+r2ga6v_#6HG&T-O4swN*5U2L5OxLfg+9I90D(; zxBg|d{=8p_=kGf4k@Kb2<3Vv3t~Rzwo&zRb#}GRu%dsP^*b6`-$UE*)PCWn-aHLv5 zRi`uDDkJhQx0Y9WLhx~9w=aJqInnvHTgwy`nRf;FX4zbgYA9JD5;~)Qon$^=R(rig z$5SkfjjnmSoyQ`7hN$iKtU8(}iZ>7ffvITU`#74e)>EiI*8|>Mu@Ut&0UAFJ--@TZ zP@5fceOawP5_tO10WaOV{H+E;9=x-lTunYoC1($K>@$y}kfHp9ni8o5sBN1n9|Xze zok!Lgw(Bxl#K{K`yRS-rwrBAR-&#`Es#Uv5xtOG(+u4KiVnTRNN~p;k_$tlTp@1a& z)CmCT+&>1Ow@yjJ(UmiK}{X?q2D@iv-` zUzLI`4Orusxb;f{KdJWKl~2+0Nj(>mk#=6%Hg2e5#{-b_P(qM@qQEe>RDZd*pky7_ zQv;Ts!&xU#XZH47_iyKjl_OzSu-1~lbn_|Ur-@j-RS5#irkkE(rvGwdc!f{gJ>wI7!s?M1<2W#B)%llhzcSpVrqh(8j4OW{lQ3-MQ|j zttR2*0nne$70xkB)wmG61&BT=il3ie^^X;B3*-dgtZo4UMACnz#08LPp8CG5zOq-c z$A<2cjjW|+QnpI7!SW>2cF~OU8jkZgw7}|hFU4o|C+|Cd$VpTy5ollSKRWjzDrNVu zL4#e$e0x(`oTS&Fm7;?TeSSfw#|z89Ph$2WPQ$7DQ5XdbzJqC7r=T3ykW=BC0t= z!uwT2Urwsp{Jhd_X;3M2bGJqP1)ctK!1XhFV|l_im{Hv$9)?QBw5u?n9HF^Inzb6I z{BxRM015}SqvetO<1&T=)%l?scOsiO%uWz_wyf@d&Wy=ABm?84e-x|Np&mJ!6l?vGNq z>uzK1V~d>91o*Wj3c!M=x1D$0d}$K-m(}_k==>NKwg<~QWOGt9tMfLj34EjX5_@n-Nke%LW4)2b)^Z1t|Lj=e)F6wO{kqD+cRB8E9r@;Hcg147jC zk->4;nQL!lYtX6cuEBwK>A8LBYpGb&a7wXyZ=(o*R>pd(;{gcgq4AGaP;6a5Zwz36 zvNqLNbP(t!Hf_B=)@N=E2mGLxWfvUs0}Y3sem3FyvRc2L<{CeADM3)S)IcFhMN<(6 z?Z=*{4DX@~wT!&t;2>YQY+_!DKV7*1fRDcAte)g`B2OCCb+tD|{TKv1&aQ&@3B5o# z;_KyH3w7{j!b~rP-Wv0EhGaUWi&DmatUv4q4svquonw4l)Dk2lcCf~2HIsA+Y`P1t z0bbRnf}NS&hD+&kO<0N=u#c`9)E?cr?yFeO7t0Qf>3;M;pD!JoUk*5X@O_IR7hbLI z&W7q!axS@X8-7OF5Gn~e{G=l{m5hT}NB^PklLEReBAwioEm$o zQT{k4YcZvXsVaBmaSbJvAbmT0gJM-EOynmbzO34KLjz5yP0IJuuXGc=h&zxdf z%Zu8`1K$YRC7HiaXveh6AOo^b!yl9Pr>95qTYIi60@1wHchbSa^^k00W1E*waNR;I z(wel)aq9sKFU1Ypp1DerQ3z&bJHk0m620Sob($aT8G~5PkumUk^*$eD!oPqHB*PsN zPq*x&fuVSX&UTMVF0u=MEl>+fB}ycnt3S`ejrXD~z*3bv zd`2W-KWKHN+vys__!-Zl6o`EerGQINk$))={$`DAKbEw#^CQ`RsrssMH`|hkY9Cbt zXX1odm6uz>l)QaQ$s!%fpacU>Z$mkqCrPgq11kaH(jzVAb7|_Ev_G5Ywr;a5R(m8k z&ie(+|8l?uS8uwTT+@EtfFv~srz2yR_U%)qmA2p1{QXgT;k2_{hitg0iZYMiB`M5D zV~$H_8-j>hQU?)#*n0~y0^IAd*RYAJ_vMU@crKnjf)H2T?9b>iPw?b@70%>aps)UuR` zH?S+JSu!UN`(?HMSR)^DBj6-i+-j)Y^HNAHQE%+e9ozPQTqYhV*N|0!rrZWrS~x1B zZ(_LbV%$D4qa!ZN^<_<;%J?RHb&G-@4IU7mKK^%Q&+=( zoI|}R$+!Gr<+B<%4a?*KHRG>K(>%wQota*R=&EdV@ecC7k~c**$oMLE>g8Ca;#VgL z`tp^NGL{p6#)rM#Z*l9-FDk#Wyo05r^r85Xb_u86@I&jmHuOhO1?sp@jmI6$JKQ); zdz?chil|Mg2$1MaNGIk}kEnaP4Zo=?3M);7VXNOnwEbg()0QQZK!|H^6;JjuS-Hi> zi+|5%;$KGLa_7f$yiPd$klGsd~MC@Q!tU1pMpX$wt2unT1l#v4orI znm2RKQ_t3X^KN;EY`~#Q$RtbIia*~x z2nP{=o~0zjy)0$*+p%C;S%KQP0GBEO5x3Q-Br3A!Nj#DS4hKHArDf<<^I+Yfc#4y_ zp+6I`OH%P2hyhK7T{|UdJY+cu^CWwm~>eEgIf$xf+CGj0y-_f)kJSbOR~LyLYH zdVms-P_9MeaI>uOQdp4;&Y+D7J*_Y6ZD$;R2n=2GrgmK2{xK=@wgIOIFkz8=r8eSy zTyL%BynQ?GixWTU8SM*-bpPP3BfR9@+Q%IFp~Bo@Gx=&eV3R4HL-j0w zbt|M;fdsqRTb-~hfKAaDyUlSl$>qe|ifK4l;F;J0^IDXXF|4AyCxDuVgrxorC3*)z zC`sjj%6oRD=nicB)-Wr}=hACeLDxC<#IOSyQBBFiiQ@yzNww$5=cY?IgEO^yB~I=$ z8i6^|>veM*4kiu`0H?!pofscB?_|V(7!{zNUsmh48<;+%12sJ&;#|X?Yqu`ldSJJP zT~;4}(xpA3&U?#XrOljk!n~-W6$Riz2zJ%?G(Q*ay>(mK6R-r_Hf&UA1 z;ej~$?N{Aa406}47LSeWsqXKrPD9=9SbRQ}lR^FeR6efOpG!>$pDbNxuaxmMIyMW} z#VK&OvITE9bY8dyrz{+x0%hjF+KG4U(7HMic^o`HxXZ%F6)R`BwLE&%o^i_J^uj@Z zkwuBf=NzPr61F|r3qg<;3TLN(TQ$`ti--bdOZ@_Sw+kPLfF*gTBXp~pP6pZqRXys^ zJj1b8haPwbKfqA^w(dnxd%V6H3f|lO%WaEcD^Fm{K&_SbWwm}0ME($!stOSik5y_Q z{!V+BN^Le}?w)M{vNT>fb)^fIu$oDLA{6GagYQ7@LmaVKbV`8_MMm;}m^m@IMyER9 zG#*~mkY<%NbB<~{JI(8ORX&s-%8ZP3=`fI~Bb>NM`c)}sd2e&}oD4RaZ=c3O+rcL0TzKpq10Kw?XABlvX82o&Fs8r zl*S`1J?r2~MAwmUIr3hAy4v{U$A>7aP#u9RwFYrsSsrihWZ|u5{mmIB!y0D3{)1cwh!AUyhs8w4g1}wjoqY9z(VI`8t+u8|X2C%7n?S zgkbTlQaMQ(K$_0G5Nh)yL#if~N~j&cIJd*31qACx)tM!W@sP*1s zQD@LqoQzS{vqcRRDO4I<1EHG`67^9yG$@)HO6#eOD&{IhB_pl^4%&C?at5 zsA^tmMaOtC#I1bI@*al##{plRJy5jPDJ*SBnhw0XfoT|jrYY+vku)ruiZ=ysQ(1Yt z9f!=p=BQz)lw%sbR`5;m@|?ptl|!8tmbL_!lwSFzr?W4I^QM+>j!I;8)UN9&q3Sc1 zq$&QRao}qGbptBD+2P>zGbphyn$Rx4T^3Z9Ih)6^uz42{( z#10s!%zV)8w%m_0mzy1XKbt&xO#2W7y40cr&*PzT9#OkVwzy8x?Di~sU1rQ6RGpiZ zP_}8N5)7HI{jyp=-9R4ry|+|7`tdwqbF%-b7QLx|BFQJ!Mmd4%n5N?R;fzJHbzyhw z?ib4GG>eMu_g1vw6ziu-^~{e+MJZ=Xxny#ky-{><+KeDh|F9j|f&DFPO>Oc_rAnuY z6oSBK)0?gK#J7|T8rhIu9}>^-dcY=M(%SF12XIP5(d%h0U=rX5Fi%mJ*e1Bj0YEVh z=N@r?qpWt?nE;@jasINmesA{Ky&n?uBkz68HhMI3J|B}SMbHhDvD0-|xc}=s2mfJeAfIj3}I$XyF)N}d1 ziCQXau1(X_u_BhCq*`mBqA#oUl4_10lPg)SfA88itLQA|0@UU$o zaEzpp+&L^awXHe>g|sM`rTQa>o`k{Mc?IBv0GFh%8=3Pk3XE5YV%rUu)TT4fTM@#4 zVYo*Hy%JXufG<1uOW{YS0NHW&hwNNz#@(@n9ctaiIM<$6JBL1n#H`dWJ)uQv_5~HO za4JJusCO3>*7qg?QwpDF3z}blS*^cr;76xfgC5G;c`#L0Oxi1`)Km;pyzT3DSSYxERb2>OBcyopu#VtqgbQNQOOd}&c~7UCFWTg?@G=% zr+Vw9-VBs>I~}keiq;c>cx|V5$zN9Mh2=jcSI8_xbH`BbbAp7kcPrpLa)&g3CK%)wox02V?KU7z3JMd%$s`(n?UAM0w<%27Jjt&g#<~GSmr*=*JGPTXFp40a3-tpC| zk6>F^BMaqvo9Y^|JA!kUZGByTfq8eC$G5l@|88H?N0bMhty4FGs&>JxWGXwGx{lrJ zV9jot6;SF4BBLUm+wsz{w)Lv1oX$pWY9ly^rXqNxas@uzhd_H|GW)Y#KLU}a5$l$7 zaMS{z^A~HR5Yw`Xj-7AI3O8`>=RGJKHGohICK29=dC_atpoaTAwF%dMYF!2a0i_nr zRJSFGK5kB!>BvBdlmg!@Gc&1A)~TJyKYNG^U~&D+c5}6Uv3&mMZxOZlWtWC+fs?G- zE89mU=xrtvs9Tq+t|K_Ps8?8#%ug=tdkQ*kPcoH3?9FhDyg0IH#CHTI+O?Q064%!D z2dYb8q$E2P3$OSUw^CJqG$K2TexFT+Xv*TPMgue zc-7gduWs35Q7=1noac%ZVW1!|hK|KLMkU3#s!k5T9Nze;V$;2Ul`&YgtnwM3bm<%E zY@%~3;Ks^cM^sDQvhL{Oug3^N=| z+|%Z#vM4^o3i_^eZA%Dzn>Mx{B2~V%I3~AS4QZl8hV@EO>Y$viZzr+*p2YGox#HBQ zS2#qiQ;QTY^w;@+1gb>E@U?|=uwdyrOb%gNNdncDl(#&xOs{KnXZ3YaD$YD~rf}2ezzMQW45%cp znFD2(vgx|{9L|oiuh+iBI=$T(8i=f|$WkssX}2UfDH=6@$93q1UttdhaQA#!tv_|Q zk6R24>x**&WIftT%Lox;ehFR_uK?bg$`QGv`_7X8O2MS0a2D8?UFfP!5T zmwNMTJGPB~!^!6(2j{k&kxoL9eRDbo8(jWL+-d+l8SyC;y&IAmx70H~9i*TJtM~Y_ zT7NhDANPqGT2eOw2igwM6s&`XdrpB*((TS$^q6=tC%@sQ;5xKirexE=Ju8jm4L4a^ zb31K`ZEqDxSAk{L)0EQkX1|3W-wRzJb(Nre8}&VZ6{TY@J6gL8s+A`mp;2JfK>nm| zI*HWHMvtD^{rFKLqt5PXwJSR{2vmC-tf`|T*IPdy6L{nMYd%!`*X)rGq}Y_|9g_oc z1-)O-FROL_IZhrQdSz9N^GL0FrY)DKc%aD@K(5Ppyo~(>=8G6%3uUOCq`czTK5IJ1 zg5Di}Qnw*}%ZsuOvP-3MTGW>*kx2C4rR*L*Q#e%qXFtzZ58@GDu}V`0nb}L}b7j-W zzvnUK)CnseN0_?z^=wTFYGN4MCbv`PGQx-hhg7C*^DvdqUw}etwRzq)Z~)io*b_Bm z4?SvDOTcgt)R)!zowy4hlfu%6#*9jtuzi+)Ao1#i3UVw3rwn{KdqoaW@lwS-rUa@J zQ6L15e9`1dp>Nd|AI;A!#Wgsl_#F9g8@c$szsg-@r{ zqSrW0o4UF$zSYfZa-)0FBI%&uAssaJX#o^G4p_9RW>d0Q#U_9rUdl}9Nb7*QBxgc@ zi0ZIb9)w}_ttmuo-hElE-@ZH_=)GFj$fVF^Nj((i5tkep9Cq+7kLkRP6XWNh@z5Y( zHzhEM89d|Qt(FMD@%mWynA^Yr(KRkrCq&7mI4X%_s4&4f-Y41}pcmddZt0xKrdUKO z0$ghrBujnjo;UfBj1lB%sSEE{wAPRc6wQlsyDUj|7c$1(}QfAftJO(Xxhpvu1ooZ7G{u0(erv#AR`P>ulX@RknM&Oq~! zd&Z&%67emQj4XXxk_{_Ck$c za(?#ZhYh>imaMnCYz+`hYLZRL2u-mu!n%Onf(u~S6Kf;pZ8Nc8O=v>m2AS7OABqdFI zl|*mHP>HYiq2FV2<3;_~c+Ypc^u`#f(10I@(oxcgBw=&jC_M;W-eO!f5`rFs>b_H3 zQ#Hrutu?XVU#y5I+nZR7!+E z=~Q9sQ<2*_jDlH^$k6P6-uvQ5THSpU`zg1-++zIR?8^#$?=1%-I5>)mwxr~ApxE2M z*>*|Qcu!R>;Eqij?_wPJe$*@AZ`sb;W-De$qy<`0bWVaVyGxYH9(e{3C)&1Gdaz61 zA$(=QCG-u>__Wp zYVRT91ahch#qYZMRO|`NUMQnh$r`>?eKv08vQ7n5zVx@wzlpn#n|*>VaF4a=RhaW= ziJ^}}m4j8AGwzxy)^*j;A&L)|H z#a2}N=Is%RE+eio!53(-nBMKtg{?ZVrO76T7(^wFk2l7Dr_`xOdu6+et!qC<0Y|u5 zDn6~^bmDR-jh{SitG{jTl4kE0znA2k0ijEUZ##DG?&B=?s+Kld*h?bMz{;EeKUGa= zi)|g8Zyxxukz8ieueh6ypdxc zltZ&?ujYAwT|kED)XuYYvV+Kx-6GA_!9#6MV<&}jLK|z{b$lSH5!f_jAg-zb2H0{) z{Zur&+(R`@YMtt6|9$?nckc8SrBoZ=f?{hBOp1e3<8>BK$8thm=tKQlCn;|>?xBmT zvJ6Q@Q_UuGP``OAT27W{oONq2s6^5{ghmg2k#75c6HXH~%73rqHJ+>guGXKp8{zVU z2XQJl(wbJe_1sCMT6aeUbrp6SQ745)K{9*DKi2OgIjT!uT0R~*-Fv>eu+v#M>L!CS zfrhw*pLv1LY4yDPXp%P?OPTrzo4unvz zj5Sk#IJ`wU_+j25YBH89FNG7<*#$>DtBr0ViZex|4mP5yIJaX&i4RF`Q;!I2|E2Qz z6?X%RT^}yY$-$4g$%>l&D1S5`34*!>DlHadCFX~kjOgICDYb@*?xtvP)YB=pA9XT{ z!zzcW7RpGAXY^8>O1#?kpV|@tg&&C=8X{|dg!^`3PR?j%ooZaNlT4K<#pIG4+ieh_ zlmRCW*ztkE<8jU*Rz8+&YzslvNxT~!E|7;Ve8+~Yh@eAV;T^=R*S%VtQ#Z(_yc69 z+I%d4kb)h<*ITC=c$6K=OZ$DHD&&wLb(NqQZsOG5n>mJTyEhQUD!e(W4 zG$t`O`;E#(T)~|7Wwoxqz4h)vaD?h++B)w9f7WxNQe}98sB-&N?R0*&H~v#*u~SD` zh)20bP#$tZ!%2i!iDYdt6kp^Nlj{X@in*=T0F4LHLird_=8BvVkkSjCPK)Be3bQq- z3iBbC^77C+*lf2mDGJ7;QX#Q(uTxDe=R85nfxRcwi&XPCfSu|dmmsUKLQAJ|A{573 ze?_%iwW)jL`$qMB6RSzk`?6Z`j~n>TiENeVpmNn5RzRoq?b`HMa@NI3*g`AaDqr?( zqn=|u$-9qJt%p!l)$}d-AX@|+I7w=T7-xg(WBZ18`}Dg50@U+Ks&Z%L#>cCwwh`U= z(5y?Wr=}ak?q1ym&sxGb7RzZGc1v;Ee@9Z3g6`MW#q^fY%W5)Ak>BRX)vZ4>zg&3) zUAc}^|0y}Zssd{^FFB>F-kiVm<*z?1{}JU!P{-Ko-{mY=p`Pj-8)|CXk@GOp@M)$3@9!2IQ}k0}87a`SuPY#r#8Ju6Dm3{SmapJ#RV2nV7|% zR={jaeM(}cpUG(HFSo!MJv^|r+~cJeX>gmwZ%3Q%7j=Y#fSs4SG+7>pMXdw^^ytt9>yS^*8XfD z7uhB~$9&(A-S*{`4vy*&74oRm3B|h(n^uDdBIu0G5mAMX4deZD+~be4RMVnSMHgtf z08hHBqr>2q1{87V@pkw}f5RUh$rD95R5er9NB9=EezAN`A38RtLZk8sZa{C9{%u=b zg>^eEJ{1JgJOI8LmECLB}M+s{s@j~>*b~RqWBvZ%- z7#gPO-ev>)t?kyX=urV;0ZVVTMyTwVxv3+Yqx=8km8G;(_G&E);I&mC z?Xyx~$uuZlaFi|IuDPq$5Jnd#g@ZSU$9>&d^Vq3oN&!wEmphBqKb#*TJ((k^AT>-U zFM5XIXq;u zhusRm24w3RTS-dqn|-g#bYTo&)V4tXjZYhb^RGEThnv|xLEloR2Qupmts=blm&~l<;`m$Po6L+nCbZlyuk-s5! zDAaL81`_}9fABa*eLK%tq;gY1-qG9PR!u@)*lFufZzcOxBIcN>P8n3b71&2V;81!n zPIa*dKM91viDDBKZ#Mdi(_E;6sPq=49nY|I$p&NSvTTC~)K#~3ZPA2wjlmaH1t3o# zx`R5Ji!Pv760(s2IMA{KCmE9uP&7CpJw0JKGpF@pe;Lp1Y?TvVjyHW-t@B^45qk=^ zBsmV>=(=Q03bDnhCw%w2s%vFzQ>%qK+PMa`WbUyCKppy2mziRsXFbWL7eT4Edyj)F zW8wta0|2-w6>h>K?@BWLts5`L<#kuBfe`EIaHQ1Stf;;Ub9!Rw*2YmH0j+e^f z|L?Av%03y&`OxghWsg}lao^1DHp%Kc<&tEi{UnubcY&LX@j^kCh_mJ*Eg=0f)NEVb z4ul+C0{gU*ltuSALN*L{_FT%GA3X>;KG&mye`LD!J8)I?dO0c5k3dS*3*x zG4(NpuFce?VihQeyBXSjhILEI0PV1c1*LOKm9(yE*}Yx}Vk#}y2$%%!rE_8}Q`QB!hE&|OUeSp{ zOK2}mIc*fU_C#ylw;t3lIt(usjb^R&4>t^j?SA3mH5DU7# ztk!RxSU>RA^q#eFcJH{3CB2hHTagfPe_m?S8DQ)%@vcvOSioY(;`D}K+s3O^=PJua-mQ~hiva;$t%b65TI<_RL6P1f?wTDe=>rPk3dT0?r)vlU}e;V6O z(E_61m(}{M6Dfn=H~R{pgE>p>TXEnDk2s#Nxh<<&e0XTe5`HO9b7{~){UCM(>fQWP z@hD03)qy>~erXLH$hC#ayf~c(E~h*j%E2~0oE>oQlIPP0BWaLl*)k57QxNG?sy|AS zyBLxJPK4?vWo!k>!cH=^NbU}le-YY=jZKJ)n_rf4Q4EVSAWe+A@b*sN+6=x-wSU`M zESCl2hf%;defhAV^lAeFZZqr@*%wo0 zjuRkc09%-pAwycJ-bDMpkKlFa;+YktQH`@HkwwU-a`$qdvRL7^_w1{_e?JZhMKjzb zlR#p&{#R<0u0szhYEPi=c^S4p3o$oDS~`f zDm|&)sy3fPy)d9L2Zf@yf5lPu9Ux^40Ym+7HeA#QgXP$?n!*g0}u>U9C)H!el1NY zaGDk<%EX1WFBZDvqTXf9qdwpE*6*E9{g_+{cKeh`=vLzZTU904f4M^iTEL-8$&pvX z&;jb;%`{o6*Z?>cztz7?cM}Kd##A1!I;xo+;2{6k1i-$u-9C=T8#dM0)Vn@xKfj}V zJM`RMkI56pk#(=HbYE+go4md=&0feS5GRj*<_M69%r`F#9e7&;vkWW)hOWKN|4crx-M#K3uxriv=OAHqa~|5sl{X7@;6B}0`>Mu1}d18q|0P(f1r%v%`doL`B_D+!KyWB z3!_MAv|Iwy2TW0a)#IJb>6qxK z5`9RK&M<_ha=2^?jg#aPs(yDK#4{=sER8SgNTm9R-SVysNC*<-ADwgAa4~H6E5#sn zGU;HH_MX|_f4W>tNz53u$Rm1zgh)H8U54GO8ZxY}y0tNMP+lq_bMzfV1x0MB)h4t9 zkm;>N<;ili=cK?^!JNe%V|(@jfE-uO`b={c%9oS)JBy*@{ky7GZ!7bogF+n?6}(J9 z3}K3c;xz6}o;pspe{706P-*D##1lUzFMSI}0=7!G zil=0g!U4}3`;FIXfxa%MS%C_}Q5P1{+N3x%LFwR3XfJ!pifIQABCtX_$Fzw->rX(;>R+sPr5^Ww^(5g2=LBSnjt?-d* z+$D?GV>g}isnlzD+aI-JNqJ7mXWC%NC~_u+g6HCa(hZ=J-RJ!?x#!}PYGrpQu-)~s zyHxJwrv`!XI_>R~gaC^QDc|1pr9(E-tr*LbKtXM{zFK0I#vc4{|J(oizyBZq=l}9Q s{pWxGkNH3T^Zt+j_kVu=umAhYAO1i8@gM*FKmXhR2LTjPgL{$>0NaKi0RR91 delta 50167 zcmV)wK$O4I=pc;IAAp1bgaU*Egam{Iga)(+pb|!w7D0wD|Ci63 z>8Z}nif|_ZGgVtu8)ujZMgr&Tltcdq_f5ldJ@$-szUh4Wu@sFw|H~8e+gYn#|F`B6 z2dx2rf0(8e_tOK)Mn>ZppWHkE1m~+{5Xjt{?Kb+#vBw4g%=5?7dTpVfpGnG79XFNS zf)?XttvaGeOD9ogwhvA5<&_jb!L zpat(su`-bAVONFI6`Hdpr;@+UGC&Ut5%6@_jQeS2yaI5iW(oX_A5ZIV3q5>o+yMpo z5?p{sH5=W6V$tu&aU(|vF2i(vf{NOF(l?{5=k^upyizmjm30%@A*-cKK`C&n|mn}2} zNCEkS3COR>AveO}Qp5JLji{EMgV$phdKKYM;#kK}?bUNROTFBV>i2HT|9Dz|2qJv> zClU{(b6TLTUv zq4K)R4t8OJ1Ao9BFnW)go0#-$gYfiEAnM1VhSa;P!v7PvivHHAU3Xf5R((ph$?7A) z<`0)*76-3?Npbi~uePZsSyVSaxAOG3Yb=C<#Z~BjEJA#9EATvjJgxSs*c@Mar%h+> zpz3{A(G7UyEEPN?Sav@jyME)*l*OaZC(YHu8>GjUhB_%qc3G#^ht3H}@WS+n12G=n z?zQQ904-%@)5TwF8$W8U{^`E1ELYSiJ6N8yAR_w=<-L%3fB{u6CWGn8x11LT9svRU zx4Rezl>vW4-p*qsieLd_vGhmgP(7Lzm z>}~>qLx*6Y*v)qlt7GN=lb!q z{`?bbKELMWZMvWY872~$c{c$ot~|0XBGCj3y+ZR z$>%g|rsv*|>vo}hyUJI6WRhb9cGB||c{|tr=7~{1##PCDrJ9X48UZSVwYi zaZ7)>SB*>Id({uBy6EF10txZX{CvBvntJIxC*MhXLs571xZOO|y+4+2by6lLZNMby z$J2W0G>6Ykv?v^c6UT~CxZlP1R84=|(;pT>Ndn2n(4#}UD~24$^6VjnnoI<`r}&Uv zuyl0l6mZ;!o%X7qj18RZ(5}tCC*S`@oH>7?{lltZH`^No(r^>MK^{dVN9eG%i&;)J z*88z*@CxngG)bfnHUqjHe0Y=-my3)ZouG7x79?p>p6-aI>0t12tnB21HoSn^8LwgV z`|rH`^=8$_*A{wLj+XT6#)LAYj>y2d?pw|1EPURvIacDCZYv`XHOlPP1?SmwT`7Mj zE~kU_K_v$Ly)=eXK5S)M)Wlqp8N3CgN9qrpen-4cpyzu6T%i+b_c+yIg95-_c!Ske zTClCOjSX%G^GW zLii^_Wm9VD>cG=+9vMiiQmuP1E^2}h8b29QrgJCp#1;{kShupJY=r}+(87PPwe}uG z7quVe9b~N}bPNbTp4N+1pI=kD`u7|`%>@&e4vEthG36hgvlYYwb^P3{d~gbWm1y^i`nLQBT}5y`)sc(`x@_u_Kn*}Zw<*!9oksB5_8)NbhK4JO)>u}7Krb!!=-H-`>7>c)&m zfddsbQ{@QrCJU#uHitr&+g792A5ZI#RhO@v$gKx>ll97zUh@740i0u=D6T7kdGrNrSSa?bD_=KwX^JvEVloZ33zf{N{@{^M!==|R-*T?`lJt8RaAiql8?VsI6elWZ-X z$K9MVGAmwHS+z(uG%#wd7=r@}JFVy##sgJ%HRxUjmK++>)~qP20t5co*++W z`0{7Z$DuX-=77hNs=Aj3l>EOGowhLRxGg`;p|S37R+J8M>A&)*N2@Sduyd$ilxKflPoCN#HLH<_ru0EEta1MLY5lS4aD8oax(3oflS!k{Q|WyDW8JuP ztKwFUfiHImQs9WmzfhIAeFTt1qvTj#;V~I09G6O2<@3k=C(cXIvp_?sOXKMT+Te%V zD04=kK?UAVYq-mMD!{CoesXD@N8se@rQYO7K4FNRQf_~@)rX=L^*V$x!@b;STanD# z`2_csM6tzO@7NA`75<>VB!JM0DcFVJNN#Sf6Q=*ponCKN9na5AjIsevtp@8#n@8<$ zALqVT+u~19V>KVFI6TiT_`675MK6#LrwGr7zs*G<>v3-v5w)qjdZ>wH_k-j!ssjna zO|Fh!UVeYM;a11{CIcNcXj-Z|C{ z7`&9^;~hJ_#Lu|hvr!sH#jq>i@Lo-9oWyzVp+$slJj%xYcv>%==C65qXHCME55Ahd z8WCy$lssW;)oG8Q+!A1NEd>)xtlMdOHGO1&Ifs9uNl=rcZ%ZID{3MDGMLvgE;BcU7 ztAr78>PUAA+cA|;_Nb)s(cijUYtTu{HF4#o_`Tfw%3XqBYn?+tzg*+5k0pP_>=jmW z=I-hL7(PHFC{=vtQi&cnK_CTEi(YLfH;PZEOIL77=MmYfb=ab!2tS_IAC|wqd|$P* zsVaZ4LrTjQH84o5OCi{#t%FN8MVbxksK?Q{jjC5q&Jld^7J&v`*a-hd}5Lu}Ir(>7cfsYP`5Boh%?VEoGgHzxRekCSX}OKLXf=hev|Wv)c?J zuJY`IV`z{m?j-pE%mK?WE1uxzts#G@7CR6FuzrM3_m$^36&@->;fZvc*%zA1O zsE=1P_`9!Z5fJvD?!(GBw?^e_&F{u_o*KRvmlMVmt{b>QktqN0KJwZE5WQ zHY+Nr>+ODlc(tH%rTuW1M)>{XX}z%gSBI=ycG7fHeYk&T2A+Pkate^kTfr)207A4W z=Lo0cd+GFK=`EjHS4Zkb{s=C27MtN4L^e+}tD;+ew0F7j5BJJQUVj+oDE> zA9en`qSt@1>8(am>fMRE=TU1moj;=dpMRp>g`fGYxH~QSwL(ouN{{_{J%LDAH%Trj z9o*uOVG+G~vQ8@AVYQ`gU!EC`;*n8Dn2dUdT|?9g3OuDjg8>y-+ca<6+Gfy0kR}9k z&W}ctT`w2+h>dQtY5&%(x@Ev037a&l_%v|9`hkB!ld8r+6S@03VhXBV)C;Q9+qrkA z+4ZcbhJ}{bDwK4E%&Ky1AbK-~y-On3`VqHY{)y$QE}uyWh15Wz5+6L@=q-4La-De_cPPOdK?ORKim2{X zuWEmV{vG9$MXUnIQWTc^<~U88Tc=wQ!AV{%cem9#9VZKsv|QBhw0s8JK3(OCTrOzY zREg4=OrEx`4CKvv%_hpS2g$`C;p^oQExJ5vmi*^wm3N2idjecVw5l2+&q=2uyBUiI z!1;7~J=kdF;kdtQ;6Hf3dWFTP8jJ14sX%`!&sC?uf%oT$ry3ZE+Qpvj5hITFE@#(sluIFxyK+mPTj-b#5+~pool87fI?G|ZA<>d*Q zN!pYwHKUK@lqI2(;J~%BD0T7Giqr|9INQVbNGhrD9ezBm^Q8g)wX=VXaYqZCC*elj zRS%A;rY<6N5*tZcML)7*-DB!Lo`aYf)fY||0hn)9lI^s^Rbz!_tMcwb5ZAqnLdDnR zb64K>JZsxHSUo`S_`By*__uf|2U-LHub0y;2akUsJ^bB44141({kn*F(Vk;)t8W23 z$0YZwQotV$*Ln!sKD7x}YdYAB!;Y|qNTu)=(s=_EoMTo&*C2a1i#uQ!sto`0_)-SQ zOAHkv#{zpH`#;Xst3#H)Y7hf3>6-894}6Y$%W!hGV%43{%hFksbkMWVGTnU+wFzpw#wZCUN zyJF2i@c`Pmyi{8OWc}AGs=Pa7-(3v($O(Uab*(v0Q1R?To_*MEBR_99-mXT~Xt2iM zM7VEW<8;7mUi1s5+nrYCn>uLzY0AG<|_Q2oWgQ_pTnsI~|%g_By>bfoHZvl;GrI{SY; z6oDm{xj2%2io}J7zPuz6W!dl zUBowv)eP_CGeFDwJmHKpJ9w8`s2qQ#fS;;^59@RY+-2gSZ&oNNI`IP-j_y_#(uMoq z)jiVPe5#OEem0~WmYENZ>qTA$F#W*tuMU|*{qMLHjETVU0UpR?4e;sUpgxHobu5(v zxRhFvIS92BvjeXBPcmfv-twiv5m61IU5#zJdUJb6QIFCTaTQ1MoJJtvEJc6x)drn} z$j??(JRB0c*X;l~5r=HjZp#Xz)@cvKJ9HJ|LUM4@UfQAgu=Wr<7{Xn5mJLAh=;LNL z=LS9qKR`DM_Vo=sT;p3RaYdU5IXdiN{p82f%K!D|1UrC@vlHh~DksWdEn6HUsHo?H zKn}GYw;e>jG!IjYg0NRhih_SX8XGt!30c(BJ*zQuH^nUht)L50CS-h$rve9H@Vw8eU6{xzi!7 z1^($-OC~Eq>(pKJa)X)|W)c7qDx+x`Nukxo`HqS$M2^2YC=FVxEG!4sec~lqtMvlb z4$cknu#hJRD{s8D9ybUYG%vyJE|Tn-lL5ETOWC^Gxh`CjXT);p z)(yg0vjPOqzsO&k6 z7QmnN5QKrLAC<+r-p| zQ!`_LoO6Yvq{G2yNE4TkGY3|Gph9=E6qEyhgIhKyEdjmPvn5PL8II;XSrgCCR+Q*M z!Pq8cCasinx4PA}%lnpPvi^N4bVFo_ig_uFX*qris67fMx(reEdms%S+UuOEF_>%# zi(2j3N^~3WY7R6GO=~ng`+>J!9kTir<)cdanw{~!^3=$AsEs)+kl)dNJtr;5xgILE zEGtQ{jDr(0mWDnS4XdJJE=&>Sl0JxBjOhlW!hL3a!+YQGagU>reC}cGO(X(cRnzD= z_FRYZxG;A;4xN3ocNKLDQ4Or#hyU^!oO^c6hulGE)zNhESB!20R_1KjrKK8=Hh&Zj zoHa>SR(POFr7txjxS9i8X(N^Z$kllS&|Iw!8Z7PJ{&y#=h71RPR124lDe)%HkEdQ# z)m3(S9d@nm$!X*;0N8-H$u920Ng(w9x{2pYG5srUB}Wn;ts9ATyK2?d1A(_s;yKsF zw%3z&-@CPzs9}g=n@ZtRBepb%IM;a}!zMlntQt^tl(v!trBLm{eOQDG7=^T|mgfed~=$l@l+ z+-1)}>6!$iAnlz_XPhZtQd`)jYu}vbyX##JWcl&5ULCUb*~B{-CHhy@yH^up-`i)XryM;<8J9~n)g34Cho*nsYM^s3I zvp7LNS3dT*g-gXtCy2|SFWIOv_oi|UwWtV!^0K$u_Xs` za9Zs&28^XB4m_CK`6yl=Ss1pcNC@F;t48LlY&D5`Hl1F%8MmABL;GuGXM$Njmj*Wn zQhxwaQF-{-c?z-wGw45_*2~HCtG=a5fh7(dFV0@L^48bA^bTK;?n6^|bIW;a+0O47 z4ZO5mnp(`I-AJg9hTjoIzLMzM^RAP}jNuTkJcX z`gPWjA%Nf>je`pWne*ZG(L&eFC*LLit$;lXbdUt9)H}pg?wdTZ2k9{vfSo(PFn{TH z4Z=P{*vXbiJ>vsH3Jztt&|1}-t9lP`=nm30pW$eyP;gx)a5WRink15L>)G+Z^gJ5m z?qPBFN!2MQ;1d$`yRL`&G9oRDCFM@Po>uuWFTX4%5oxTs=G)Oavo4?W=tY?|SSZA5 zZ?R^0ol4QqT8bZ!TeB?Z7OZwzbbm{Lw+HsB)F^SuK&5Ch- zzy;XBzh4zaauc;VS9|eJ-8@;YQJmcH{-Z8`)>jSUtJ2INev*3u%S~WFeSf^RRF5@s z7x(!!cKhp3!$q0Jakx3WCqPmNPO>L% z?w&FkvwY?tz~s@P8AsTnvKEh1DLgUmb-whKIUT`F%jKwBU#x#>P1)A*v<;~mneEZL zkqH*>KWW~pA+b|a+4>vt&VQD{y>~E*%I_D^m7M;g(tNi6DzgM_f_cPzRBit3^tHW; z$Onh**iGyDmm9^nW?Z5aw@90_d7<$9xUpW{pjSo?4xK3T+DWUuSrE}S<8cVSG^>Rm zczu12o>VFM_+kLE(z(4L`LN}-!witslLKJmbgx8^wCNtC%O-Vi2Ys^dzAKe!Z1fb(mkOPJ2x+cJZ0{HWN(mk%(y@Aix9OMS*AAD~jLv(JV0T}os1Ee?|n(N$44V|HVH=sUh zR1N?url7mo1Uv7K`+t$$Msb~BfB>w1v5Hf%LBZgu(OEN0>;$suBH1SFG_^XU%Bl2L-|5#WS;h>;4Y`%1?@30-J`M&LjXSon{p_1ats-!8ei zI>ZDW-a=tdZ+|@Y*pzwa&#glS&K-ymzW&IAO@3tQv%4j&)~cKInePD(x(NP&Mah09Fn_Ke?;yF~VHrQ)zH2j2n_W3`!;qrk@j(bKC(v1ZG zGUtzKV0>fw^GgZOsl0i+7MdCfI%C>eqt`$i_$EZ0(hllh6Kf)*>+t@0I$vqef?0_$|c= z@PF-!UEk8+3|MTCR(`gW4Xc4%(2&OsOI11`aK?dfx(jqG_2ufIH2^(Tx7jU0Jt7F@?%X`j|4@JteZ|vOh~{9-VKol6L+hkk&mme z!uGATcr>ioaW<5Sg>H~VSIw@C*^WGpPKM$<-TL4{4G3@3%_4=c-cjDdeB)%hWpp>F zE`LdvBUN>e(nH_7JSulOEv-=7x_{jzUfXd@JwG*LlfxNYXFHKqr*h?t6yP6@?~Vr5 z0Rp7!7GnXbo8CLE%pa^ezMLMuRDZlD_QBMPgflp0<*cU$L=7eaU|JU8RbtXT$gQRs zlUC{ZA=pc|oC-hB0sn%^ay6>jdCGYK6qd5@I*dk6=N>*8j^d45dq|Bi-hb0>Lx~w) z^>S)l(+JmD;fX3~aRyzwKDXXn>-KO(fsK?)P;dg2m&r@gYx~jR>j*>_&|uj9D5<#7 z0!?w|_jJGbg!P|b-Ify_x~?;jp6;U1{REUiD-bNLq*`g{z~#;WW#-rC7-mAjPH_RGKbn2g^MzWP<+j z$%zi#lOrth@D^?by$*XOAO+2+Z3kywCM?Bm#ku8;!%F0TT|zH~_ZGKV2U_mJbY7$D ze6%U!LE`gwuB}Rbx(&%QuXn$+E?zbL_i3e9UH(gDkvx{54KNi4%zvuWIcr`vT`jDS zV#NRibp_uHY>l%&9lYfAO#rCQ<-La6Ijy)9-f=0DZ#k5n(m>=8d4Vqv_X-@rAbBfO z2PXzqzvI?c4kNy~*yjk+>6pRgER4-TUa8RNR6UruB=aC@t9rmgi6H7892CxRFQDm0 z%ozpV!A{oTohd=R)qh}}s^AXlFZ~=UUpgeG8^@2Q_1;|h(mUlS-KV0*8XRdqG?ECl zJn{0JE=5)y@zK(>l_zT`Atrak6)wxi2Kw}GyC7yD3KE)))%$Q{(0}^1o>7O&FKSy8K@I*| zjW{u&KSbsjUmV1t@%Q6Nw#Zes2}P|TEp0o;~TbnvG ze#<;}5ICW#AH!)fhkowEg5+@QweNn;ZLhB#sb;y|jl1lU6rPi!}(cG}ljy z@&No%z9d^%wSS9$f9hLs-b3j>!{xJQ3(LPX321L$eQf0lZZp3vU20-X*L3rx*lbc- zSOF;zib8lgx6R^YLUL-H@Yw*}`iJt*1stu~)8X#18e)}9@#AT|w$Q(nhu8MjCDLmq zxppTC`lYcP=;n8#9IW$w}Kz-LPJE|ObIke6%DrLCavh7z1Qe1TBR)MxE+FF~w zhoN@Q3M_S@KoR+bKeqg?LC7gJF@t{{s`M&qf5EE3R@DX|XtWH-A7F)VnDk$%$0Nzr zc`ILfRPaCvMJMM_KiaGV#@Jj_uk(H;whSbz*&2Mkzh)xN-rkL@e|LmA$gp$J^L z!oA`CoE1<{(sNUEL}!Y!(}nA^L*{oc67x(I zdM*iWnxFx!&RuKbW8O>qKu|lE`n)xgsL|VVKUv+JX}(;{uGcQjn(MkPqz12FkHzAjbh!+rl;NfL`%+ z_)x5FU z@#UhjTEo#joJX?`5+01P9futn04JHP67eFx>6X{QIQ>O7AU+e|t4>`7m69jd0B4)? zZ+!FNL063Z8E*DO3jmkz8_lx~6I&aqF`c_vDXjI+^n!c8e|$1h?s{+c6N? zIh8<&7DTS{kEZjSB(nuaB^CcMFW z1iaR=K&;J8nH+0v#CaCV8UbgZ_t`b`p>UyI_91P(4#Juzp=c;4$@ZG!1pIQPvAlkqBtAFj4D?r;mW^tE zE4QIzd)%sF*-AY$aoR|MJAZTPL09T+7X3`!noKZC(z-V=C=|JP`#`S4ec_K{dIqu= zS#^{UI*mvuO7kL3Ypg(=B&GF3vjie5I9b~XUT_!aJHTvF+`+Q!3g-y$a&_Z7FVuZm zvbGAXnr1pdCToG;07;!-Z_u)g6zf3$nWPWv(|m zg-nddX>E_Dh!#(s7M=3vl{&1wItECW?MDZ&1En6ux1dM|q5%e<%L!&@jh9GD2l)fP zdHI(_O9yCwpWdmuMiaLYLfTSHbsf8Xr<+d(TJ+ z^bfbL_A74HmtXa#zBLX&=UE-uBtSUu=!vLaJ8gG}?VRT4aJh!N;Z~;pEu$N*NG86-Q$1twydxEH@6$T3Fi$;|7Le=L z1o-vmxkA$abYCyUIrRYI3^}t|oT7n))zhX}@s`GAeTv5f+06^AX9wOvQ^!)5zV2E{ zX`im5W$cRt@DS6wWt&UjbXX45IiM*--Bo;54nMc?!CP%g2y=Vje^RHBxv3w-c{iHr zD(JkckDw)2M0tbcasR~ zd3N_*tDM=AFGPdOf9pQ*?LevC581Z!#mm04Ps2&d=Yt>`cTVGa!f&vV7>DkI$I`H& zbf@=qPZ|38C4JcYn2#3Y`aK_ZVjl&5`gy3(%V{B;PY0IuYJxbsr02fJS@hji)^`$K ziUO&spZvIq*Q+kyJ~uJy9u0is;%{MT{h7FwSG=9J>uSUwOyhC7=T@q@yA(nY)9MuV zHFT7z!}cM6r8ubQyXY3CxFt}P=Qb*I-2qnBT+ETUYcsP`5?}_2*l_8@wC!QH}FddZ@?X#*aVm^hc+$Xx`3iWGdxQ* zt>F+(;}@QmxCmI%w5C4yq5hU)GWxPWbhV){;1D#3Lr)w!ArY#goox5p!LD=ahg~2= ze`KS#4_VU6&WNZq70<{vP1L%+Lb9ESD3`)W3DP{enfu}iI^5#SM@`#(is(@68#=++ z-Ad7uNg0Yr0Lo}JomVwb@Z^6~1Fx6UL;iAlAk7(Ghw}lXH08cr6eUL7 zPEX$v%z3w6Fur!QCvEZ;mx$+ZX(iPFf6R$)(zu~@Ep9=trk%sY?^pxes#!mCZsJ(B zL^Vddp77a<;^Hz*7>-%Wk6Ce+P1+%8oI#Pk3O&N z$frF&$-_PNI;xe_0vS**Y%B96FjP-v7gn6XIop4jPkp=OmM<^#kctIIjv^_hf^M%m%V~1z63SESH|3p1*Df5vY)eE9dF zW=B&2Na2w~izNPqQeZ*gh?Aq=3?p61!K&ruRQuR*uXq&q_!6jl)|n6Gfqp!#SH&iM zO(Z?(@Fx!2Bf5g>oV;MDygL01qEp^cpD(Ck=faI-kL+J{S|Amwobikj>)P8kje@5g zmni5GzFoR${9CLpD%?UEe@C}N*YQRUuQTm%sMGFz+fHB5aji!Jhf9SM zmyDPD0Z>6((45&@w+G7rdXxk;P|izDr&+=LYN7;}w?s!7&JZ=(R9oO41ciD3cv`QD z&DYcN;|$s5*$AX7JUkf^)>5e5eVVkrQKtIZw;s9Gxkm1h)4fHle}Y?Eg-bo=(|*gN z;>M$0EE#&GxVYfEZd^St5t_A4xSxNmkB?dzq=iShV$~ap1o&+8^Yc;*hv%oS_o0kH zv%Yt0i@V1^Z9*wLlzEB8HRB_y07m8HQDPgd+C6AvV(=4_?Vf1YYfZ_mFD{ik^Rd`fpt zt~364TCeVF{o3;Zfs}(Y+#E%mnys!pI5dydGFcGkN%d*P41t$)hncxT|m66USFjh z_g1-dS$gr4B%ps zDc#LSuIF0@&R2-^T*SwuPNQHO<|a)i<-`-8?+(n=HlBjyNXuCL5oase=;b=*N>&Hb0#1mR9#;oJe+e$Bnt|VtE*^VTb5||Sc|}D4ITa4QUupp6 zz4xb*IFYZyNh^2<7_D2p>;A)4jZy`$hmtX%6OO{%!4(W*NxC?_x8bgH>Sz7&wBA_$ zQ*0RoaJnz(0e~Gx% zt#vg{eTD(;bw%HS08Qk%70-SvDw*Zu8NSnCK3>gq)2B zT*o;+f&GqwboH$jxYv9_Nt0WJ>$W@4vFI~v{pfItt1KN2WorIf2Pd7t7H(MM_&^q-Xh6&nP z5Wz>;Mwn!$0dpnP0KJL-pj!B2(-fPlY?Jyl5Stu7>afs=e+r;Z#<>OUiGb8u%e9N4 zYSpr=cBqZq{o2YIFV*)s?F4$)+Pe;aL?!^oqdLb!Fx6>w13niEwl4|)e>xZRb|5n= z`F8z4r!TcKjbT38Zn8v>l}aAa5e3K+Q1QClch#<_@CzUhr-~|0Ky%I=iCC+P|JQvc ztt25pH=l12|20;86g!YW9oNujAQs?4Rm%llAx{m;c;V725q4all zSQFMC)ja6`It~r81L|^Ff1i)c=j^sbgUi(5>T@qpft-U>n?op4abjdPA@g$jyDE)l z2M=(`Q;yfKv-Rq}hA;ID2L%e(N+zJ?JH+`oAoZZF$VnJ?9k%uqHf%%<)eoEj?Sd;% ztfG8ZcN1Mr5y$wrlD)ePrs*61nl^V8rn4t?Z_;dvNehjopV3FBe_6Fc&1O|h1UBiR zdwOId#P{0cIWA7-rdk-Wz_rjBEeEv3eJHjF@A#-_#c5O?7A~0{746|YJE*CE29gO% zTx=#vx^K}n`e*$>r+;c?eAusf`D&q5XLfF21gu>AzOht#;A9LJ0;_`!1Smo(r!5>X zRb^FG3s*v&n75Z=e=ob{v2moFhtPN>0VDXgmDYolxX3zGM&)9b%Kg@w`opS?{6RiP zlsunw$DTFTGFUn2_uSi;d6w*`4RlYlcs)!Mg)5IMPXsESwVig5D0!Sj1To3-L^4p( z<+oZdEN=Q$wVVwgHb|fTqhb?Yla%3e6IK4;Ct2Cm-Zm;qe=ULNLZ~*jAjsZNaqb8d z*PKL+k1j;F0;M`4I*`*HLO8YZ(Cf;*Ish{X4x(Wn;Bq9XxcG256WzG8+t3BiwA{*ct8Y(Kat8XnwpeVQkkh0k z&(JiRR0BoU`TbZ{v7i=RV`^n;bo7OSBx}Gcx|dxKk|!@VYg%qcxR9_P(w(Zw;0@Ot zUU=)tisS?WLsy1MJw3guk{eOg6(%2w3bg$`HNx?^f23ybT)NX;o6(F@(V#42%7!|( ztAOo%084O6Fu6^dh`T4@GjnWCwIfFS^|W4UW%<+dS^BJlJxKMYR7f(6`A~%~@(7$H zKC3g9U^D_1*9vIML2s(1#1*@1xLL17`R{FGx6a%&>Q$w2&7q-d)W1@W6;&L_qYz*k zzgJP;f7eZ%-a7r)vv|Q(Eb#JF;^1&cfMDaEIxuA(E*a&iX_+=whf8XA-jQp$OLy@2 zw&d4T4fF1hTP|$gV{*?!4!SRrwZloy-{=bgxBTzZ`co^5-_=0pw*j1zu3hImtXS!U zuvZNgCRE9cXR@SPz!T29&PCNVayyRMYW@V=f6soYl-_Qash`=#Q|x|&6Sg?^!LX0?mSw!L@Jw<6Tr8p+QZK+!iRCku&l0ATok5n%(ij9R* zTwxIfKEQ|yYqb=qVIgmEtCz>ABZaDbwpShn-PI^h>-q7t-Yz2TOG{UAngd3VH$`)7 zf6cqbM^o>fYpyr?QtE=B>%P2>b!k{AWKTeKmdap8!hNy1pCaXJ8&toaq z3k-ysXMiAo`QWZN#TV8iJge*M)hX&af26Hk^CaLR;H*l@`4Q#cYGvPwQjbgZQ|T9n z4yKXaS*R)ob@$grKD{n+?&>#{P(Lf*=HT< z%xabg&&(WIy;;7rM(Ti~=#ay!a69;J*U?;T1RPjC1tPfv&tuSc@v?dC{49ytf8KLi z`W_brqIlBTiA&;V-DR!hib?Kj0`rX&%+%-Dc?CVW_{==8;|EXtsFht`is?^=Q&_iZ zhw63PF~ZpkC(Ct04|>1DMYdwcxxAv&kyGtJm#LBu6Ik!pY3Kr4Lf42AGXoL-cBj%aU_=TDIkYVTykT zCn0$hIT$O*Qk`VbNV%@lauAh^=z5}Voq)+p$db9+U0DJCnd10$6aTue-|Dc$UQ2iT zbPxfz&8?jlGBI?qu?+LxBy1IG8mR5w-i!r<)i= z4)9!Su8vMOfdM(($>(%oDY~+?+p`K+c5Q!?Wem=MURdX;&0Ese=08}zz1@$>@yUr( z{Q2lk8yc_YdMr2a&UM5Be}?klnyqwIM@|Rii9+Ej#+0yBNo_^VYEZ(9R~;AMfZV$A?k?FdaBbh+*K~MD9X-3bN7u)f0_6)S0M)csGYXA z`_b{me6p&|D_DfBu7_Cpglb6lc_*?17ul|DfOFaZvBs+RP}~A8+cs@wd%xlXvS=(_ z4`lsD9|+V8&$Ymas=prGXS0O;cSo|wiJ!gdqNj_h?20HHt^V{z5nVY$f7*+37aBLYJ8Ne9x+uZX#IYH=bV*w?Eag77W9aSfgNG8%Q5NU= z$J6?o8oAC7mOt-x-fHO`wt!VTKW~MXI&t~7C4cMWry1f}^N=W>HUjv~(6$onMuHu? zg^E!ghC!{sk}+^vXlOU zlhnXY)!sU=-c4jM)}_dgya6=TAoD;zP`mZZya%ScCW^|p$(#cLf-DPtiWXZPxr3OI z90-S?7JmG%r}b7$KfX3sh`eq_DJXih>NIjc+ZNsDeYcc^y_^E=LkO6+ONbfR#i4Pe zwyIc=K$5Poe^*tnoYmW?-R;go7$VgBpJLL&1#nEgDN4*I{!D;ZbznI+^~zM|M-Wo&So*F- z=n}$l;b+&an(}PAzm%VLhs2`pK^%slb0)^6Z^Yz+6Www;mAJla%f4r9ghq#zOchx` zme54?=qLB?f%1=gw`!u&xCF88IGw`Oq)eFF=}_hjT_Lf!?3mAxGEtJJ@kEtf0#};M zD11C6f9sCePWPJ$mXjm=<7vIOIlox-+122`tV_A4PiWMEWe%+hmWulE%wcL*yY(lM zThGk_*XWjHgd%o*s+Hsge$J--(djCJa!1R0l;KY*Y5xQAdy7wDK_qSX8G~7UhYTNmm0sm>vl$X76~NJ`7J!{bOT7{Ikl57j^ht? zuB5TV#x99*b6DhZI|d5-)%5nCw>&o}o~i0zL99-J_*7vGP0!E6vCqp!vpSgNv-^6( ze?y%i$o0-+9>NRl!e9WMKw`hVQ;USIVCbnbM#|3bWPX>GjLs9yTTmDJ_1MQ5Q`L!R z+ff%uE=4I8WpvZdjw(JOd&xcV5gt!|VNTriYr}d2LhlST#4g&$cp78OUD3( z2&|7necm@w|HyU~&Q*h~^s0B}qeAV_SZN-dD1$thbSa;u11PXTHOyyP5OD0hD(1nz zkoH@QL}}6NDSnHCv!px z`d+}~4e3J-Gi~A1t5$==vbTZ-!5=eSyU;ipHkz9aQ)0+rC%9_O?WP%!`Kj(wfg$g! zDmUTqvcid+euD7f^uL4xjAm57#-&~vsDEahqy<+Uy83KC;?}F5`0X~?+^a8*&?`Sk zE}%`#0>bU=>8*0&ZO?r;qc^Xvg6`BQ$8pClD6?;?eg^tGpKDu? z^T_5S;#RC6Jt{i^;ohD76BuUGN@X}5Fx{IJ7vH4Y0Wl7kh84MT*L_>vRfh+la7B{KO02YlET(q2kiwbP!EgyS$)(Hh7@P8hw%!kXn zOXC6#N$weZb84TpyEV_Ddg&2APNu}E(~)?>uR{FSedXCF%ubWNsaUMmw8ZNK8LHvr z0u1oX!|}QF``iZh>c7HlUFSZ6OmTOm)JzXH^4g zI}$Wr>1AG|s&*VQw-YPD{umk)FGU3{nI#g$P?nzF*nhF8rD~SQ_XmOq zFDKJ4bjlHTIW!2fVQ(A}Zu8YQPCu&glZe7=$!IO zrYu(p$VMmR(OuT+7W5kMi^pL;*Lw^3zo`ECep*q@FI76EHfM%zcn_EQ1iGkR&K>}n zEEG$%wmIxjt|_bXXn!q>1G1byJ8p9Hu`QPmw?kA8U3Oa(@$;NJRNx4MV_i^z4S9dX zt^D7(wYDew1eY6))v(Y_yj81_yuxw9XC}Wax~{Ji?})Bk4hJ|m9vrP?ZzgT$D}^a?vk3OO9lYT5x!lM)pZ<_?0+x|NbwE|%X8$lAUplw!&>*a z_aU+u2{v`EJ&jIuZ@U*rs#@K7mc0&5<|IPi&vSozK00_cYj+jIM$~fp%Mm*eO4OM8 z(!FizMXrvXHQGtaRutEM;^Le@7zu5`WtD9NmG4gMn4Q=HJUR}*cb&=?4IPHSLYKn% zdxSImcz;@d+no8!&!<#}RbzC)uMNo8R3C-7S++`fUbnUrmjN>#{NIDW$uAVyDAPbn zUhd+Ojw&bw9!`pd^@1kVc8fyXs+6}Xv+#k-P9TAr@8^tbB71e;|mW<#W zJ5QX*IqI3Ea{m9#m2kXjr^Jg-lt1>|B;cS7^{UDL6qC3SDToQ>na>=$tAJ65mT6S?QNQ#F#u9m=w-G)aC9F=1Re1cgXpG{!}X!W+$ zSbvXi+?>?c>2yqf$P{&PvE;_em{to%w|0*8bgUAtx*xP+4f^=>rA|1w*5MoNPn2HM zZCe|OYbq`>ll!kO&{j)Q_m8Lb4{vc_KE3KwZmEJ|+yg~nUS5K5Wk*ZPbat-jo;r-z z$+7ilfrmt(Q1QW|1Qz;LtVY6>+a&r~%YV~Ou;-MBR>}P)KBW$MI!f|3EeTktc;Cc3 z5u3XTI(8e#{OcYbV$#>#-k|&>T}}NBiimTrc_GyUX05eW|GG9cPX)u+=G0Tl=0Ove zIkM6vZE7Nt&eVN_+pgiwSgo8tp4Lm%`pcX1-Z$-5{8>xWuKZINsTQH#P`yW60N&VSK)AODx7T?nA<2xY&DTQWk*xWc0fDNM0B|)!0vG6AfE*t@xs#u`6rj-Fo1mY0 zTo8O4q;61~!?ndJZVhY5UR)*)+csrc%zt2xKc3dhIsU6dR_-d0f#pDXwah%X7qnU9N^LDND9xD>b-SpoZ@*Q4k% z=Duew+m!kyBjw~~RZ4eQ8Af+BNNm)_ac+U6l^y2$@wCcI$L5PwyC37iqk3K`5NY&I zbn-f=_p4*FK1c^iFMm6Hd!CvFa@CqboF}*uuB2In3-vn4kmI8+4x~MJ*%j@6Oyv?d zcJ9ake;vg?m5}25eViVa=B{!cQc7@8SO>jxk??h=bVO7W&XH9jx{I12Mz)dc=YnLe z%B@p~UTet-q0u7rDpOves&Q3BZ>Rx~=M%`dOBIPdd!th2kC!ZO2Q35IcCMFPZwFp~ zf6&#jBT4N69?dNkqbB%+?Ea&K7s9(&UB9$+Rq%8@OwT&N^rHpBAS5TPs5u5aD(D+!mtsydb1?PCu{83B76`Z;+X`ZQ-8z@{kd&0U_g`r$K`V_F}+*Z9crR$b)#} ztyp=i9G51V>6V1m_$Q}kU3y(xOnV}K%u&V1E>}>xjI%FKp2Ii=b_Yq^HhZ$du)1cB z0n%0>JU{jVAPSWu>~fR-)x0^sz=*$|*4y3tgXM>!%fX%eo5;wg1T$*`*H1NLAAN+X z!+MFcM>gzy%X<2^6*#*^3eU0)7EWT0hDO(_d%Rg!>8=*4Y7^YAbm-8nIDF-fk+ER}MBFFw5 z2F$L{wiEuT0hX2m{V6S`rE0M@5Y{l3PW1K1(~2)v{iSyr9H8WaCuLH@_OW%BA8`j* z1UnSQ?w5OU2TgysZojoS%9v#skb%=BkfPAL<4>GU$E#h;9e|>+B{JJqmdFlU`GR0f z05z)sN)=@jZA;~|R~@>3DS`_<$Dl1BgsIGmrgV=15tyfzF&B#v=jtb?TtD`I)i?Wj z#fkdURVqOvT*9@8aOL`OMl6n z?5ptQz!P(dcNKOdxUHx8Kr2w=)SPgY3UfXm7yE-1>q?Au`@uoe1tK~X@19O3pP9t& zPKIs!poED5j{Erb^Wkam^m9<(ekq{94Tg75!@Ejb+|stydUPLB%ebon7zmJVNZz{v zTNID!!8ItZ9^JS&a&AjwoRGu0XycaM( zGtGL|e_UGA@Y=I#3YR_IyFHVGQ>+~-men1gf~9TeOK5vFRE|eg!PKWKE(!+`^SOgA z?w3|8=gc_)Z58Y&XgfcYTQ7v5aj648j$dc%uU8$euZm5&&%(F1sTlRC?tIVNvDw77E+$g213*S+A#3Q_!cTH(J=55$xM6f@JIYKFjOd+>0` ze~1!}4srIMEtNxpBOU-N0E0wOE*Xb0s*ZWB;0i@hRqA*=1xkLbgQRqT&&qRMjqjLL z8JB8gomWHSn0@@JFC{xbb6mcu8tATu9El6c1+UvgeVx1E>|D9Nt>JpM(5kBq@beRJ z)14bJqy`A9O;3x-uI+7k5M{O<;cqFOf7yW~*Lwr`SuO7$PwQ{)w0(77U7w8lB}k#+ zr!x{Kh?%@u7jV_!ep;$3XBtRj*Qr`%o9h|87mi?R&jB^5dn@#I$NJGjX^`aq$JV)E zNsi-6c1slhTn;5l`(MJlml^(fT|Q@Ks;V`X|m&lY6;nG>nHE^*i1dk1R@0SA~|SG zS>NnjHHzD@d#mb1OfP-;3m4G}e0=6p4gJMg_;nIrSpG{feXR}v+TDc6H;{~YgsE8C zQeNoXljEl*UK-@|NcrZ#=c)8+e^IqSHLf#1B&g;2VqM50*9~e4I+bl}r$dIB+yu6) zc3K8_4l{A;y|==U4n_;h77CxW|(FaXSvSp%dDeCn|!_^g-ubi<5F?h$E-I|>ndGKAE&VuI$V~?B-~z| zs|U?jE!`g~6}d^tL5dIWbW!=Vpf17WI9)vz#dvIF=-msNUC%SrSfL!QkI^!jlPQ>p zRoYncnbz0T(WC?=HUY*}&f}K7-u> zh|+pY3jlpeOAn3-u(6ikOmXliP2X!?TR}o#JMUCv`!gxG_)bMr=|SG<99?}Hz+XL6 zI1%YC$48tV?`M~zr(<%}YIJ=%&1?;otccRZYpj#i*1d<~+P@|Fe=ZLNCmd(Cp9td6 zh;3NGhISX0MoyWHC+dF9*2Or7wdTKwm@a2y%#^owW@NLX5>E7#r}AU9>WcyX)jQSC z3z(qtBwwL=KQK9oO1*CnClr{HYFF4c57s{$Vf~CAval3@IHCv@nf!8L1^J3?n zJj$l>4&p!H_Mspme@aFUI)w?rIJ{?HC-`?5&#vbEUZ(KU#@ovzs$lTTto}FAGG250 zw%Wr2wSbwX6q=)JJ89Q6M~Np%;?PoV(Xd%{(a|HfB@MfXHj-S`lT^aF{_1bN?yB4P za;Tw7rdGC1LpjpzMfK~js?*LxDMU*i-JUcTiQ3d_$Xo2!f5xVlDv_o-OB13_cSHpK z68ZkLr|6gyM}QNUyS#_fDNEHrwN~2FWgo?K@Mw0F;M$!~3KI1wE(@~Zq;LQ)Tbar{ zbuuT|d(#C|i^}WL^=nU@X|}9%wd1Gy_canvQH^%8`+zb@j=YVir03e$Y9RMGf2`IE z%YQk?FW#w5e=&K;O-F|1gu~6wc-qRfshJzS?d1@I- zA^i&}^&YP^h(XTPUYAOinwXF1ktzI%OrS|7dt>=_vKzsSN{$n8G!;^uVqM}crL!G% z0XRK}hJbqAjZBP;P923OE(f)#Zb#}tAw&+~MZ#P*f9bA$mc4>(j+A@BA7>$GC}7N^ zMysJ8t2JJg&sSewT}RGlP{&XipUCNP0(_I-ou;V&=;pu_V1*Je&G$hS*F#T70jpIu z=PmVU7>l|(OF+|8eelj^?7WVx<}9tUfW4EN_RU61`S4CT^pr24;G{*0L?ci@REyM1 zd8dnwf6rl(^Tz7mddZQ=Wvn|>tEOC$IX`lfYH8YUju0#5K1zco0iPm z@N>bRdI2jtNFcSb)A}*xw`lB=y8~d6-A95WcNPmSZ`ii>e+48f*gB0599C6XY(lZs z=cWyuj#O|g?q91FU);bi9)!(J3Yd#}SQiedESICxS-~2|$dtCqx5FzEIrOdPUGU!S zf2Yg9xSO}W59n!*br#1Qvl{f3NZc@;|LFR>!sA>7m#As`Y9)rVC|J$nH#9g%QsOT#zsgN7MhVslI~lcFfd z>LYiM`{p^M@Hiqx zWZ^)H@mGzC9t>^#oKa>MEQc|KBns54hD59-1_koQc@zgJ#!_p-z7$*RjkhLQ;S^~e z@(ZcK^8=#q_u~vkmDjh$gaDul@E!GVq^v4ZK@QT0zIR%af8w92 zTu?wy{-h~jmMH%97PzmVMe~o<$}jbd_Qiw9QMuSUh6zPY_Cf&e&Z8{zYrQyla?hg| z@$#P3uNfm5#i_#LAdqMGgng0=NZrD9g~vb>6$RIpZdLIVC$ws@{gkYFYS1C#y;=|0 zEZ7x}te2x|-m;PN0TP@XzCQ(Ve-j-kQT1?CiC@`izva~izkZt*ST(jnIp3=U^nCD@ z)sv-|khD|1VAOWo`_ip)-s?ug_m9;oe~hFrEN@?lI7TG{8nhzeXelc|#=j|_w4wtT zdZ}~y8 z04`WK*|AQt77ta%D8IK3UuiN@hDxBCRQy=2*UkQy7kbEw0yxH0StNz@K_={4;9FK+ zA}WI9!Ql_8l>(qD-MeZDf0bfxwOhSqcL1ThM1}XKL&0QuQo9;1i$p&3(_!CB-{SCe zP&@Si>;BG(_OdhYMmgVj_~4v-@&Y-wE@G8;hD6l^a7U>xxXUUosiP_DTIQXE$)$;- z+TW*rwsYS4dIHdf0(k0F6f+rz&sl|fOX1P5;ry{$e=3XVi!Yzlf4Cx<@@4WN<;n(| z)lCK%Qr9-k(s-1lSr=s)7!r&_AYuy+>$B5I7oyosl+iO~DJHm;rIXW`i$`&Gi)ae? zsTz#Qj!ix$k^j9~9HL>b2Eg3;+Q)0>{@k_!pWsg!l5H!gN1VsC4 zU=<*&4Hetrym=7If1v)JTKYJ(Wtr52SH%xGS7APC9>BKNkv~@Jk4gEhkyHZZAx{m! zCjgB=+;*0;$tUvmKr)DviIPW;Ab3_l?0HNEQ3S>WD?h>1v66w+m_P!N~ z4Vu~#^*POKQyZxc4QNvN-dlTiLLSHBz)-}GFdXsc1jl+&e>N`jw1{P{o@G||!*xG4 zuORcU6mO*P(|#-PVLhNv3O2x-H|QJ+-cHVEHgJ-H)Fx0_y6fNk{D&{^YQ3hS(pOGw zDv~)Ge`&GY)wI(i?ctdzDgiEhK$Ip-!?amWHBO^rwi!vEw2y1)js zb~kwogZKrkf20_rYF5K&DAP$QioJ5EhNiD<)}qK#yu1NeUV=s`Nb4{allpIhBBv(Yk3#@<&6}#?r@AT6e^=|R zvKYT7R}uw_K18ImrG@6Q_HYYbi8W*&v3HhMdrGg6e`=CW4|NMD7rwj(+h9J5=Ppcx8XfOU*g(n8Z8^xaMf>a5_&#>FRj)Swq~44sQf;4J~->8rsx${4#3QK;Yq7 z*@;I`-@tIAMF8=`rs@sQa>#Ys1ud$x62AIH!yr%TJ(tkELxR=;#zz9~ueutcHqc&jW@bUP|{2ggQ5D26811HV`;o$@{FgnRkvgYDJwvnQ9V6H8OPU>+&awXtx2^ccxPX0h5^Q4kf;U z=$?7=^E^HE_nGF8xb^BZ_piN0-l<}#!`u5CumaNA_w{#Bod_U7^>sc`dizoakFC~s zc9}#YVy+st$Iuj57Fup?_$>G^*mM#I7JMh*V%K}3$CL-wAa zN4YFrqDVmcG!v-?;dAvJ$TeM6G@VuAi;)4;fmFHCJn7j3_Y~sC3AXpPeRE-VVKsDi z&TJ))0*Cf;`u_kFpY8a8jJ!%J+6Vz?d3b~m3(dUxi;#0e=3EG zqD_;8dR*4FBdHvDcAhX(U@p62S5l{lbu6TEF!%yJww5)k(5owX-LK;r9T~Z23^EFe}Amj+vD!jgHW4K9{`fcOajeAnSEBuMy{FI$i$|* zWKR?N$9CHW0a43>_~Y{CHM60}THE~3icVp8Jp@i?$EG7>=kqwWKF6j3amaN2$vo$0 z&WE+pT3$-zp}&gkl;^p5i(ud5FaSAy-lgyJ0!am$U35RVX4wiwie&AMe@Qr(>decBBHgz2Lkq~v6+mzC9Z;c)IS{y^1>VUT1P7b@e(Oj|_)Kgu~Y9RaLsN z_a=Q))ri9}CY27F+FLbEnM?vx?S>9@QD)&If2`K4)BIIc?=d~~GKQK87x_nD9OdJQ zMHgB8)_YE#)Tzo?Q45i;Cw53uld2KM0pWNZ-a%Z_p{HyP2LM#>f3tCtTD;~^rbKJQ zTN#FUc8x{ftdU#<;CEE}OSYw=VAnA2OF9(^i-Db@Kd=v`9M;Q%v|Bz61-g2JHKL*@Gj{C7%FU9n)j*T9mH~WgS19}IL0CNwH zeOY`cwRGZljyE6s`6GsK}({YMt@z?;9Q#Wact+MOs0(vS@O;MS>CVi@z<7O zA@b@3PYzIDf0r*O{q~f~tP1h=I~+Xa8I~I+c|#TWW0w8+5#|3>7TNS)o-1ug{!Uvy zQ6X_ziOB&)YL;$7(uv)^_#miL>jeY55_FtEK(;3H4WK%!(jE^rkEEgPPv{W4qI&v~ zghQt}n@ZGkoVY{hlr+n`swT0Y&V~}*fdYi+V{rENf29Xy-ME_3ud1SYIH@TsURt%d zU6(BuNJ-%PpUyaYRynTBQ!A4$7ApDDgd}NQlbm5t^X-zx`bhBqfgs*0i{XpyR!Oyo zB7ITb)~3q=)k%97r*W-D#UhnM>msFVbu(U4V5JzxPD!JRS(%ESJ=C`9YVC1;3XtA( zR?4#Qe@|s&5A`sj7dH+u%F;bP9UCgDrSto^6n9iUNMVUn4IyU~ct0FWZ=xJ=&~p|H z9t?l!rlP#`?i@!{*~)IJv-N5XoGMwZ=Txpmb6fz0BL#whCcjaQIgV@p5w~6{i{ooP z(b`fLxHRA9O|DDz?18Jx(IL=^_tMlNBy+D2e>(`=rm0QvU=(iK%ivO%K~gbw9AUXA z@=HX$0~K=At&k()oyMcRT)mw{Yl-9f=A8o5mCJdwKCICJM4Jvxy91*Xh|f9PrXh{j zJsF(ifK#Z-#>(~U5=LsMwsxFY@{Uuj1!{ArsROI5zqA9rF)2o+0TtQ4DINHu@`>+> zf4lVMP@}{@Unvtl^}kZAjOa*Kvq7UopvLvPAog(s$K5M!a*F%Cq@<#NQ-Uel%sZ*i zdB-_AJe8ek3}BnA56h5%ZQNeYOiVA1KYrErJmg*J+NbIu3mNsGYu?)({GP{V3%SyN z_+_o$6%{6Uv3OEk_+ME&(xNT6gDsiVf281~WU|x@(a9v>mCSsn!b#F{l6zt&$NXcp zUReH%kpw(VrUCdo=) z39(xLUj(sN>ovL3J~>hJ3l`y#=cTNx@0-XX3Cji{(0~)6tMEPoSx$&Tf0^pGs1tiB z$~A400L1v|u-%%6;>@-L*oHEGNetrs6r;49p?v8+;$NI*ezz)3DR&uJ${H1IWHtJ; z(zurL{;D@BFjv>2sBmVn*^r@@848yug&mh|GB%ZUY^2BwRtVaDHu>r5%nxxdd%Y7+ z7GLce|GBH)tCjw%W3!9&e=?oZK9%(2#DM{-q$pjSY_P+=EQx|dK*i%de}hB*c6O9iymc#d z_9)H>jx3gx`p^GZt(Q7%`}QG=-h^GUkSYntA>r6U+p=IALjxXo&f(n^zZdwVTNSWx z>XwiN5fpI^JP(jktzIJmfLK-&U14x#Qf~R3WwUr=0Y>ZkO`vtxsqmH6SnMJ}w7*`t0M%j~;|IEeCiql-;NX=z0;%5$u;rhWi#HdyG8rYS z=|)_fO|**{wK z<=qw?L|z5Te=n!wqsoxF4LNWfC1q!|wfMS@?e%$b!mFYz#ADkDU{?o@%^7QcI?Z7J z!2TnrMp6wZ!gU~V?TN{**Pa5jC*LM}-K+Kc$+uIr`q?xks?bAnow}d_JXo$<`kr+8 z&`ul5Y|uj8eQ%9KLZk9;Ys<{0|GgpGtMxazQoni-e^(5TR_kmWb^s-gH*tpoWL7Ls z*X}uJLrGMk>`3-*nwB{nl|v58wuq4Vr>lU2J$EUNl$R&z&yc;BQDc)LDk}|0#BfUV zn7TQw_YK+QmDqCZIFr<+tLC^B4u)j(pgF@3^GWL|u_{E7w!yb1%9NaZ$)t;y2$mc} z)&VvSexDV{k0UqJgpzcTuPCXU#MptkG_KU zpbAB)3M734Sd~sr37&f^bfZ#Z0Xj_A0BroK>wfnJJ|9TK))=xK3BqPIdcu`%v z#JqqC4q+C4(M7(KU_h=l5mg|j9?~`R5;=kvbIunieZhGHs#7)H4q^^X_eN}IpOQeP zf8viMhe6D`A60*KAR_d&&z#Rlyr|s9R*s}DTC9+SLtsO4Mu0UOdN<@FXv7SPbKec8 zz|Qb!=X!%gC(BSBFF&6$R7g|Yf`uN+N;K`a@5Ex=;gl*m2H}UA=@)`{-6w`Goo1CK z**e}|+k@fFMaM~#zw~zCsS}JE&vDB?e~>V3W0%q&q%S*)9pDvxy7c?jo>0kXZ=@a> zFl$SCWM_>jC^_Ji-h^@I?o9kG<8TWd#AS*n8{z1k+1I0VRn)ACva?L#a+Rcu{(8~PDUl=6x{qWtl~fAV2` zc^BBiyN^>AQ&s7ex`D5;6mV#|4M;hz4G~Sj;|W7O|~0xjY^7)KtyH7YXG$o^z3-ipj_7J9c&(zzz6Ggh8PHOg^nS{+7 z`mtK+uN&AudrNgiwcM3z@Op`j4WK!tq9~EBFlHqWl#nP`CtpSTtbK7HpLranQ8ih} z=`624s(RQodK&GHl-e?4`D){f-T3wy-^^m6X=9px#&4$f7C{EV0=F}udeJ3^GOm^=t72B<|sv}UFlHPhqPB%L# zN_b`4|5&X*ET6u-IfL%p3Y;8wa+>NG(lRAyDMAsHx2xOhRPRoLf0&jEd^;V7t0wnD zcb0Ig9^%Y0NQaktaPBDJQqgfwpCA~U z6LO-HG57d&692G#fBm|B{pUI$vGLIwi~J@rKPY}-b3YSE&Lsy@Wq~L?SO7pZUv`%i z)OjfAOYm@pEbyO6erJ{MduTw)%Z-|U+_R~VN0IJWe;zXZ+ecqsD=Lq*LUWEyXq+uY z&C6|oJD7po%gcFK9^M)i(vqrsZAS?H;l4c+&tRgIh3CEPe?@+nBx1edh>_a8kUrQI z{C66sd7-O4{VN4&5@3xi$*|9W!Z*8_&f1*2rW!K%)*`4>^BAs127VyKi z>;XaqL~sq+Hs1Uj`{r_TN0Tlp0j+7RH(0JiKgN^o>J{O=PxrL&{|W zp{t!AvVz)A>(me#^i1*aqX+SKp9nPhnz-Ykh!*nb2*wK4JHF@Sy>5m;IEN!W=>l72-T3D5E33CnbF%HHfd$}ga| z0p{3z3YG}qPgqI&_Cln5URUC;SzkYy)Oysama#sVj&7?KPD~uCoyh&av{;%|HA5#} z5_m|tpobUaMPO4I(iqKO>lXAsR%`t6<--R-fAFHH=)=}4&=`w4(B@Of&ev4kR8O_+ z`0YiuLvJatiP8?kRaI8xTPbX4;2Wd~jUsCA>^8*C^8S963}y6uOiY@_^c<*Ha7?L9Py ze^-p^2IGS9)#4ix(H#x4TqBRHm^TsgN97Y=SU$%u1ffglC1J_{twu9DpBJVBeDUgd zsRVR6h>~pLT#CIbAR2U(ad4iBsC!j&NGUpvI;U^3UwgQvY=gj}ldSF*+xkrr0vUSe z$F;3z&hJpFh+*)eL78o`|DX zhl3GS1UAOu{G+$83icKams%j&HYp<=uyUvyKp+vP5yO*NU){}AlPT`hzFJCgf4%Mr zuH)tCJtd6%Os)V`?ymausJs;G2eoF4+_Z*($*Yo70T63SgbCY0@Tl2J{>&L*7I2^b&>eJ z+1(pVMQ|`|nm|Ji%4c%r?m?rL<&_ihWgDDLz6yaQ?dHxL`W#cDa;BVhT0|7Guj-ZY zxhchgji>W4*;=(YboqdVV%5i{sL$2c_RfCJ>(F4h^I(9orPlF})p~IQf4`w1uno?Y8%HsXc z>9F^8%)p}GavcDiA&BB5Xadl4tI0%09*azqJmz2^-xX2!loID;mS*+UIQC<;{c4^{cwcHdt1;)E0|m&93oM;{55` z{;;;;(YAccakOEjfA1yyO&+q{CsF2nGrkrF zYu6Y-C!_@q!Vt%+kL)jYvvW3;9ig_?FF@<>>^(7il5ZqYK@Hp#RIhUSOhd}!SCoG# zrhoNLi8_RFy#^c~ybGzp z)F~dMGY8)QsX9!NX+al*x{61$$}_yMs?<}lK2+Ur-f7&oC44Mlm)|_WaKL%M-|fvi zud&aqfFoVWKI3NCfa{}uw`$P0bxArN-XsG3Y>E>+e*)QA&npEfd1v9;LtF$rxr4!L z<)I+RkJb9?%h&Pg*xc=rlCbHvDhZ!f6nwsf24YUx?AdO|hSa0sUr2{K_$nvripyDO zYBN&uIqJ>2+_%2w)Pza$zD^Wbf&RArPQZ&@m`|EyEAlQr3Z8eqb0#YQPqx6fTK(kb z!>c53e=wa6Ii@epl6ZMH`E0bKD&KW@5u?hrWGAJBWt2~jx{fM`K!>GyoWJ9}6)*YJ zvmq&OQ2W2CKYO+Q6s21F8G<&HtpIDJj#)tI^72^npM>S@@OYtwyu~%sSd&adlN`+Z_d4VN+V04J3#sz z->olFRfJSXpZD|M)k=SgQX%&KWjAS~HVUdV(bg?|s3OJ2_YSrM?XId>ud0Tt?;bdd zf0XjbnCeZNtKm%JacSohGmoS7coo|WN9q4I4HdlHN`g~h!e-(;9ZHXeWj~G3@?+jt|LV(p0hR{H*PGux- zDO+b<30N1w*c!&#wCkF@>Sj%*=WU& zd9sJ!@`#Sea$t`;JEOlX=C@a~D)>(PPyneD$az))obL(>%fk*JRY3AIOk>v76WQ&Z z6w`KUBjT{enOY^qsLJM6!=biWe>MwsZ3($400Xuv_Aweo2Pog-D>)r<12&)RZOkeP zVs}ToG7&_bJsqc%xSA1sJ*Vof@pzud7y7YUf8@aQbw#F1noI$9cadko=HcaOHF>Ud z2Wyy>)tIl|G!eQ1@6I%-Q51rA+5>dv;KR^zId`3cZNnc$(Mm@jwHYc^e}`Lp?c$*A zzb?mpy_2H#0w=NSzd$9d*p@dITi>9yzME?0B5W%zAwMd4WzCUaijD7iQ~gs9^`B!^ zYG5s!-K6E>eBSV>$19hHRgxn8&22*T>1 z+_XCe019EWdC6i+T~{X6e{IQ|Lz7wExNJVDJzZ1=&uZO}!0g=bD zumFNpQ+qk>Pl{3baVslugo@M9POS00ABWPYnkVP$$7;O>eZItWf0Yg38?a*nusxFv zbJZeHrOhp?qWw5=AZ^m%qx!Lea>Vz80wO6;kyle=+}Zjqv!7*BN{l-=9JWqWsjFT$ zQlM#B`FM%5edgy!_DAlPraM(li+-!^Opqo&0w*<{m}l`I)AZyEF(QSat|Edlpx)fbiW15bfY%f2T# z;E@`-TT4-!a4%XFeFG#DC`?abs*N?q%Qq^%=gv1vDH>#mcUiK5D?dub-U>(n5& zq-dD2JmZ;kBvP|MkCycnw;K7ddHq%$(DG7-L^d8undmiqfApSFP7+CoznAwAgd?&t z&=r0Nvdf45_S11=HKzdTjdW!TVrn|PCP=#}@u0}%U2UR)kPiOz$7;O>eM0#H^GZ-m zN_)`Ad7cVpIa4UJTGZU-5P<;a*CEA5B7g!wn)0&hg<4We z3Q25~ph-!T;sy1T>Ju#KG=y;8fZ{x#1}12zl>ki zjdo1=1}S@|Thmr!kK1u=Iq3L3BOD73~KO2k$Ia4VB%X(s$>Z`7fz$QFw2rqLgp; zZ&2w*hqmZFx9W$F?j0*>gZG#k_(Ce!+S;tL_L6g`W&2G=Ck^W<=Ks%0e2XNdZ<=o0 zY7mZ*e=1s?yaWbttK64MmfbqkW)3<+L`P5Sr0xw(e&Q)(L2W--sH8BX#9&`NYkPdx zWsuf!!+S?h#wB$cY-|hyaCFk?*U&y7S$->}N_a|h5a2wg(4fkkEL)7ZkuaZhY$p?` z^oPa9bX*ghsHAZ$)pE@7O@Q_ccA2Ry)!^Q~e-6E8k_m6VT@H&ZiQtFRF+W!84{x=v z#=HZ$t1BjUU5a2zESBReD=?@-X+s25A(^4OWho^ue$E?DKvNh}4(e^IIuV4gTL&#Y zRjYnOWNnotgC-h;Q%-!JY049g4qJjE-m7(O8e)_(e?+O}gQX=%G~S4!&(z8a66@2o ze~p12ud4{~>P(n3S4pzRZz{qv*Ji^N6~Asm;2o(ssX7m8FAmx1m8u4xgr2MD_Wt~5 zwbGj~|J`bC+a;M-cuGNQ5p2Nz*uoSn7r0K5G;P$d`~?nL zRaL6zqx6>=){Brwhz6sOU39QHw&`$|R2rqpm!bE|%x3@vXGQmP?zAVyY1JH+s6xWf z-&>HAeyr9D%YO}#brmU1S=5B`4TCN8q(;wB+fOE!G9c}S_TWVAx%tO;M5|5BzXe|kG$b$O=b zDjRgi>Di!k0vFvsR_hPT128@m@F=UPgiDT&w@E>^9YMRPyH1+6MP3Z*Y$DR4HyMpT znSk~_+P%HMIEMsN!LKe5mZy$4p}i_=-~Lmdh#gA$YNRmB!mA|_1UQ!L{h|Mm}v zHhxGAt=Z;$G@>{(j?%E>e^)ENEo#0c4pbFVdV_4i3G&MPV4cy*$olSDE!ZoFA+zFncAIorAlk0H8o$zcQVaK>TLM4C}S|1B$#(YkwmimY+EG zsL2PNP9EP&(d8I|hnnbj>*T~s@)-z!rF??BNJ4N`J}mj}WeszLGvvWQUUbRXyrcR$w3`-eF%bP)ZTSd9#a9 ztVF-k-t8ljByZhjk@=S7szy!PT_6VlszBk$&tX%1sbzNil@@4J*=TP+_!b)Umw!*FACx@rL(}M9 z4BuW#DcDL)2l`jzm|BP|6E#C}lwYt&X8PBPq^zG_79JZ680?a3L$K*>gs@TN$9 zt^-8jxraq}IzRm_b?vE@mzrmk5*odNYbkH~dZZ$=FR!)p5g&+H?#?Sj@^wG8}<9gYWVYq zntC!{T4S+??|(@;FTe~oha@wO*qgvrS&lZ#(C(ydu#)UKMcdrQ z%iEyuQB}xiSsGD0M`hrKuIv02mwFRu0S{BbH9#8m6f1f)OWVAi;2zl<<;QCM^&sNc z@T+K1buSNq0&6M}c;)-l=|y3baK%dOJnQP%H`Itm_J0N_nj)Hz$yShn45UqLQfY4F ztgbDZrR=sV3)($^PV6^kk7!7swvRmQ@@Bw$K(>U9b~mBDjYGZJwj~~b|6^bEsO70K z*Y#}1h1wLn2RY$~S4HVOy+6yrJEFc(>Afy~l=_LZ*|%p!ooLx? ztask50uhR&HQOy$l5EDNW#5thivtUtV)uUXCO0}-{JA5`Q9hyuow^aTzlv^n3b{3M zk$(!TP6MkJe}&8erItK&-MY0Um2OO+D+R1^QqgHRSnx-(I}_P4y)Kh<;%{7Cq(Kh>L=L+aUwqR&PP>(dXcI*BYZ9D;ad%f za8Q@6OI7m~_09N^6#piDSl0d(xNhEr4a5@Cwuz)*@KPx}6e&r$8YSAi0gkgdAb+5i zOJz-ij--lqWJkPa4ysve9v1B}gMpWgQg>-`N=NI>7Pks4Q9H?w=WoW(-Tt7c7H`Qb z1)x%wtgW|xdr#=~JmtYDOQg!ns!vx)zj?IfWR`gb+240k5CCv-c(;E8hR42Rk{_&s z)C>;t9Xc|uJujOR-;o&Gldi-LAl=lEArW~LAY``!$*K}H4s_@AIf*%onn)mRh!;ei;!95yMrk?XVakrRnwlOwzP8wWL~AMW!*W6x{n@b?SGm2RA%-D zd+q|87NtNgqs`dkHTnR_JEV;2KUV8Cwg0tRkHb7IbjJq-Ft@^!SJF5&*P->h*g-r> zX4Y{?$qMD)jv#X|Zh0GkwSh%CY4?&nDZE+id$T92A%dJK+dM5dZjv%BdL<)$3dQQR zg%-5a5nJzfwbi<*G{}k|RtkDBy3iNmWJ6>9IIHYK$M-+_8xg`!c1KKF;V zioACU1lHpQb4Q}|B^yfN6Y79di9AQ4q$8<;NJ^3irj(S9xJgw|wSR~zXM+6iP<~O& zr+?hgBZ!p{+T0SH4=uEZO4dALp=7lJF4{{b2`eh=Y9d1Tpr{-Ge~E6+A7~mIWc(;% zpSK5!l7wKbw6#oBMOHaa&b79S6pLi;7=NtRADHLCzxEdU#mugsGliE{w8H@UBz=rI zMr;PQMhAfhyH%mOo_`WLKu**`yhOs}Rlo}!VB|QWxAz(rHdDGPsOxfg_;{4k)R@A% zEedB2@5d9cD!Sz3=pLsRA|I%&$*G^uRQt0HW!0$u*=Vdqta^TuZoMwi9IR@(H}=Sy zatd-?r?k7LG(KOk2&J^Uc2ydgES)rn!+ICT`^RdPKY02zjepVE9OtDjgiO*o!I+#V z;M7#0c9OS`WXF(dZvh^w?Q_T3P93D$u zTwU1-j+>zUkRwNU&#rXmwt0ZERkis1hl*)R7*+Cw^nbRLvT1A8NMcLs!mD-?s3WNi zgUcm*UW;5^%CUJiP)U<^1h|+01cG8bdNc} zZedFm`Y2Bxoi(mX-RSrrD}pnaSTQekMH^XB0|4q> zhxht(B`qZipHxV&x-!($38pf5Vfvah;7`xS5Pu~i`4LBG^dZmcbt{TBW-TN}qPBLS zQ=#B^G)Yx$5nM@ks}m;Ath>gCl4N_?3CL2W<6l6ed_49D97Q3gMu#u6&Vj%Mr~6cO z=Y85Eve8xl4Km!yCR14iaQvwfiUW8u6-wBYw6XDswo1|f^mVizC_h%~PdTuCF;A5M zA%Bxn2!eOdG}U4QYiapt?9w!k|FG3$elzEry?Ot|*?LO-!*53R7j#4~ThGeBtKCn* zCQUuqnWe@Z9O#=Od5Y+rEMEuf^KQ)R$3+4oED}d4zn^^@qo}^1pl*@8rSPO;gi?vU zY>7AE-AZ`|S=|Ttx9V2YwhhazD2UaXW`B&{E4w>w6gEIbwf1F$0OvvvKThI%YX93u zBwX9=qv><*OYq{@3*$$$Iq@vpSxbt&aeLK=F-%mO_NuLGN%uBNMZJI=`?l|S_ zs`m9uSwR6%Rp}*4D{n2iWN<1EFZRY{(ZYMR*gF7z#Uo8&e_}njCkVAOT`>*OUY%MvY@uIuHjSJqRFcY9D25n5?D^#+PMK%R7oCb z>%;O4j-9AL=~D(Ts#!Ej0Ch%ryH!fxrBT~EZXNn{Z%cSSrt!o|iCpUDSUs&Z#{>hO z8onfnEgZ2@l;9$^PJfjHST)K)Yrs|pN0HTyPIz8%Yo5lo=bSZ@V1c{yq0@^S(jpaD z{;^u+MR)sh6}}~a5?e@KB}~~d7CIUWQXnY5xXndaj~Z-gF4>`SI zL~&xG-3FVxLY^4e=z~qAU!hjGA)e4OAIES&anc`7Q#oRz5BuemI%QbtwqryPa zFew;+t=7xY=UZ(ggFGFypEA(w2NGfQ2T{Tpi0-$f+P#`ru{|yCH+8-YL%x&)sQ`l! zx2Df7QHZ=&tba<`26YCj0$Ha}e|1Vsc76pQP;dLGANPV&jo*@`?Xf?zJY4M=@8(1r zxJ-?7C2p>EMN48bs*@42yARpD)bN-31Cz}yu86AUsv;f<1V9xS%gWq4 z>>q?sN|pP5;>BqVhjy*1j3$R;P7RmUm+CT%IJ9J7lB#o7Qrw<+f|miIvJBasQ`h-r z+dyTBe}6QVyZu;(*}D#md%;jNCUr^5PaOXSt-rhoLw3P`9rAh>0l=LZaHJ6wLCptYiD?d-5}@R)BK*={~|SS7VtP!UiQW+UR%LY2dqbJac42LiBiy1bAQ;V z$=S5Ow|P_!pX(a0wa6BFU~f9QuLw`O)mRI6ljX}|tQ3Rvr)FZbdgGLx?;gZCRivPH z%#<_1npHVpslMRZI}!n;at7zd%>`S-<9seTfUJ&Z@G9&Wl3zR3z+lVWpV1X1 zjd@=Cca#;1Lz8g2rPCpAk-yW$BmX*Tgc6R~9F`2a5vM$Ls2|jYTensJ7k_s91YA>- zfvh+)yJ~Y(_S}3?2Z_nDV6bGM|4}EtRKU~M4H+?r%0ybLN@>b^EYJxbH}!Ed5)*l} zLUyERWre`6Q{FQLinA?u)R04ip73n%^E-g}RSrrvM-L!{bGw|+>O_uXKD=yxHtRPz zKZ+3c{1hhh8cQQ?n=?vhD}U^gM&-Z_B8cM{+d|?YeS-%nBg3udk&QU^pU1m8vZSjw zAk~Z8%XxV6=dIqr(uLF!XFW6z6R=4?|G@I`)t9edb>hkLl3yuy`OQ7KG>gS>rvb zh3P9&3i49a(y2bxz@mg0Dx=3~RDg9Fk+|l+u(8M^KY9@Hjeq4oIZ<-K(lw?X4n``2 zrzQ*N>3VdglWPe07B~j#&^ZOcC8Rb zN{SRXd*0{zvwyV7Ptwz#(%egY62<&ys-&8jec}=|@*L$?+O}wWXrPDl9fyg~1d6Zp%gqVl3b&BqGR{m7!3g8B)shzzq zjhEccvps9ep@!rQ*Lt@D?L($xf68+b)bB%!u%YVt4uA8RT+)MQ2{0zrlHgSH3Y8jm zNsJ2=%!5}(6{M|AcX%nu=SX^BO0}d=yNw;Urkz2lAg3rAjIQX>(^?)OaXZI3M;tAEdwqH-C>Y|F`t5mRVQ=@ zxy!)RMBTJBUg&B?<(q|7m+Fw?##5{GFPr+vA6sD-K3m6gmFghUT^>b@)Al3l z9+n@gb-W72FAK#-%~al!Lruj-?A`0BQa0zGLl~vs$JIg6rx$aC^Qp!<$P}pMl;%?Z z^YnI6jh{;Tc6xEED-DIz1hU7z8}y=b=-%ZlC0Voe``tX-TZk-c_<(6X-#4TuRnR*%=^B4Wg!N;B$Q+ zp0aPDbGRK=S>9qxO$bGCgrWtPH-86qM-Fv6k1OlGeNuGVk_vAK@!agzcqM|@+H;3@ zmvG}?1^+@Em54{Z`6x!H4sZ2@&9U#))ZMb-NQCm%N3%cC^yW^xH_9eyvFhqn@KwEp zv<(&K7E|v>{}JV1Q~Tj7%2SZcpxw;vWQ?9P3J_=S=AAz|J1~^Ez>{A=(|-;5v<-wP zEZ1S!5r@+CJ=S_vzL^uHzVvhYU35;9?oYYNUjvHNxooRY({?xUdv9rAL3Yt+;G&XY zi>8{i`vOkd+L-bWTL3Z>G3|f>#f#v)IDDs-<)ahs_DC2>5yZnWg0aQJL(o*1&tWI9 z)Hm@bNp-HyIzD9KUvcYi(toFXt(LBrQBI^yBQ_-wX?x4hk3HvbyfSmV zY?Ds&;^b>& zZ#ald9I!(VGTZo5f`h~{4-$wKI4vVwnS4ra9%@k^RV|Vof?lFrsg8;I$mF;_Tz2srRbjC@(Pp3zG8)kmTrQ zO`-X2FA_0N>4B0On%t;NQv0!5FA1)%`2wYQy_r8LZ)9XVx(Eb{fvqYjX@|!RRfS&Z zZiHdpXLfQc=rA8BC+B+f$EXsconncZs!3}N%UlQXM|ReLU4ND>o=CN#SSmubv_Im* z8Dz7!;lTk~rF-{A$=9?t0wLS$d)7tlu&kMlEv_S7 zq}ad;O*{U(&3`c;XV9HKsQMvNW@s*Sc*W`)tX`r~M?QS3^Hi?WUS_|&n^NeQTAfmt zK>vJ1JVA;%8H}qxp|E<99kTDisZ)76PgLBNjLFXaW~^0jm}=S{m@DKkHI}>W@@W{a zR05^ft<{ifQggSyuUHGcrsL?V_%4~Ii=N)~UK66t>*L{7j-0ZTx?1McMDc3UNc1p}D^x-+J+)1X#AgoWwSfuqmB6 zU-@>HmVe`?297sJ;i3HJ@aRpS{127FRa+t$jUVm6^e4d;zfEeAE+th>t6G+_5^+NU zk>5ce7fw@;DHzqAXknXCNSvfkwl=tEDF8a;eJPk^+l?c55*xhGJxJEun_dx`Dj{VL zjC$U$l&Blq=Zfq(miCE`+1Lw3h-JhuV1FrZk{9|5du*sB zZhsp*{8?4m5JYiD^&GYL`N)9l$3fDYS+8zNpVP~%lY$~TY!B|by;Yerklkh_-e_tA zzDQ51n*pm?4>=dm(-T1wtdpvrvZT08`{(s4a=yP5Q z1dvQpicYNa4mE%QvjcojJtk~F}v(C4W}d=L83q( zMZVCF)%ruH>C3)Ad6Fhy0J!E1RM`sp!tvSEhEYSZvvE3*ldsT}e;D#>)q~ltM$W{q zOTLKo#R$;l6acE`F3OdB_kY^ux=SNR@$P+ShY@Zmdhg0-IfVvF(VvYPfvUc)XMmPw zP-R)cm(#W4iL71@ zX6MCFaj^nFR_h-+6|a2uR#xIn#wl?*I_EG?*_#jVpE4+&nzxe@%YSI#FM^s1Knh!_ zKpEBIbQ;3Rnqe=n*?x2AjFQ>$c1l`}BAq=VMjTsu=2%osR~2F3pOZ)=BCuIk-naa2 zyD(?;W`x)iW8~DS+8A{IaB#fOq8SAc-hFsJ{0%UWCeh0F8y~Bb2(UhJE~$?XCcYef zwmc-fN2{`VaF~1huYWa0`%u8cSKMmH7TH!;rzjJu)K4S4Ru39ACj~d(b*Uh=bhvt) zP*1yQI;3lWxwh{+3%qq_mZl?BGd$fi#-mb|H{km&+>48RDul7^w$6_UGcj4db5P)^ zBok(FLyG^;J~F#ORKj0#I!*bIF1?mjic0u7bVNeZ(!FjvnST?epsM^RpZ{p&o<}^+ zK5c;vnfv4s-Xp6i!YjXW;!9I1e&QB^g#6E20KPi~9*s*)2_V}U*F2xPMYxhi0-Sn> zoZ`}_;?kEg0I+sy^z!H-Jau+pPF?kj=am2FrObWX2>0TV=FEI1)-D}G1~6|{o3zJ~w8!an$#2>-d1uG|vT`KGZfD(g z`3>w!6HFdi)~pWsT+eE7L)FS-&kOx`wf-pJpr+w!zYE(ic z6M7y_zkh2AaVS8-|B`fF9p1O6WWPu~3Q$$n4L~U~wQ<;m-RU`rolU0#_F=w5P@W{hXc2M z_J78s>t?DN13$LrtsEWA;!?nQnvSV}3%KIhJ*e$@?L@&p zp1abLI0LGf%8|}8` z7@gQtr0~qz=IjovwnM==5+-H{|@WTIs)ZH_)**C{<8b0Sy%N z*Hucih;nMjJ!LDf*`n8#s1ibk(ZI<+M^pGIDrTpK2b-xof+=@6sAg6|AozDemw#Ov zxrI$1Hdfn!(@8Dw0mW$}^iYKt46LdVIkHLnRhVmors1@rv)cUjo625xO;^TLRyyTm z?y763yk!kXKnD;}f$?r7S=ZAsJxUdC?Wn#AVNgZ0r6+VBKUV9dDfOkz!ifTe>oI55 zD;a8A8Yd+jB=DCLavI=5P8h@wELg7`|KguE4|07>M6lu;EQVEc82tpD(mb5<7J8f*eca*1k=YLMJ9K+8D>rxGoBAOcGe$oVE`5K)Z8$p{a zu>HOtytkuzc~ogwVA{uyuV7+a?1T3$#=I6gF0xRaG|`JZUyb0^SLQ<+=Uj2Ctj-wt z<<#f?c05KNtt#>)lyKf>)qnR&ff%CqrCseh<39rl4o*65Z{W$Bs^n{@UA80l__bPp z+AQOXN_ll)i=#Zw#&I&9>8&bRv&%jn>V=h%Y(s#6q9gBO0cfJ0 zD(RAnF>SHltJ>SY^k!S?UD;*gtDXQ}*2`h8^V!x>JPPIM6{`+g=hg$3IL{9_lU}An zIjsJ#llanR=^wnsUslgle<;P-Cdic3>oALR^C~m@(uM=4aZdeWNH9FphQU=aD&P?H z-T{1X;)3&-0$RY5V}CuWfh@1`br0y&BTd9%d#deg<9B~cwaXsW2choHDou=8Du=l7 zibA*fA_bq^Kq06|la!TXtf@VnMtsm7b^Xx!$KwN zQo-8n;MAvItM#IQe+^?$x#?SXOGn9GbKj(YI~ge)PuHbQJAb=Vad;9l@OU2grXzJq zu1$RO@J!7woqk~%RBKT%Ra@{&69Q$e4+Yn}$sg=8ryR449k%ToL2OcuQ!%3>#=_2;g^21WZABlxMfyUm}T9B z2*NstBY_8GPgXUOwXiQ^sLB-H4nS*tPA4*f(ZyH3j`U>K+U$SR2^_3<6-CsL$qTYvnKqJlQ5nW{i7Rsu)8vj)(B zr0O*(@oWVZTMU2E;v-+>M>p_e-1eoCw3RuvV3gH)c_h2c5y83QjJokEX7W69gFn5D zy$s@^?;XF2Zl!!BP0{Yj?t9o>JZ?RW@@F7h0Xzt>j>$W>cWxHSVJn-ZdG{dVxhvnK z#nNeDk$(VjX6f7DUqKaRlzl9KsOHmZrtJ}!joC|oD7TVV4(%osfP}}=DRD$QmQuF8 zJ|T%!Z3n@~l)2Kd#Vt>{e_;7H1^g>+o$PNpkb&*KMV?gLl7>d?<4+<*Snf{u1fSO_ zL&ZkCI!m|ZZf)#Hb*8B!?J81@QQpYXA#J+<%YTubjkRI2dj1eD#RD*nyQu#irJ}pzLM}>{SbNj3OcGC zQh$qdF?ByV<)T$NFYZ)vw-l+b-g`;64;rZ#J$lCWHR#UEDc)>v+KN0S&t$J3*&i(m zR9|Y2mw_fpEZewD^}o|ba`uj#O|Jd=+J1P}hI(e}qRw|AH-|$YO$5F4f;rjAKs<_Q z%M%-mcheRw1Gk;T?!Fk}FNN}ts`^C%4}URzNwZKr?BL8Nsy-uuR^=Q^;WHQeTDQhC zL~ff--LVJ|WUwLP0V6Kk8o1N|%1)-T3D^aE$(6Pq+ew<$CBmALid+o@qKhKzto=u9 z#BoH5!^COPXoESc&N#x477BH}kBKB<{pg+kQNT%pUw73!dD*UFw z53)ajZO1WQg6?4UAT>{Uv?B&~YQ3G?(B+s$!xzgf0N^3 z6?1*`_=7K9X|Js+*JK(M-SGgC?0@BBSDkYP{d1h@X#5OVaM*+0>UY_9>Immk#r$L~ zdtXNZ7<$A}x#>T;fqxY6|2O<iVt|onf4d*!)OU;5n9oRCWXjaEO)yJ0wX+2TVP>-X3j_f|R74P0}H#Y{w1_ zn@`{7a^|idUd~c=t5kO?&$}J2ypF6kd3!Y${=o7t3OFDC!CP)|@S++g@&^hyi?V@_ z0TL2D|A~+W@%-Ukssc!ZgnvwSe!Qq7?(--E7?z#W@mBhh6st-zyChO5DTk~QL3|Fv zSZ2L>Bc-YX8{d*rZS>1~OwP@`^qjc0oTBvMeO$pPb$An^9fkc7RnK*~Bpm_Ir=9Yo zkreCbX6*gCNZCi(vP&&0%Om45`K-d9ZVKm*4@yZMITLlDm$Nbt$p4Ig4i5Abq;8kM><+=8X5sz);6~z+NlI)5qv5W-)-;ossgZs zp9<}rC8^e1J4JtTq<`qSH?ilc6hPyCq5>eSuQDf7ISX$kIW0=N|5&X*EZ@I`Y@}xB z=BJJw#RSpXst_Qhd8Q>^ol2n|6k2sT+{Q~@+vtTjPRM0-a!`4{2N_LWr%#7M6uptS z)-(b?v<#?{0jbOrA9gs)ZXfZpw-l`!$8Hwg`&yjpITwS=Wq-x2fc!}m+ZQU}H8Nw* zUh5?-blqr%SE*}JV~+@r^UgMl!meslr zQ3^_2t6tCDD&mt|flUv{K$79or&D2JJtma8)q$HGSU^K8ZjD#vMCzBgorAM{#@l;o zp&`hIY*Cerm4D??ZQUyvPhlzf^nLs4bxglZRl055Q_3(AUF}NX;kAp?A^Oi)#gMatIx`%49Y-{XPHH{6uG+9&AVm*!Wg$kglB78YZ`6DO(F~Gra zpSU&m5TCX|oCRHWW28thL^~tR(tC|L73-vi9R%vWm4BHXaN&)!kJ_dxKS>C5kaSob z)mX@tyiZLR8S--z+Ix;%Flk zywj9yRh!oqM(#PXv%5z6vJc>_5~b|9MPvJ6TRsXW&Y@NB`E2hG8CAnEEAUVFakKwo zfVVGkH-D$#?gtdvwUs!6)x)$odUy4jo*w6h}i+GM$NJylZwSigGDO6^HaSd?9I9!xcsd^%!o_qwp4 zY#k8==ZTyVfEs8zSF85BAsPOU}8_x0YF1f&kc{?o?)4ClIXrf#Pcck+M@2VRSk znNGFwpILvztrr8leX(>G;UacxTCjKL<@2Q8u5Z@D6}rPTs$MHlFx9Q*Xg>ap!)a7a zo76lUw%@ZO|IXI{S+~J~PSN4s`(#UWIDdTs$N^_5?abD#A9+|_f)ieYxYE?fb6mz| zkfu9v3z_jkz2kf+>YTJ*Nzz)9saeb^t)0)GJG zP=H$1c%Gh6F#AEQRJ?(sW8<15VP}c0cTM#p`9C~|txjSM4-#~QY#*g&i$b!2141N{ zqj3JFBw?E@Y{qnwsnxchI+9aFQvDr@tIQajblP@jkJ__Oc2dt9G{7E(^Gth+tWMiZ zK}LHXs+re7?Gd)k4sYlOmVf)UeSdWWoi?mwwlIgn`#VJvg`F(X?b12Z+p($L#l0jz ztMy1ds2q^)29NIQiv4EiE9x9);OMZ>x@Co^Ky1=wRXH1KK8+2scq(3cqQ3W5B!#5r zj0elx({TwuZfgm)^<&$wr9D@0>tE+g5~o!aEM*@~yIY6kWQD*@*c!qr_J8HgZEfB) zO~>Gj#?JSqV^avc?oM)(@~_o;jdLDfVk7dZ6-#g1YL^Q8mSJ=0pg3gvOyyh^-UJU^ zaVk&nklj*GAeC5d9(z=T-C-&4qiJD zep9s&xfVNsBiH4qYay&*=;ahBr?IK!c7P;qNmoipI(h_-ERtg-(SN9a8@wWx<9<`Y zk2gAfIB|;LK9qR@@WJ9oEuWOPo?QiRN(Rs{DAlX`c~%Ega#V4vCAZcpXR$%QSh!n# zdYc}cHjXE_*hHghgQ9AZJ~f(ijy-91%k%tLtv?3%@n!I>>=iozSUIJ(QqE5!2N^^| zJvI7@S3!KP(-^XL&41UI#+=SyX_MOJyAt=Rw*aCX>ee79JljAWD!l4*J}C6JvnXM82T*dH zqPq5M9kim(r#!WIlMFQ|-FUfu>ea{5$c~A#nb)tq^ra9ef5y7`T~!iW5P zT?E!9OwO_nBq;1g!WI;f&)npcseJB0ksT04ozE?&4Q3Yx*8gkkY*Qu4jVSuxtMCep zl={pC7~?-Scn7JJ5)Y=a!LxsSj;7zMVqC*8(B0GZvXoN9jnIvIn`W_B7#fFP&daCc zMRSxAC~0)U);JD-{@IsLZ#{^vMDQ3* z@e2Ltvv&2e(mBj3bSj9HveIFT^sDflJn=&f2#Svwihp@}oDO+81GfiI?9?>d!qmU) zcy%OI4kDP47r_mWf;o;1w%184I=u}EVseDN5M+m*gCf*nfs*v#SO6EYt!9=>wp-1i zX75DKn%Vj~orh6RB8_%g4xcJludf=RrmH#=3?>@CU!(+K&(g8Ry#8UezOeiof*{M5 zL_*TYlz-DO2%ei{u?`L;Z`hHsao_S+?CX)?8&D$xBjw#tVk_WIF?@ozRkbE7Yeb@D z$1QF7vONYCC}nFKgiXZ*wUN~Z#rAhMP@$9I6eMq)1Pp$NTU?V3WI4B)nd~pNV?U}6 zDkLHHnOXsL-XrI^jd*lfO7N z^^HlXlw)U;-Yk%_-};m%{%MyI0HG?-p~QbxgIB+bRA&(Rg`fVjk8TlqzS|9EbN5pi zGkdtF&KFe|MY2g{J1Z#CxiN~ z&i(QsQeaE<-ir(jnmV>#nN*BasAr|EIW7jWPYT{8FL3o)1E~&=YvzgB1~!J4Eq-y2 zM&(IwpAW0`HO<-HJOKd;&&3Ak$bZOvIlb6lJug*>9K8>Uq;GRniqG8zv!!eKr!tWj zEcGGUK2bEkUHKG~nO=!Ks%_LOo=p{NMX33|$4w%z4XrZOYjPz&nfRM!A5k@Fu|CvP zEP9F8MS|0KFRw=v35yZEBySMDR)6*yl~NTK)+6t*r0I?d#9+f9yk2apK7VbLgsry@ zqSq-!U4s3{A6DxpmeZ+1Q%wOv<$^=a9p5sRXQ}Inj!mg*apPEy_Vy$9xId5KEqH%t;a; zHR4j&SPJu{7gbXdeS<4C@P8Z#%Xa@x)kp4pYLj|D4p(QsExUQtYDZoMSFp`g?CGrK zoHI|u6FWakOx&8F<-_f3{=)KaEL}?A9=)UBID>H2p9pqF+M`3R({!zag%v1uVQxv1 zw=(J-aI==`QB%W7)uhi`{mt`XA1U<&V!Go5lo5kY4Oz)m!CSK}^?&|k>Vx^cT6JGg z4h1H87+{1K=MNFK{8sg}tS%lUnc#xrxY}KHDT*UEk2>xed^rWq_9H-~sB200Q-aJN zZN8W0(Tj|sai^>gzOZ`h$EW+m{K13yvfmH>=3kQZq~!1xih7Rh+5rPRSgr?$#xfP` zcpkzqcA(s4XGtD)7=NSu6=~ui((X8;s#~c$zIXu52bKAwpSPNt7jJakaSNj6`kJez z{ydXS^TMKC_S4GkjBQs4<@7pGPt{zyjQvLn#KUJt(tt?%k{w7|Xpa-QjwbV>V_lER zk4rDlpcJSLd@Va{bea1o!ot=E9)L!6LsxRgFf|J~fEq|z9$*s)S%$A4ORrJhAKzsE) zkC>~{Qlt&ANAo_;LF~?&8rpx&+zR&bhnA`H9XzD$~K6G zg!V2MSiYqL{C&cTk%?NxJk-pJIr!=7s&bpf+$}co44CnaiG#Mp1VhFM_*ZT zBC6W`Nt%{U&$sIVozMzuU^WZw`IQLZ= z#XYZ8vmY^414yh>1L)hCQj@giMcS#_>OWLWo5a-oq4FtT9GmdwH+eaj+bSQ&H&c5U zD1VhJ8Kvuf8`PNs@Td@yoh?)tz|kO9i9jiPnso&cOke@EJ*j3o((<+&Y8E^- z=Ox%}rkb_b06aM1``rzkjjEoia8M^`{0h>LwRkD6s98tgL_d1>aDXUb2AjMpR2pnh z9~Z&wl2(0_Y`1avEsE!{H2nk1MDzZw$baBtwSB4`Hz~g-?>so7`eC)cu>9NPiX+Gu zg3fy3}H*OvuP}=>)<3063Gae0G^O?qyQIt@EHWVyk|q( zrGTo+H4-8T`i{aWji~GyJMw9E_5bYLSMjJYbM zmO5!F!t8nE2-H-p{5A;4K_Czv%HOa<$J8nUB-m{P#HxxW0LU>*kPkV!@T)tJeg>yS zQ-(Bt&kf`+ek&Z5cP1slWre)&Ur0-YQI6IWB%KYOIy^g}Ir=}0PJOQl;EAi|1eZdSa8vSK=3 zpg)bOo8sd1VYQBLMpAntp7yc*oC$w}nqyCnN7Dp%k3afk+B;pO|JL+?u`|~+?Nx7k zdJ5*TFQ+xV)FVO>-el0-10zoEFGnUxLBwDsTF%>X59-gB(`#rS2%^c?OdfXPXswcl zwWg9}%QhuT#9F*YROX6vbpZzTNOZ(lJz*9}b27UYBxPR9XaHn(w8QKc8B~A7$5wPx z2DxnAlCG@Ty2=rMzg)-H=AsgPmDN%1wj&(m#;6Yn=fhdVX8SSU6@jIyg{&`0HQ(_V<7M`H#Q;@?-t?*XzfB{&fHIUmt$+-#>o*^6MY| M2g$ CVE-2019-19035 - CVE-2020-6624 - CVE-2020-6625 sam_c sam_c diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202202-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202202-02.xml new file mode 100644 index 0000000000..4052f2b557 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202202-02.xml @@ -0,0 +1,90 @@ + + + + Chromium, Google Chrome: Multiple vulnerabilities + Multiple vulnerabilities have been found in Chromium and Google +Chrome, the worst of which could result in the arbitrary execution +of code. + + chromium,google-chrome + 2022-02-20 + 2022-02-20 + 832559 + 833432 + remote + + + 98.0.4758.102 + 98.0.4758.102 + + + 98.0.4758.102 + 98.0.4758.102 + + + +

Chromium is an open-source browser project that aims to build a safer, +faster, and more stable way for all users to experience the web. + +Google Chrome is one, fast, simple, and secure browser for all your +devices. +

+
+ +

Multiple vulnerabilities have been discovered in Chromium and Google +Chrome. Please review the CVE identifiers referenced below for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-98.0.4758.102" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-98.0.4758.102" + +
+ + CVE-2022-0452 + CVE-2022-0453 + CVE-2022-0454 + CVE-2022-0455 + CVE-2022-0456 + CVE-2022-0457 + CVE-2022-0458 + CVE-2022-0459 + CVE-2022-0460 + CVE-2022-0461 + CVE-2022-0462 + CVE-2022-0463 + CVE-2022-0464 + CVE-2022-0465 + CVE-2022-0466 + CVE-2022-0467 + CVE-2022-0468 + CVE-2022-0469 + CVE-2022-0470 + CVE-2022-0603 + CVE-2022-0604 + CVE-2022-0605 + CVE-2022-0606 + CVE-2022-0607 + CVE-2022-0608 + CVE-2022-0609 + CVE-2022-0610 + + sam + sam +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202202-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202202-03.xml new file mode 100644 index 0000000000..ae075c5b85 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202202-03.xml @@ -0,0 +1,141 @@ + + + + Mozilla Firefox: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. + firefox,firefox-bin + 2022-02-21 + 2022-02-21 + 802768 + 807947 + 813498 + 821385 + 828538 + 831039 + 832992 + remote + + + 91.6.0 + 97.0 + 97.0 + + + 91.6.0 + 97.0 + 97.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-91.6.0:esr" + + +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-91.6.0:esr" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-97.0:rapid" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-97.0:rapid" + +
+ + CVE-2021-29970 + CVE-2021-29972 + CVE-2021-29974 + CVE-2021-29975 + CVE-2021-29976 + CVE-2021-29977 + CVE-2021-29980 + CVE-2021-29981 + CVE-2021-29982 + CVE-2021-29984 + CVE-2021-29985 + CVE-2021-29986 + CVE-2021-29987 + CVE-2021-29988 + CVE-2021-29989 + CVE-2021-29990 + CVE-2021-30547 + CVE-2021-38491 + CVE-2021-38493 + CVE-2021-38495 + CVE-2021-38503 + CVE-2021-38504 + CVE-2021-38506 + CVE-2021-38507 + CVE-2021-38508 + CVE-2021-38509 + CVE-2021-4129 + CVE-2021-4140 + CVE-2021-43536 + CVE-2021-43537 + CVE-2021-43538 + CVE-2021-43539 + CVE-2021-43540 + CVE-2021-43541 + CVE-2021-43542 + CVE-2021-43543 + CVE-2021-43545 + CVE-2021-43546 + CVE-2022-0511 + CVE-2022-22737 + CVE-2022-22738 + CVE-2022-22739 + CVE-2022-22740 + CVE-2022-22741 + CVE-2022-22742 + CVE-2022-22743 + CVE-2022-22745 + CVE-2022-22747 + CVE-2022-22748 + CVE-2022-22751 + CVE-2022-22753 + CVE-2022-22754 + CVE-2022-22755 + CVE-2022-22756 + CVE-2022-22757 + CVE-2022-22758 + CVE-2022-22759 + CVE-2022-22760 + CVE-2022-22761 + CVE-2022-22762 + CVE-2022-22763 + CVE-2022-22764 + MOZ-2021-0004 + MOZ-2021-0005 + MOZ-2021-0006 + MOZ-2021-0007 + MOZ-2021-0008 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202207-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202207-01.xml new file mode 100644 index 0000000000..ecb32ade07 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202207-01.xml @@ -0,0 +1,61 @@ + + + + HashiCorp Vault: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in HashiCorp Vault, the worst of which could result in denial of service. + vault + 2022-07-29 + 2022-07-29 + 768312 + 797244 + 808093 + 817269 + 827945 + 829493 + 835070 + 845405 + remote + + + 1.10.3 + 1.10.3 + + + +

HashiCorp Vault is a tool for managing secrets.

+
+ +

Multiple vulnerabilities have been discovered in HashiCorp Vault. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All HashiCorp Vault users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/vault-1.10.3" + +
+ + CVE-2020-25594 + CVE-2021-27668 + CVE-2021-3024 + CVE-2021-3282 + CVE-2021-32923 + CVE-2021-37219 + CVE-2021-38553 + CVE-2021-38554 + CVE-2021-41802 + CVE-2021-43998 + CVE-2021-45042 + CVE-2022-25243 + CVE-2022-30689 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-01.xml new file mode 100644 index 0000000000..ed2d5810df --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-01.xml @@ -0,0 +1,42 @@ + + + + 3MF Consortium lib3mf: Remote code execution + A vulnerability in lib3mf could lead to remote code execution. + lib3mf + 2022-08-04 + 2022-08-04 + 775362 + remote + + + 2.1.1 + 2.1.1 + + + +

lib3mf is an implementation of the 3D Manufacturing Format file standard.

+
+ +

Incorrect memory handling within lib3mf could result in a use-after-free.

+
+ +

An attacker that can provide malicious input to an application using 3MF Consortium's lib3mf could achieve remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All 3MF Consortium lib3mf users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/lib3mf-2.1.1" + +
+ + CVE-2021-21772 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-02.xml new file mode 100644 index 0000000000..a23a1a3420 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-02.xml @@ -0,0 +1,101 @@ + + + + Go: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. + go + 2022-08-04 + 2022-08-04 + 754210 + 766216 + 775326 + 788640 + 794784 + 802054 + 806659 + 807049 + 816912 + 821859 + 828655 + 833156 + 834635 + 838130 + 843644 + 849290 + 857822 + 862822 + remote + + + 1.18.5 + 1.18.5 + + + +

Go is an open source programming language that makes it easy to build simple, reliable, and efficient software.

+
+ +

Multiple vulnerabilities have been discovered in Go. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Go users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/go-1.18.5" + + +

In addition, users using Portage 3.0.9 or later should ensure that packages with Go binaries have no vulnerable code statically linked into their binaries by rebuilding the @golang-rebuild set:

+ + + # emerge --ask --oneshot --verbose @golang-rebuild + +
+ + CVE-2020-28366 + CVE-2020-28367 + CVE-2021-27918 + CVE-2021-27919 + CVE-2021-29923 + CVE-2021-3114 + CVE-2021-3115 + CVE-2021-31525 + CVE-2021-33195 + CVE-2021-33196 + CVE-2021-33197 + CVE-2021-33198 + CVE-2021-34558 + CVE-2021-36221 + CVE-2021-38297 + CVE-2021-41771 + CVE-2021-41772 + CVE-2021-44716 + CVE-2021-44717 + CVE-2022-1705 + CVE-2022-23772 + CVE-2022-23773 + CVE-2022-23806 + CVE-2022-24675 + CVE-2022-24921 + CVE-2022-27536 + CVE-2022-28131 + CVE-2022-28327 + CVE-2022-29526 + CVE-2022-30629 + CVE-2022-30630 + CVE-2022-30631 + CVE-2022-30632 + CVE-2022-30633 + CVE-2022-30635 + CVE-2022-32148 + CVE-2022-32189 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-03.xml new file mode 100644 index 0000000000..942101cddc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-03.xml @@ -0,0 +1,42 @@ + + + + Babel: Remote code execution + A vulnerability in Babel could result in remote code execution. + Babel + 2022-08-04 + 2022-08-04 + 786954 + remote + + + 2.9.1 + 2.9.1 + + + +

Babel is a collection of tools for internationalizing Python applications.

+
+ +

Babel does not properly restrict which sources a locale can be loaded from. If Babel loads an attacker-controlled .dat file, arbitrary code execution can be achieved via unsafe Pickle deserialization.

+
+ +

An attacker with filesystem access and control over the locales Babel loads can achieve code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All Babel users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/Babel-2.9.1" + +
+ + CVE-2021-20095 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-04.xml new file mode 100644 index 0000000000..59a03c63d7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-04.xml @@ -0,0 +1,42 @@ + + + + libmcpp: Denial of service + Multiple vulnerabilities in libmcpp could result in a denial of service condition. + libmcpp + 2022-08-04 + 2022-08-04 + 718808 + remote + + + 2.7.2_p5 + 2.7.2_p5 + + + +

libmcpp is a portable C/C++ preprocessor.

+
+ +

A buffer overflow and an out-of-bounds read vulnerability have been discovered in libmcpp, which could be exploited for denial of service.

+
+ +

An attacker that can provide crafted input to libmcpp could achieve denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All libmcpp users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-cpp/libmcpp-2.7.2_p5" + +
+ + CVE-2019-14274 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-05.xml new file mode 100644 index 0000000000..088ef70191 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-05.xml @@ -0,0 +1,46 @@ + + + + Icinga Web 2: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Icinga Web 2, the worst of which could result in remote code execution. + icingaweb2 + 2022-08-04 + 2022-08-04 + 738024 + 834802 + remote + + + 2.9.6 + 2.9.6 + + + +

Icinga Web 2 is a frontend for icinga2.

+
+ +

Multiple vulnerabilities have been discovered in Icinga Web 2. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Icinga Web 2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-apps/icingaweb2-2.9.6" + +
+ + CVE-2020-24368 + CVE-2022-24714 + CVE-2022-24715 + CVE-2022-24716 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-06.xml new file mode 100644 index 0000000000..825a5a80eb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-06.xml @@ -0,0 +1,48 @@ + + + + lxml: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in lxml, the worst of which could result in denial of service. + lxml + 2022-08-10 + 2022-08-10 + 777579 + 829053 + 856598 + remote + + + 4.9.1 + 4.9.1 + + + +

lxml is a Pythonic binding for the libxml2 and libxslt libraries.

+
+ +

Multiple vulnerabilities have been discovered in lxml. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All lxml users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/lxml-4.9.1" + +
+ + CVE-2021-28957 + CVE-2021-43818 + CVE-2022-2309 + GHSL-2021-1037 + GHSL-2021-1038 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-07.xml new file mode 100644 index 0000000000..7f95f07829 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-07.xml @@ -0,0 +1,42 @@ + + + + LibRaw: Stack buffer overread + A buffer overread in LibRaw might allow an attacker to cause denial of service. + libraw + 2022-08-10 + 2022-08-10 + 793956 + remote + + + 0.20.2 + 0.20.2 + + + +

LibRaw is a library for reading RAW files obtained from digital photo cameras.

+
+ +

LibRaw incorrectly handles parsing DNG fields in some cases, potentially resulting in a buffer overread leading to denial of service.

+
+ +

An attacker capable of providing crafted input to LibRaw could trigger denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All LibRaw users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libraw-0.20.2" + +
+ + CVE-2020-24870 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-08.xml new file mode 100644 index 0000000000..025606af2f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-08.xml @@ -0,0 +1,147 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. + firefox,firefox-bin + 2022-08-10 + 2022-08-10 + 834631 + 834804 + 836866 + 842438 + 846593 + 849044 + 857045 + 861515 + remote + + + 91.12.0 + 103.0 + 103.0 + 91.12.0 + + + 91.12.0 + 103.0 + 91.12.0 + 103.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-91.12.0:esr" + + +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-91.12.0:esr" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-103.0:rapid" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-103.0:rapid" + +
+ + CVE-2022-0843 + CVE-2022-1196 + CVE-2022-1529 + CVE-2022-1802 + CVE-2022-1919 + CVE-2022-2200 + CVE-2022-2505 + CVE-2022-24713 + CVE-2022-26381 + CVE-2022-26382 + CVE-2022-26383 + CVE-2022-26384 + CVE-2022-26385 + CVE-2022-26386 + CVE-2022-26387 + CVE-2022-26485 + CVE-2022-26486 + CVE-2022-28281 + CVE-2022-28282 + CVE-2022-28283 + CVE-2022-28284 + CVE-2022-28285 + CVE-2022-28286 + CVE-2022-28287 + CVE-2022-28288 + CVE-2022-28289 + CVE-2022-29909 + CVE-2022-29910 + CVE-2022-29911 + CVE-2022-29912 + CVE-2022-29914 + CVE-2022-29915 + CVE-2022-29916 + CVE-2022-29917 + CVE-2022-29918 + CVE-2022-31736 + CVE-2022-31737 + CVE-2022-31738 + CVE-2022-31740 + CVE-2022-31741 + CVE-2022-31742 + CVE-2022-31743 + CVE-2022-31744 + CVE-2022-31745 + CVE-2022-31747 + CVE-2022-31748 + CVE-2022-34468 + CVE-2022-34469 + CVE-2022-34470 + CVE-2022-34471 + CVE-2022-34472 + CVE-2022-34473 + CVE-2022-34474 + CVE-2022-34475 + CVE-2022-34476 + CVE-2022-34477 + CVE-2022-34478 + CVE-2022-34479 + CVE-2022-34480 + CVE-2022-34481 + CVE-2022-34482 + CVE-2022-34483 + CVE-2022-34484 + CVE-2022-34485 + CVE-2022-36315 + CVE-2022-36316 + CVE-2022-36318 + CVE-2022-36319 + CVE-2022-36320 + MFSA-2022-14 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-09.xml new file mode 100644 index 0000000000..e692833bfc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-09.xml @@ -0,0 +1,55 @@ + + + + HashiCorp Consul: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in HashiCorp Consul, the worst of which could result in denial of service. + consul + 2022-08-10 + 2022-08-10 + 760696 + 783483 + 802522 + 812497 + 834006 + 838328 + remote + + + 1.9.17 + 1.9.17 + + + +

HashiCorp Consul is a tool for service discovery, monitoring and configuration.

+
+ +

Multiple vulnerabilities have been discovered in HashiCorp Consul. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All HashiCorp Consul users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/consul-1.9.17" + +
+ + CVE-2020-25201 + CVE-2020-25864 + CVE-2020-28053 + CVE-2021-28156 + CVE-2021-32574 + CVE-2021-36213 + CVE-2021-38698 + CVE-2022-24687 + CVE-2022-29153 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-10.xml new file mode 100644 index 0000000000..17cef54e06 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-10.xml @@ -0,0 +1,44 @@ + + + + Spice Server: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Spice Server, the worst of which may result in the remote execution of arbitrary code. + spice + 2022-08-10 + 2022-08-10 + 746920 + 792618 + remote + + + 0.15.0 + 0.15.0 + + + +

Provides a complete open source solution for remote access to virtual machines in a seamless way so you can play videos, record audio, share USB devices and share folders without complications.

+
+ +

Multiple vulnerabilities have been discovered in Spice Server, please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Spice Server users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/spice-0.15.0" + +
+ + CVE-2021-14355 + CVE-2021-20201 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-11.xml new file mode 100644 index 0000000000..b81aff9336 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-11.xml @@ -0,0 +1,43 @@ + + + + Yubico pam-u2f: Local PIN Bypass vulnerability + A vulnerability has been discovered in pam-u2f which could allow a local attacker to bypass PIN entry. + pam_u2f + 2022-08-10 + 2022-08-10 + 792270 + local + + + 1.1.1 + 1.1.1 + + + +

Yubico pam-u2f is a PAM module for FIDO2 and U2F keys.

+
+ +

A logic issue in Yubico pam-u2f could result in the bypass of a PIN entry requirement when authenticating with FIDO2.

+
+ +

An attacker with local access to certain applications using pam-u2f for authentication could incorrectly successfully authenticate without entering the authentication PIN.

+
+ +

There is no known workaround at this time.

+
+ +

All Yubico pam-u2f users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-auth/pam_u2f-1.1.1" + +
+ + CVE-2021-31924 + YSA-2021-03 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-12.xml new file mode 100644 index 0000000000..5cb982d78c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-12.xml @@ -0,0 +1,44 @@ + + + + mdbtools: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in mdbtools, the worst of which + mdbtools + 2022-08-10 + 2022-08-10 + 773289 + 830371 + remote + + + 0.9.3 + 0.9.3 + + + +

mdbtools is a set of libraries and utilities for reading Microsoft Access database (MDB) files.

+
+ +

Multiple vulnerabilities have been discovered in mdbtools. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All mdbtools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-office/mdbtools-0.9.3" + +
+ + CVE-2021-45926 + CVE-2021-45927 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-13.xml new file mode 100644 index 0000000000..e0ce4d1345 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-13.xml @@ -0,0 +1,42 @@ + + + + libass: Denial of service + A vulnerability in libass could result in denial of service. + libass + 2022-08-10 + 2022-08-10 + 803119 + remote + + + 0.15.1 + 0.15.1 + + + +

libass is a portable subtitle renderer for the ASS/SSA (Advanced Substation Alpha/Substation Alpha) subtitle format.

+
+ +

A one-byte buffer overwrite in ASS font decoding could trigger an assertion failure resulting in denial of service.

+
+ +

An attacker with control over the ASS track input to libass via an application using it could trigger a denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All libass users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libass-0.15.1" + +
+ + CVE-2020-36430 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-14.xml new file mode 100644 index 0000000000..b9e3341e39 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-14.xml @@ -0,0 +1,165 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. + thunderbird,thunderbird-bin + 2022-08-10 + 2022-08-10 + 794085 + 802759 + 807943 + 811912 + 813501 + 822294 + 828539 + 831040 + 833520 + 834805 + 845057 + 846596 + 849047 + 857048 + 864577 + remote + + + 91.12.0 + 91.12.0 + + + 91.12.0 + 91.12.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-91.12.0" + + +

All Mozilla Thunderbird binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-91.12.0" + +
+ + CVE-2021-4129 + CVE-2021-4140 + CVE-2021-29967 + CVE-2021-29969 + CVE-2021-29970 + CVE-2021-29976 + CVE-2021-29980 + CVE-2021-29984 + CVE-2021-29985 + CVE-2021-29986 + CVE-2021-29988 + CVE-2021-29989 + CVE-2021-30547 + CVE-2021-38492 + CVE-2021-38493 + CVE-2021-38495 + CVE-2021-38503 + CVE-2021-38504 + CVE-2021-38506 + CVE-2021-38507 + CVE-2021-38508 + CVE-2021-38509 + CVE-2021-40529 + CVE-2021-43528 + CVE-2021-43529 + CVE-2021-43536 + CVE-2021-43537 + CVE-2021-43538 + CVE-2021-43539 + CVE-2021-43541 + CVE-2021-43542 + CVE-2021-43543 + CVE-2021-43545 + CVE-2021-43546 + CVE-2022-0566 + CVE-2022-1196 + CVE-2022-1197 + CVE-2022-1520 + CVE-2022-1529 + CVE-2022-1802 + CVE-2022-1834 + CVE-2022-2200 + CVE-2022-2226 + CVE-2022-22737 + CVE-2022-22738 + CVE-2022-22739 + CVE-2022-22740 + CVE-2022-22741 + CVE-2022-22742 + CVE-2022-22743 + CVE-2022-22745 + CVE-2022-22747 + CVE-2022-22748 + CVE-2022-22751 + CVE-2022-22754 + CVE-2022-22756 + CVE-2022-22759 + CVE-2022-22760 + CVE-2022-22761 + CVE-2022-22763 + CVE-2022-22764 + CVE-2022-24713 + CVE-2022-26381 + CVE-2022-26383 + CVE-2022-26384 + CVE-2022-26386 + CVE-2022-26387 + CVE-2022-26485 + CVE-2022-26486 + CVE-2022-28281 + CVE-2022-28282 + CVE-2022-28285 + CVE-2022-28286 + CVE-2022-28289 + CVE-2022-29909 + CVE-2022-29911 + CVE-2022-29912 + CVE-2022-29913 + CVE-2022-29914 + CVE-2022-29916 + CVE-2022-29917 + CVE-2022-31736 + CVE-2022-31737 + CVE-2022-31738 + CVE-2022-31740 + CVE-2022-31741 + CVE-2022-31742 + CVE-2022-31747 + CVE-2022-34468 + CVE-2022-34470 + CVE-2022-34472 + CVE-2022-34478 + CVE-2022-34479 + CVE-2022-34481 + CVE-2022-34484 + CVE-2022-36318 + CVE-2022-36319 + MOZ-2021-0007 + MOZ-2021-0008 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-15.xml new file mode 100644 index 0000000000..dd408fc6a0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-15.xml @@ -0,0 +1,47 @@ + + + + isync: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in isync, the worst of which could result in arbitrary code execution. + isync + 2022-08-10 + 2022-08-10 + 771738 + 794772 + 826902 + remote + + + 1.4.4 + 1.4.4 + + + +

isync is an IMAP and MailDir mailbox synchronizer.

+
+ +

Multiple vulnerabilities have been discovered in isync. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All isync users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-mail/isync-1.4.4" + +
+ + CVE-2021-3578 + CVE-2021-3657 + CVE-2021-20247 + CVE-2021-44143 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-16.xml new file mode 100644 index 0000000000..54bf4f2056 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-16.xml @@ -0,0 +1,42 @@ + + + + faac: Denial of service + A vulnerability in faac could result in denial of service. + faac + 2022-08-10 + 2022-08-10 + 762505 + remote + + + 1.30 + 1.30 + + + +

faac contains free MPEG-4 audio codecs by AudioCoding.com.

+
+ +

An invalid pointer can be dereferenced in the huffcode function of libfaac/huff2.c, leading to a crash.

+
+ +

An attacker with the ability to provide crafted input to faac could cause a denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All faac users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/faac-1.30" + +
+ + CVE-2018-19886 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-17.xml new file mode 100644 index 0000000000..c4ead64272 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-17.xml @@ -0,0 +1,72 @@ + + + + Nextcloud: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Nextcloud, the worst of which could result in denial of service. + nextcloud + 2022-08-10 + 2022-08-10 + 848873 + 835073 + 834803 + 820368 + 812443 + 802096 + 797253 + remote + + + 23.0.4 + 23.0.4 + + + +

Nextcloud is a personal cloud that runs on your own server.

+
+ +

Multiple vulnerabilities have been discovered in Nextcloud. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Nextcloud users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-apps/nextcloud-23.0.4" + +
+ + CVE-2021-32653 + CVE-2021-32654 + CVE-2021-32655 + CVE-2021-32656 + CVE-2021-32657 + CVE-2021-32678 + CVE-2021-32679 + CVE-2021-32680 + CVE-2021-32688 + CVE-2021-32703 + CVE-2021-32705 + CVE-2021-32725 + CVE-2021-32726 + CVE-2021-32734 + CVE-2021-32800 + CVE-2021-32801 + CVE-2021-32802 + CVE-2021-41177 + CVE-2021-41178 + CVE-2021-41239 + CVE-2021-41241 + CVE-2022-24741 + CVE-2022-24888 + CVE-2022-24889 + CVE-2022-29243 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-18.xml new file mode 100644 index 0000000000..b1bb9fed49 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-18.xml @@ -0,0 +1,42 @@ + + + + Motion: Denial of service + A vulnerability in Motion allows a remote attacker to cause denial of service. + motion + 2022-08-10 + 2022-08-10 + 760714 + remote + + + 4.3.2 + 4.3.2 + + + +

Motion is a program that monitors the video signal from one or more cameras and is able to detect motions.

+
+ +

The Motion HTTP server does not correctly perform URL decoding. If the HTTP server receives a request for a URL containing an incomplete percent-encoded character, a flaw in parsing results in an infinite loop trying to parse the rest of the character, which eventually results in a denial of service condition when reading out-of-bounds.

+
+ +

A remote attacker can trigger a denial of service condition in Motion.

+
+ +

There is no known workaround at this time.

+
+ +

All Motion users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-video/motion-4.3.2" + +
+ + CVE-2020-26566 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-19.xml new file mode 100644 index 0000000000..8011cbc8a8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-19.xml @@ -0,0 +1,43 @@ + + + + aiohttp: Open redirect vulnerability + An open redirect vulnerability has been discovered in aiohttp. + aiohttp + 2022-08-10 + 2022-08-10 + 772932 + remote + + + 3.7.4 + 3.7.4 + + + +

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python.

+
+ +

A bug in aiohttp.web_middlewares.normalize_path_middleware creates an open redirect vulnerability.

+
+ +

An attacker use this vulnerability to craft a link that, while appearing to be a link to an aiohttp-based website, redirects users to an arbitrary attacker-controlled URL.

+
+ +

There is no known workaround at this time.

+
+ +

All aiohttp users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/aiohttp-3.7.4" + +
+ + CVE-2021-21330 + GHSA-v6wp-4m6f-gcjg + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-20.xml new file mode 100644 index 0000000000..58744f5a5b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-20.xml @@ -0,0 +1,78 @@ + + + + Apache HTTPD: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Apache Webserver, the worst of which could result in remote code execution. + apache,apache-tools + 2022-08-14 + 2022-08-14 + 813429 + 816399 + 816864 + 829722 + 835131 + 850622 + remote + + + 2.4.54 + 2.4.54 + + + 2.4.54 + 2.4.54 + + + +

The Apache HTTP server is one of the most popular web servers on the Internet.

+
+ +

Multiple vulnerabilities have been discovered in Apache HTTPD. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Apache HTTPD users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/apache-2.4.54" + + +

All Apache HTTPD tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/apache-tools-2.4.54" + +
+ + CVE-2021-33193 + CVE-2021-34798 + CVE-2021-36160 + CVE-2021-39275 + CVE-2021-40438 + CVE-2021-41524 + CVE-2021-41773 + CVE-2021-42013 + CVE-2021-44224 + CVE-2021-44790 + CVE-2022-22719 + CVE-2022-22720 + CVE-2022-22721 + CVE-2022-23943 + CVE-2022-26377 + CVE-2022-28614 + CVE-2022-28615 + CVE-2022-29404 + CVE-2022-30522 + CVE-2022-30556 + CVE-2022-31813 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-21.xml new file mode 100644 index 0000000000..3f883725ca --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-21.xml @@ -0,0 +1,42 @@ + + + + libebml: Heap buffer overflow vulnerability + A heap-based buffer overflow in libeml might allow attackers to execute arbitrary code. + libebml + 2022-08-14 + 2022-08-14 + 772272 + remote + + + 1.4.2 + 1.4.2 + + + +

libebml is a C++ library to parse EBML files.

+
+ +

On 32bit builds of libebml, the length of a string is miscalculated, potentially leading to an exploitable heap overflow.

+
+ +

An attacker able to provide arbitrary input to libebml could achieve arbitrary code execution.

+
+ +

There is no known workaround at this time.

+
+ +

Users of libebml on 32 bit architectures should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libebml-1.4.2" + +
+ + CVE-2021-3405 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-22.xml new file mode 100644 index 0000000000..5e5f67c918 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-22.xml @@ -0,0 +1,44 @@ + + + + xterm: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in xterm, the worst of which could result in denial of service. + xterm + 2022-08-14 + 2022-08-14 + 769839 + 832409 + remote + + + 371 + 371 + + + +

xterm is a terminal emulator for the X Window system.

+
+ +

Multiple vulnerabilities have been discovered in xterm. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All xterm users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-terms/xterm-371" + +
+ + CVE-2021-27135 + CVE-2022-24130 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-23.xml new file mode 100644 index 0000000000..dcdd731817 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-23.xml @@ -0,0 +1,88 @@ + + + + Xen: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Xen, the worst of which could result in remote code execution (guest sandbox escape). + xen,xen-tools + 2022-08-14 + 2022-08-14 + 810341 + 812485 + 816882 + 825354 + 832039 + 835401 + 850802 + remote + + + 4.15.3 + 4.15.3 + + + 4.15.3 + 4.15.3 + + + +

Xen is a bare-metal hypervisor.

+
+ +

Multiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Xen users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.15.3" + + +

All Xen tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/xen-tools-4.15.3" + +
+ + CVE-2021-28694 + CVE-2021-28695 + CVE-2021-28696 + CVE-2021-28697 + CVE-2021-28698 + CVE-2021-28699 + CVE-2021-28700 + CVE-2021-28701 + CVE-2021-28702 + CVE-2021-28710 + CVE-2022-21123 + CVE-2022-21125 + CVE-2022-21166 + CVE-2022-23033 + CVE-2022-23034 + CVE-2022-23035 + CVE-2022-26362 + CVE-2022-26363 + CVE-2022-26364 + XSA-378 + XSA-379 + XSA-380 + XSA-382 + XSA-383 + XSA-384 + XSA-386 + XSA-390 + XSA-401 + XSA-402 + XSA-404 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-24.xml new file mode 100644 index 0000000000..68d2b4e545 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-24.xml @@ -0,0 +1,50 @@ + + + + GNU C Library: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service. + glibc + 2022-08-14 + 2022-08-14 + 803437 + 807935 + 831096 + 831212 + remote + + + 2.34 + 2.34 + + + +

The GNU C library is the standard C library used by Gentoo Linux systems. It provides programs with basic facilities and interfaces to system calls. ld.so is the dynamic linker which prepares dynamically linked programs for execution by resolving runtime dependencies and related functions.

+
+ +

Multiple vulnerabilities have been discovered in GNU C Library. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All GNU C Library users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.34-r7" + +
+ + CVE-2021-3998 + CVE-2021-3999 + CVE-2021-35942 + CVE-2021-38604 + CVE-2022-23218 + CVE-2022-23219 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-25.xml new file mode 100644 index 0000000000..02c46c6d61 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-25.xml @@ -0,0 +1,284 @@ + + + + Chromium, Google Chrome, Microsoft Edge, QtWebEngine: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution. + chromium,google-chrome,microsoft-edge,qtwebengine + 2022-08-14 + 2022-08-14 + 828519 + 834477 + 835397 + 836011 + 836381 + 836777 + 838049 + 838433 + 841371 + 843728 + 847370 + 851003 + 853643 + 773040 + 787950 + 800181 + 810781 + 815397 + 829161 + 835761 + 836830 + 847613 + 853229 + 837497 + 838682 + 843035 + 848864 + 851009 + 854372 + remote + + + 5.15.5_p20220618 + 5.15.5_p20220618 + + + 103.0.5060.53 + 103.0.5060.53 + + + 103.0.5060.53 + 103.0.5060.53 + + + 101.0.1210.47 + 101.0.1210.47 + + + +

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. + +Google Chrome is one fast, simple, and secure browser for all your devices. + +Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

+
+ +

Multiple vulnerabilities have been discovered in Chromium and its derivatives. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-103.0.5060.53" + + +

All Chromium binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-bin-103.0.5060.53" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-103.0.5060.53" + + +

All Microsoft Edge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-103.0.5060.53" + + +

All QtWebEngine users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-qt/qtwebengine-5.15.5_p20220618" + +
+ + CVE-2021-4052 + CVE-2021-4053 + CVE-2021-4054 + CVE-2021-4055 + CVE-2021-4056 + CVE-2021-4057 + CVE-2021-4058 + CVE-2021-4059 + CVE-2021-4061 + CVE-2021-4062 + CVE-2021-4063 + CVE-2021-4064 + CVE-2021-4065 + CVE-2021-4066 + CVE-2021-4067 + CVE-2021-4068 + CVE-2021-4078 + CVE-2021-4079 + CVE-2021-30551 + CVE-2022-0789 + CVE-2022-0790 + CVE-2022-0791 + CVE-2022-0792 + CVE-2022-0793 + CVE-2022-0794 + CVE-2022-0795 + CVE-2022-0796 + CVE-2022-0797 + CVE-2022-0798 + CVE-2022-0799 + CVE-2022-0800 + CVE-2022-0801 + CVE-2022-0802 + CVE-2022-0803 + CVE-2022-0804 + CVE-2022-0805 + CVE-2022-0806 + CVE-2022-0807 + CVE-2022-0808 + CVE-2022-0809 + CVE-2022-0971 + CVE-2022-0972 + CVE-2022-0973 + CVE-2022-0974 + CVE-2022-0975 + CVE-2022-0976 + CVE-2022-0977 + CVE-2022-0978 + CVE-2022-0979 + CVE-2022-0980 + CVE-2022-1096 + CVE-2022-1125 + CVE-2022-1127 + CVE-2022-1128 + CVE-2022-1129 + CVE-2022-1130 + CVE-2022-1131 + CVE-2022-1132 + CVE-2022-1133 + CVE-2022-1134 + CVE-2022-1135 + CVE-2022-1136 + CVE-2022-1137 + CVE-2022-1138 + CVE-2022-1139 + CVE-2022-1141 + CVE-2022-1142 + CVE-2022-1143 + CVE-2022-1144 + CVE-2022-1145 + CVE-2022-1146 + CVE-2022-1232 + CVE-2022-1305 + CVE-2022-1306 + CVE-2022-1307 + CVE-2022-1308 + CVE-2022-1309 + CVE-2022-1310 + CVE-2022-1311 + CVE-2022-1312 + CVE-2022-1313 + CVE-2022-1314 + CVE-2022-1364 + CVE-2022-1477 + CVE-2022-1478 + CVE-2022-1479 + CVE-2022-1480 + CVE-2022-1481 + CVE-2022-1482 + CVE-2022-1483 + CVE-2022-1484 + CVE-2022-1485 + CVE-2022-1486 + CVE-2022-1487 + CVE-2022-1488 + CVE-2022-1489 + CVE-2022-1490 + CVE-2022-1491 + CVE-2022-1492 + CVE-2022-1493 + CVE-2022-1494 + CVE-2022-1495 + CVE-2022-1496 + CVE-2022-1497 + CVE-2022-1498 + CVE-2022-1499 + CVE-2022-1500 + CVE-2022-1501 + CVE-2022-1633 + CVE-2022-1634 + CVE-2022-1635 + CVE-2022-1636 + CVE-2022-1637 + CVE-2022-1639 + CVE-2022-1640 + CVE-2022-1641 + CVE-2022-1853 + CVE-2022-1854 + CVE-2022-1855 + CVE-2022-1856 + CVE-2022-1857 + CVE-2022-1858 + CVE-2022-1859 + CVE-2022-1860 + CVE-2022-1861 + CVE-2022-1862 + CVE-2022-1863 + CVE-2022-1864 + CVE-2022-1865 + CVE-2022-1866 + CVE-2022-1867 + CVE-2022-1868 + CVE-2022-1869 + CVE-2022-1870 + CVE-2022-1871 + CVE-2022-1872 + CVE-2022-1873 + CVE-2022-1874 + CVE-2022-1875 + CVE-2022-1876 + CVE-2022-2007 + CVE-2022-2010 + CVE-2022-2011 + CVE-2022-2156 + CVE-2022-2157 + CVE-2022-2158 + CVE-2022-2160 + CVE-2022-2161 + CVE-2022-2162 + CVE-2022-2163 + CVE-2022-2164 + CVE-2022-2165 + CVE-2022-22021 + CVE-2022-24475 + CVE-2022-24523 + CVE-2022-26891 + CVE-2022-26894 + CVE-2022-26895 + CVE-2022-26900 + CVE-2022-26905 + CVE-2022-26908 + CVE-2022-26909 + CVE-2022-26912 + CVE-2022-29144 + CVE-2022-29146 + CVE-2022-29147 + CVE-2022-30127 + CVE-2022-30128 + CVE-2022-30192 + CVE-2022-33638 + CVE-2022-33639 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-26.xml new file mode 100644 index 0000000000..5d229495aa --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-26.xml @@ -0,0 +1,47 @@ + + + + libarchive: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in libarchive, the worst of which could result in arbitrary code execution. + libarchive + 2022-08-14 + 2022-08-14 + 803128 + 836352 + 837266 + remote + + + 3.6.1 + 3.6.1 + + + +

libarchive is a library for manipulating different streaming archive formats, including certain tar variants, several cpio formats, and both BSD and GNU ar variants.

+
+ +

Multiple vulnerabilities have been discovered in libarchive. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libarchive users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/libarchive-3.6.1" + +
+ + CVE-2021-31566 + CVE-2021-36976 + CVE-2022-26280 + CVE-2022-28066 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-27.xml new file mode 100644 index 0000000000..474faac8ae --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-27.xml @@ -0,0 +1,85 @@ + + + + QEMU: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). + qemu + 2022-08-14 + 2022-08-14 + 733448 + 736605 + 773220 + 775713 + 780816 + 792624 + 807055 + 810544 + 820743 + 835607 + 839762 + remote + + + 7.0.0 + 7.0.0 + + + +

QEMU is a generic and open source machine emulator and virtualizer.

+
+ +

Multiple vulnerabilities have been discovered in QEMU.Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All QEMU users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/qemu-7.0.0" + +
+ + CVE-2020-15859 + CVE-2020-15863 + CVE-2020-16092 + CVE-2020-35504 + CVE-2020-35505 + CVE-2020-35506 + CVE-2020-35517 + CVE-2021-3409 + CVE-2021-3416 + CVE-2021-3527 + CVE-2021-3544 + CVE-2021-3545 + CVE-2021-3546 + CVE-2021-3582 + CVE-2021-3607 + CVE-2021-3608 + CVE-2021-3611 + CVE-2021-3682 + CVE-2021-3713 + CVE-2021-3748 + CVE-2021-3750 + CVE-2021-3929 + CVE-2021-3930 + CVE-2021-3947 + CVE-2021-4145 + CVE-2021-4158 + CVE-2021-4206 + CVE-2021-4207 + CVE-2021-20203 + CVE-2021-20257 + CVE-2021-20263 + CVE-2022-0358 + CVE-2022-26353 + CVE-2022-26354 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-28.xml new file mode 100644 index 0000000000..9c21b7233f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-28.xml @@ -0,0 +1,48 @@ + + + + Puma: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Puma, the worst of which could result in denial of service. + puma + 2022-08-14 + 2022-08-14 + 794034 + 817893 + 833155 + 836431 + remote + + + 5.6.4 + 5.6.4 + + + +

Puma is a simple, fast, threaded, and highly concurrent HTTP 1.1 server for Ruby/Rack.

+
+ +

Multiple vulnerabilities have been discovered in Puma. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Puma users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/puma-5.6.4" + +
+ + CVE-2021-29509 + CVE-2021-41136 + CVE-2022-23634 + CVE-2022-24790 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-29.xml new file mode 100644 index 0000000000..4e85bcbacc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-29.xml @@ -0,0 +1,46 @@ + + + + Nokogiri: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Nokogiri, the worst of which could result in denial of service. + nokogiri + 2022-08-14 + 2022-08-14 + 846623 + 837902 + 762685 + remote + + + 1.13.6 + 1.13.6 + + + +

Nokogiri is an HTML, XML, SAX, and Reader parser.

+
+ +

Multiple vulnerabilities have been discovered in Nokogiri. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Nokogiri users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-ruby/nokogiri-1.13.6" + +
+ + CVE-2020-26247 + CVE-2022-24836 + CVE-2022-29181 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-30.xml new file mode 100644 index 0000000000..c781bc13ee --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-30.xml @@ -0,0 +1,61 @@ + + + + GNU Binutils: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service. + binutils,binutils-libs + 2022-08-14 + 2022-08-14 + 778545 + 792342 + 829304 + remote + + + 2.38 + 2.38 + + + 2.38 + 2.38 + + + +

The GNU Binutils are a collection of tools to create, modify and analyse binary files. Many of the files use BFD, the Binary File Descriptor library, to do low-level manipulation.

+
+ +

Multiple vulnerabilities have been discovered in GNU Binutils. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Binutils users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-devel/binutils-2.38" + + +

All Binutils library users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/binutils-libs-2.38" + +
+ + CVE-2021-3487 + CVE-2021-3530 + CVE-2021-3549 + CVE-2021-20197 + CVE-2021-20284 + CVE-2021-20294 + CVE-2021-45078 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-31.xml new file mode 100644 index 0000000000..1f0163229c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-31.xml @@ -0,0 +1,111 @@ + + + + GStreamer, GStreamer Plugins: Multiple Vulnerabilities + Multiple vulnerabilities have been found in GStreamer and its plugins, the worst of which could result in arbitrary code execution. + gst-plugins-bad,gst-plugins-base,gst-plugins-good,gst-plugins-libav,gst-plugins-ugly,gstreamer + 2022-08-14 + 2022-08-14 + 766336 + 785652 + 785655 + 785658 + 785661 + 835368 + 843770 + 765163 + remote + + + 1.16.3 + 1.16.3 + + + 1.18.4 + 1.18.4 + + + 1.18.4 + 1.18.4 + + + 1.18.4 + 1.18.4 + + + 1.20.2 + 1.20.2 + + + 1.18.4 + 1.18.4 + + + +

GStreamer is an open source multimedia framework.

+
+ +

Multiple vulnerabilities have been found in GStreamer and its plugins. Please review the CVE and GStreamer-SA identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All GStreamer users should update to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/gstreamer-1.20.2" + + +

All gst-plugins-bad users should update to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-bad-1.20.2" + + +

All gst-plugins-good users should update to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-good-1.20.2" + + +

All gst-plugins-ugly users should update to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-ugly-1.20.2" + + +

All gst-plugins-base users should update to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-base-1.20.2" + + +

All gst-plugins-libav users should update to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-plugins/gst-plugins-libav-1.20.2" + +
+ + CVE-2021-3185 + CVE-2021-3497 + CVE-2021-3498 + CVE-2021-3522 + GStreamer-SA-2021-0001 + GStreamer-SA-2021-0002 + GStreamer-SA-2021-0004 + GStreamer-SA-2021-0005 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-32.xml new file mode 100644 index 0000000000..1ff4b3b3d6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-32.xml @@ -0,0 +1,168 @@ + + + + Vim, gVim: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Vim, the worst of which could result in denial of service. + gvim,vim,vim-core + 2022-08-21 + 2022-08-21 + 811870 + 818562 + 819528 + 823473 + 824930 + 828583 + 829658 + 830106 + 830994 + 833572 + 836432 + 851231 + remote + + + 9.0.0060 + 9.0.0060 + + + 9.0.0060 + 9.0.0060 + + + 9.0.0060 + 9.0.0060 + + + +

Vim is an efficient, highly configurable improved version of the classic ‘vi’ text editor. gVim is the GUI version of Vim.

+
+ +

Multiple vulnerabilities have been discovered in Vim and gVim. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Vim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/vim-9.0.0060" + + +

All gVim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/gvim-9.0.0060" + + +

All vim-core users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/vim-core-9.0.0060" + +
+ + CVE-2021-3770 + CVE-2021-3778 + CVE-2021-3796 + CVE-2021-3872 + CVE-2021-3875 + CVE-2021-3927 + CVE-2021-3928 + CVE-2021-3968 + CVE-2021-3973 + CVE-2021-3974 + CVE-2021-3984 + CVE-2021-4019 + CVE-2021-4069 + CVE-2021-4136 + CVE-2021-4166 + CVE-2021-4173 + CVE-2021-4187 + CVE-2021-4192 + CVE-2021-4193 + CVE-2021-46059 + CVE-2022-0128 + CVE-2022-0156 + CVE-2022-0158 + CVE-2022-0213 + CVE-2022-0261 + CVE-2022-0318 + CVE-2022-0319 + CVE-2022-0351 + CVE-2022-0359 + CVE-2022-0361 + CVE-2022-0368 + CVE-2022-0392 + CVE-2022-0393 + CVE-2022-0407 + CVE-2022-0408 + CVE-2022-0413 + CVE-2022-0417 + CVE-2022-0443 + CVE-2022-0554 + CVE-2022-0629 + CVE-2022-0685 + CVE-2022-0714 + CVE-2022-0729 + CVE-2022-0943 + CVE-2022-1154 + CVE-2022-1160 + CVE-2022-1381 + CVE-2022-1420 + CVE-2022-1616 + CVE-2022-1619 + CVE-2022-1620 + CVE-2022-1621 + CVE-2022-1629 + CVE-2022-1674 + CVE-2022-1720 + CVE-2022-1733 + CVE-2022-1735 + CVE-2022-1769 + CVE-2022-1771 + CVE-2022-1785 + CVE-2022-1796 + CVE-2022-1851 + CVE-2022-1886 + CVE-2022-1897 + CVE-2022-1898 + CVE-2022-1927 + CVE-2022-1942 + CVE-2022-1968 + CVE-2022-2000 + CVE-2022-2042 + CVE-2022-2124 + CVE-2022-2125 + CVE-2022-2126 + CVE-2022-2129 + CVE-2022-2175 + CVE-2022-2182 + CVE-2022-2183 + CVE-2022-2206 + CVE-2022-2207 + CVE-2022-2208 + CVE-2022-2210 + CVE-2022-2231 + CVE-2022-2257 + CVE-2022-2264 + CVE-2022-2284 + CVE-2022-2285 + CVE-2022-2286 + CVE-2022-2287 + CVE-2022-2288 + CVE-2022-2289 + CVE-2022-2304 + CVE-2022-2343 + CVE-2022-2344 + CVE-2022-2345 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-33.xml new file mode 100644 index 0000000000..9a40b07937 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-33.xml @@ -0,0 +1,72 @@ + + + + Gnome Shell, gettext, libcroco: Multiple Vulnerabilities + A vulnerability has been found in libcroco which could result in denial of service. + gettext,gnome-shell,libcroco + 2022-08-21 + 2022-08-21 + 722752 + 755848 + 769998 + remote + + + 0.6.13 + 0.6.13 + + + 3.36.7 + 3.36.7 + + + 0.21 + 0.21 + + + +

GNOME Shell provides core user interface functions for the GNOME desktop, like switching to windows and launching applications. + +gettext contains the GNU locale utilities. + +libcroco is a standalone CSS2 parsing and manipulation library.

+
+ +

The cr_parser_parse_any_core function in libcroco's cr-parser.c does not limit recursion, leading to a denial of service via a stack overflow when trying to parse crafted CSS. + +Gnome Shell and gettext bundle libcroco in their own sources and thus are potentially vulnerable as well.

+
+ +

An attacker with control over the input to the library can cause a denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All gettext users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-devel/gettext-0.21" + + +

All Gnome Shell users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=gnome-base/gnome-shell-3.36.7" + + +

All libcroco users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libcroco-0.6.13" + +
+ + CVE-2020-12825 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-34.xml new file mode 100644 index 0000000000..d9d0d45186 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-34.xml @@ -0,0 +1,69 @@ + + + + Apache Tomcat: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Apache Tomcat, the worst of which could result in denial of service. + tomcat + 2022-08-21 + 2022-08-21 + 773571 + 801916 + 818160 + 855971 + remote + + + 10.0.23 + 9.0.65 + 8.5.82 + 10.0.23 + 9.0.65 + 8.5.82 + + + +

Apache Tomcat is a Servlet-3.0/JSP-2.2 Container.

+
+ +

Multiple vulnerabilities have been discovered in Apache Tomcat. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Apache Tomcat 10.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/tomcat-10.0.23:10" + + +

All Apache Tomcat 9.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/tomcat-9.0.65:9" + + +

All Apache Tomcat 8.5.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/tomcat-8.5.82:8.5" + +
+ + CVE-2021-25122 + CVE-2021-25329 + CVE-2021-30639 + CVE-2021-30640 + CVE-2021-33037 + CVE-2021-42340 + CVE-2022-34305 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-35.xml new file mode 100644 index 0000000000..b35642c517 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-35.xml @@ -0,0 +1,126 @@ + + + + Chromium, Google Chrome, Microsoft Edge: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution. + chromium,chromium-bin,google-chrome,microsoft-edge + 2022-08-21 + 2022-08-21 + 858104 + 859442 + 863512 + 865501 + 864723 + remote + + + 104.0.5112.101 + 104.0.5112.101 + + + 104.0.5112.101 + 104.0.5112.101 + + + 104.0.5112.101 + 104.0.5112.101 + + + 104.0.1293.63 + 104.0.1293.63 + + + +

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. + +Google Chrome is one fast, simple, and secure browser for all your devices. + +Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

+
+ +

Multiple vulnerabilities have been discovered in Chromium and its derivatives. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-104.0.5112.101" + + +

All Chromium binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-bin-104.0.5112.101" + + +

All Google Chrome users should upgrade to tha latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-104.0.5112.101" + + +

All Microsoft Edge users should upgrade to tha latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-104.0.1293.63" + +
+ + CVE-2022-2163 + CVE-2022-2294 + CVE-2022-2295 + CVE-2022-2296 + CVE-2022-2477 + CVE-2022-2478 + CVE-2022-2479 + CVE-2022-2480 + CVE-2022-2481 + CVE-2022-2603 + CVE-2022-2604 + CVE-2022-2605 + CVE-2022-2606 + CVE-2022-2607 + CVE-2022-2608 + CVE-2022-2609 + CVE-2022-2610 + CVE-2022-2611 + CVE-2022-2612 + CVE-2022-2613 + CVE-2022-2614 + CVE-2022-2615 + CVE-2022-2616 + CVE-2022-2617 + CVE-2022-2618 + CVE-2022-2619 + CVE-2022-2620 + CVE-2022-2621 + CVE-2022-2622 + CVE-2022-2623 + CVE-2022-2624 + CVE-2022-2852 + CVE-2022-2853 + CVE-2022-2854 + CVE-2022-2855 + CVE-2022-2856 + CVE-2022-2857 + CVE-2022-2858 + CVE-2022-2859 + CVE-2022-2860 + CVE-2022-2861 + CVE-2022-33636 + CVE-2022-33649 + CVE-2022-35796 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-36.xml new file mode 100644 index 0000000000..04ca82ecc8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-36.xml @@ -0,0 +1,98 @@ + + + + Oracle VirtualBox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation. + virtualbox,virtualbox-additions,virtualbox-extpack-oracle,virtualbox-guest-additions,virtualbox-modules + 2022-08-31 + 2022-08-31 + 785445 + 803134 + 820425 + 831440 + 839990 + 859391 + remote + + + 6.1.36 + 6.1.36 + + + 6.1.36 + 6.1.36 + + + 6.1.36 + 6.1.36 + + + 6.1.36 + 6.1.36 + + + 6.1.36 + 6.1.36 + + + +

VirtualBox is a powerful virtualization product from Oracle.

+
+ +

Multiple vulnerabilities have been discovered in VirtualBox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All VirtualBox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-6.1.36" + +
+ + CVE-2021-2145 + CVE-2021-2250 + CVE-2021-2264 + CVE-2021-2266 + CVE-2021-2279 + CVE-2021-2280 + CVE-2021-2281 + CVE-2021-2282 + CVE-2021-2283 + CVE-2021-2284 + CVE-2021-2285 + CVE-2021-2286 + CVE-2021-2287 + CVE-2021-2291 + CVE-2021-2296 + CVE-2021-2297 + CVE-2021-2306 + CVE-2021-2309 + CVE-2021-2310 + CVE-2021-2312 + CVE-2021-2409 + CVE-2021-2442 + CVE-2021-2443 + CVE-2021-2454 + CVE-2021-2475 + CVE-2021-35538 + CVE-2021-35540 + CVE-2021-35542 + CVE-2021-35545 + CVE-2022-21394 + CVE-2022-21465 + CVE-2022-21471 + CVE-2022-21487 + CVE-2022-21488 + CVE-2022-21554 + CVE-2022-21571 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-37.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-37.xml new file mode 100644 index 0000000000..6ee2426094 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-37.xml @@ -0,0 +1,77 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution. + firefox,firefox-bin + 2022-08-31 + 2022-08-31 + 866215 + remote + + + 104 + 91.13.0 + 104 + + + 104 + 91.13.0 + 104 + 91.13.0 + 91.13.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-91.13.0" + + +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-91.13.0" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-104.0" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-104.0" + +
+ + CVE-2022-38472 + CVE-2022-38473 + CVE-2022-38474 + CVE-2022-38475 + CVE-2022-38476 + CVE-2022-38477 + CVE-2022-38478 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-38.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-38.xml new file mode 100644 index 0000000000..64917311e7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-38.xml @@ -0,0 +1,57 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Thunderbird, the world of which could result in arbitrary code execution. + thunderbird,thunderbird-bin + 2022-08-31 + 2022-08-31 + 866217 + remote + + + 91.13.0 + 91.13.0 + + + 91.13.0 + 91.13.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-102.2.0" + + +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-102.2.0" + +
+ + CVE-2022-38472 + CVE-2022-38473 + CVE-2022-38476 + CVE-2022-38477 + CVE-2022-38478 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-39.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-39.xml new file mode 100644 index 0000000000..1ab9f6c73c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-39.xml @@ -0,0 +1,74 @@ + + + + WebKitGTK+: Multiple Vulnerabilities + Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code. + webkit-gtk + 2022-08-31 + 2022-08-31 + 866494 + 864427 + 856445 + 861740 + 837305 + 845252 + 839984 + 833568 + 832990 + remote + + + 2.36.7 + 2.36.7 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All WebKitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.36.7" + +
+ + CVE-2022-2294 + CVE-2022-22589 + CVE-2022-22590 + CVE-2022-22592 + CVE-2022-22620 + CVE-2022-22624 + CVE-2022-22628 + CVE-2022-22629 + CVE-2022-22662 + CVE-2022-22677 + CVE-2022-26700 + CVE-2022-26709 + CVE-2022-26710 + CVE-2022-26716 + CVE-2022-26717 + CVE-2022-26719 + CVE-2022-30293 + CVE-2022-30294 + CVE-2022-32784 + CVE-2022-32792 + CVE-2022-32893 + WSA-2022-0002 + WSA-2022-0003 + WSA-2022-0007 + WSA-2022-0008 + + sam + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-01.xml new file mode 100644 index 0000000000..1fdcaf71f0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-01.xml @@ -0,0 +1,56 @@ + + + + GNU Gzip, XZ Utils: Arbitrary file write + A vulnerability has been discovered in GNU Gzip and XZ Utils' grep helpers which could result in writes to arbitrary files. + gzip,xz-utils + 2022-09-07 + 2022-09-07 + 837152 + 837155 + remote + + + 1.12 + 1.12 + + + 5.2.5 + 5.2.5 + + + +

GNU Gzip is a popular data compression program. + +XZ Utils is free general-purpose data compression software with a high compression ratio.

+
+ +

GNU Gzip and XZ Utils' grep helpers do not sufficiently validate certain multi-line file names.

+
+ +

In some cases, writing to arbitrary files such as shell initialization files can be escalation to remote code execution.

+
+ +

Ensuring only trusted input is passed to GNU Gzip and XZ Utils' grep helpers minimizes the potential impact.

+
+ +

All GNU Gzip users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/gzip-1.12" + + +

All XZ Utils users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/xz-utils-5.2.5" + +
+ + CVE-2022-1271 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-02.xml new file mode 100644 index 0000000000..2c7d26523d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-02.xml @@ -0,0 +1,48 @@ + + + + IBM Spectrum Protect: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in IBM Spectrum Protect, the worst of which could result in arbitrary code execution. + tsm + 2022-09-07 + 2022-09-07 + 788115 + 829189 + 831509 + remote + + + 8.1.13.3 + 8.1.13.3 + + + +

TSM provides the client and the API for IBM Spectrum Protect (formerly known as Tivoli Storage Manager), a backup and archival client/server solution targetting large tape libraries.

+
+ +

Multiple vulnerabilities have been discovered in IBM Spectrum Protect. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All IBM Spectrum Protect users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-backup/tsm-8.1.13.3" + +
+ + CVE-2021-3711 + CVE-2021-3712 + CVE-2021-4104 + CVE-2021-29672 + CVE-2021-39048 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-03.xml new file mode 100644 index 0000000000..c3b22e3de0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-03.xml @@ -0,0 +1,46 @@ + + + + OpenSC: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenSC, the worst of which could result in the execution of arbitrary code. + opensc + 2022-09-07 + 2022-09-07 + 839357 + remote + + + 0.22.0 + 0.22.0 + + + +

OpenSC contains tools and libraries for smart cards.

+
+ +

Multiple vulnerabilities have been discovered in OpenSC. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/opensc-0.22.0" + +
+ + CVE-2021-42778 + CVE-2021-42779 + CVE-2021-42780 + CVE-2021-42781 + CVE-2021-42782 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-04.xml new file mode 100644 index 0000000000..9933cc2cc6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-04.xml @@ -0,0 +1,45 @@ + + + + OpenJPEG: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenJPEG, the worst of which could result in arbitrary code execution. + openjpeg + 2022-09-07 + 2022-09-07 + 783513 + 836969 + 844064 + remote + + + 2.5.0 + 2.5.0 + + + +

OpenJPEG is an open-source JPEG 2000 library.

+
+ +

Multiple vulnerabilities have been discovered in OpenJPEG. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenJPEG 2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/openjpeg-2.5.0" + +
+ + CVE-2021-29338 + CVE-2022-1122 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-05.xml new file mode 100644 index 0000000000..f418dacf84 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-05.xml @@ -0,0 +1,153 @@ + + + + OpenJDK: Multiple Vulnerabilities + Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service. + openjdk,openjdk-bin,openjdk-jre-bin + 2022-09-07 + 2022-09-07 + 803605 + 831446 + 784611 + remote + + + 17.0.2_p8 + 11.0.14_p9 + 8.322_p06 + 17.0.2_p8 + 11.0.14_p9 + 8.322_p06 + + + 17.0.2_p8 + 11.0.14_p9 + 8.322_p06 + 17.0.2_p8 + 11.0.14_p9 + 8.322_p06 + + + 17.0.2_p8 + 11.0.14_p9 + 8.322_p06 + 17.0.2_p8 + 11.0.14_p9 + 8.322_p06 + + + +

OpenJDK is an open source implementation of the Java programming language.

+
+ +

Multiple vulnerabilities have been discovered in OpenJDK. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenJDK 8 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-8.322_p06:8" + + +

All OpenJDK 8 JRE binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-8.322_p06:8" + + +

All OpenJDK 8 binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-8.322_p06:8" + + +

All OpenJDK 11 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-11.0.14_p9:11" + + +

All OpenJDK 11 JRE binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-11.0.14_p9:11" + + +

All OpenJDK 11 binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-11.0.14_p9:11" + + +

All OpenJDK 17 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-17.0.2_p8:17" + + +

All OpenJDK 17 JRE binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-17.0.2_p8:17" + + +

All OpenJDK 17 binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-17.0.2_p8:17" + +
+ + CVE-2021-2161 + CVE-2021-2163 + CVE-2021-2341 + CVE-2021-2369 + CVE-2021-2388 + CVE-2021-2432 + CVE-2021-35550 + CVE-2021-35556 + CVE-2021-35559 + CVE-2021-35561 + CVE-2021-35564 + CVE-2021-35565 + CVE-2021-35567 + CVE-2021-35578 + CVE-2021-35586 + CVE-2021-35588 + CVE-2021-35603 + CVE-2022-21248 + CVE-2022-21271 + CVE-2022-21277 + CVE-2022-21282 + CVE-2022-21283 + CVE-2022-21291 + CVE-2022-21293 + CVE-2022-21294 + CVE-2022-21296 + CVE-2022-21299 + CVE-2022-21305 + CVE-2022-21340 + CVE-2022-21341 + CVE-2022-21349 + CVE-2022-21360 + CVE-2022-21365 + CVE-2022-21366 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-06.xml new file mode 100644 index 0000000000..717b6c92ac --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-06.xml @@ -0,0 +1,49 @@ + + + + Rizin: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Rizin, the worst of which could lead to arbitrary code execution. + rizin + 2022-09-25 + 2022-09-25 + 861524 + 868999 + local and remote + + + 0.4.1 + 0.4.1 + + + +

Rizin is a reverse engineering framework for binary analysis.

+
+ +

Multiple vulnerabilities have been discovered in Rizin. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Rizin users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-util/rizin-0.4.1" + +
+ + CVE-2022-34612 + CVE-2022-36039 + CVE-2022-36040 + CVE-2022-36041 + CVE-2022-36042 + CVE-2022-36043 + CVE-2022-36044 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-07.xml new file mode 100644 index 0000000000..556fa69ed9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-07.xml @@ -0,0 +1,40 @@ + + + + Mrxvt: Arbitrary Code Execution + A vulnerability has been discovered in Mrxvt which could allow for arbitrary code execution + mrxvt + 2022-09-25 + 2022-09-25 + 791004 + local and remote + + + 0.5.4 + + + +

Mrxvt is a multi-tabbed rxvt clone with XFT, transparent background and CJK support.

+
+ +

Mrxvt mishandles certain escape sequences, some of which allow for shell command execution.

+
+ +

An attacker with sufficient access to write arbitrary text to the Mrxvt terminal could execute arbitrary code.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for Mrxvt. We recommend that users remove it:

+ + + # emerge --ask --depclean "x11-terms/mrxvt" + +
+ + CVE-2021-33477 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-08.xml new file mode 100644 index 0000000000..9687477405 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-08.xml @@ -0,0 +1,41 @@ + + + + Smokeping: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in Smokeping, the worst of which could result in root privilege escalation. + smokeping + 2022-09-25 + 2022-09-25 + 631140 + 602652 + local + + + 2.7.3-r1 + + + +

Smokeping is a powerful latency measurement tool

+
+ +

Multiple vulnerabilities have been discovered in Smokeping. Please review the CVE identifiers referenced below for details.

+
+ +

A local attacker which gains access to the smokeping user could gain root privileges.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for Smokeping. We recommend that users remove it:

+ + + # emerge --ask --depclean "net-analyzer/smokeping" + +
+ + CVE-2017-20147 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-09.xml new file mode 100644 index 0000000000..83bd6e71ed --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-09.xml @@ -0,0 +1,47 @@ + + + + Smarty: Multiple vulnerabilities + Multiple vulnerabilities have been found in Smarty, the worst of which could result in remote code execution + smarty + 2022-09-25 + 2022-09-25 + 830980 + 845180 + 870100 + remote + + + 4.2.1 + 4.2.1 + + + +

Smarty is a template engine for PHP. The "template security" feature of Smarty is designed to help reduce the risk of a system compromise when you have untrusted parties editing templates.

+
+ +

Multiple vulnerabilities have been discovered in Smarty. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Smarty users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-php/smarty-4.2.1" + +
+ + CVE-2018-25047 + CVE-2021-21408 + CVE-2021-29454 + CVE-2022-29221 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-10.xml new file mode 100644 index 0000000000..9e9ae3a3bb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-10.xml @@ -0,0 +1,40 @@ + + + + Logcheck: Root privilege escalation + A vulnerability has been discovered in Logcheck's ebuilds which could allow for root privilege escalation. + logcheck + 2022-09-25 + 2022-09-25 + 630752 + remote + + + 1.3.23 + + + +

Logcheck mails anomalies in the system logfiles to the administrator.

+
+ +

The pkg_postinst phase of the Logcheck ebuilds recursively chown the /etc/logcheck and /var/lib/logcheck directories. If the logcheck adds hardlinks to other files in these directories, the chown call will follow the link and transfer ownership of any file to the logcheck user.

+
+ +

A local attacker with access to the logcheck user could escalate to root privileges.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for Logcheck. We recommend that users remove it:

+ + + # emerge --ask --depclean "app-admin/logcheck" + +
+ + CVE-2017-20148 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-11.xml new file mode 100644 index 0000000000..d1599df5c7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-11.xml @@ -0,0 +1,44 @@ + + + + HarfBuzz: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in HarfBuzz, the worst of which could result in arbitrary code execution. + harfbuzz + 2022-09-25 + 2022-09-25 + 830372 + 856049 + remote + + + 4.4.0 + 4.4.0 + + + +

HarfBuzz is an OpenType text shaping engine.

+
+ +

Multiple vulnerabilities have been discovered in HarfBuzz. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All HarfBuzz users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/harfbuzz-4.4.0" + +
+ + CVE-2021-45931 + CVE-2022-33068 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-12.xml new file mode 100644 index 0000000000..f7b8e7ebc4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-12.xml @@ -0,0 +1,53 @@ + + + + GRUB: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in GRUB, the worst of which may allow for secureboot bypass. + grub + 2022-09-25 + 2022-09-25 + 850535 + 835082 + local + + + 2.06 + 2.06 + + + +

GNU GRUB is a multiboot boot loader used by most Linux systems.

+
+ +

Multiple vulnerabilities have been discovered in GRUB. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All GRUB users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-boot/grub-2.06-r3" + + +

After upgrading, make sure to run the grub-install command with options appropriate for your system. See the GRUB2 Gentoo Wiki page for directions. Your system will be vulnerable until this action is performed.

+
+ + CVE-2021-3695 + CVE-2021-3696 + CVE-2021-3697 + CVE-2021-3981 + CVE-2022-28733 + CVE-2022-28734 + CVE-2022-28735 + CVE-2022-28736 + CVE-2022-28737 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-13.xml new file mode 100644 index 0000000000..507d8dd200 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-13.xml @@ -0,0 +1,42 @@ + + + + libaacplus: Denial of Service + Multiple vulnerabilities have been discovered in libaacplus, the worst of which could result in denial of service. + libaacplus + 2022-09-25 + 2022-09-25 + 618000 + local and remote + + + 2.0.2-r3 + + + +

libaacplus is an HE-AAC+ v2 library, based on the reference implementation.

+
+ +

Multiple vulnerabilities have been discovered in libaacplus. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued suport for libaacplus. We recommend that users remove it:

+ + + # emerge --ask --depclean "media-libs/libaacplus" + +
+ + CVE-2017-7603 + CVE-2017-7604 + CVE-2017-7605 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-14.xml new file mode 100644 index 0000000000..eebe11b4cc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-14.xml @@ -0,0 +1,44 @@ + + + + Fetchmail: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Fetchmail, the worst of which could result in email disclosure to third parties. + fetchmail + 2022-09-25 + 2022-09-25 + 810676 + 804921 + remote + + + 6.4.22 + 6.4.22 + + + +

Fetchmail is a remote mail retrieval and forwarding utility.

+
+ +

Multiple vulnerabilities have been discovered in Fetchmail. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Fetchmail users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-mail/fetchmail-6.4.22" + +
+ + CVE-2021-36386 + CVE-2021-39272 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-15.xml new file mode 100644 index 0000000000..17ecb3f121 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-15.xml @@ -0,0 +1,64 @@ + + + + Oracle JDK/JRE: Multiple vulnerabilities + Multiple vulnerabilities have been found in Oracle JDK and JRE, the worst of which could result in the arbitrary execution of code. + oracle-jdk-bin,oracle-jre-bin + 2022-09-25 + 2022-09-25 + 732630 + 717638 + remote + + + 11.0.2 + + + 1.8.0.202 + + + +

Java Platform, Standard Edition (Java SE) lets you develop and deploy Java applications on desktops and servers, as well as in today's demanding embedded environments. Java offers the rich user interface, performance, versatility, portability, and security that today's applications require.

+
+ +

Multiple vulnerabilities have been discovered in Oracle's JDK and JRE software suites. Please review the CVE identifiers referenced below for details.

+
+ +

Certain uses of untrusted data by Oracle JDK and JRE could result in arbitrary code execution.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for the Oracle JDK and JRE. We recommend that users remove it, and use dev-java/openjdk, dev-java/openjdk-bin, or dev-java/openjdk-jre-bin instead:

+ + + # emerge --ask --depclean "dev-java/oracle-jre-bin" + # emerge --ask --depclean "dev-java/oracle-jdk-bin" + +
+ + CVE-2020-2585 + CVE-2020-2755 + CVE-2020-2756 + CVE-2020-2757 + CVE-2020-2773 + CVE-2020-2781 + CVE-2020-2800 + CVE-2020-2803 + CVE-2020-2805 + CVE-2020-14556 + CVE-2020-14562 + CVE-2020-14573 + CVE-2020-14577 + CVE-2020-14578 + CVE-2020-14579 + CVE-2020-14581 + CVE-2020-14583 + CVE-2020-14593 + CVE-2020-14621 + CVE-2020-14664 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-16.xml new file mode 100644 index 0000000000..1f0069fee5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-16.xml @@ -0,0 +1,46 @@ + + + + BlueZ: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in BlueZ, the worst of which could result in arbitrary code execution. + bluez + 2022-09-29 + 2022-09-29 + 797712 + 835077 + remote + + + 5.63 + 5.63 + + + +

BlueZ is the canonical bluetooth tools and system daemons package for Linux.

+
+ +

Multiple vulnerabilities have been discovered in BlueZ. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All BlueZ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-wireless/bluez-5.63" + +
+ + CVE-2020-26558 + CVE-2021-0129 + CVE-2021-3588 + CVE-2022-0204 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-17.xml new file mode 100644 index 0000000000..38ff99dcd5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-17.xml @@ -0,0 +1,60 @@ + + + + Redis: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Redis, the worst of which could result in arbitrary code execution. + redis + 2022-09-29 + 2022-09-29 + 803302 + 816282 + 841404 + 856040 + 859181 + 872278 + remote + + + 7.0.5 + 7.0.5 + + + +

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.

+
+ +

Multiple vulnerabilities have been discovered in Redis. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Redis users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/redis-7.0.5" + +
+ + CVE-2021-32626 + CVE-2021-32627 + CVE-2021-32628 + CVE-2021-32672 + CVE-2021-32675 + CVE-2021-32687 + CVE-2021-32761 + CVE-2021-32762 + CVE-2021-41099 + CVE-2022-24735 + CVE-2022-24736 + CVE-2022-31144 + CVE-2022-33105 + CVE-2022-35951 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-18.xml new file mode 100644 index 0000000000..5c7df9f40c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-18.xml @@ -0,0 +1,59 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Thunderbird, the world of which could result in arbitrary code execution. + thunderbird,thunderbird-bin + 2022-09-29 + 2022-09-29 + 872572 + remote + + + 102.3.0 + 102.3.0 + + + 102.3.0 + 102.3.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-102.3.0" + + +

All Mozilla Thunderbird binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-102.3.0" + +
+ + CVE-2022-3155 + CVE-2022-40956 + CVE-2022-40957 + CVE-2022-40958 + CVE-2022-40959 + CVE-2022-40960 + CVE-2022-40962 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-19.xml new file mode 100644 index 0000000000..1b587ba0e1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-19.xml @@ -0,0 +1,45 @@ + + + + GraphicsMagick: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in GraphicsMagick, the worst of which are fuzzing issues presumed to allow for arbitrary code execution. + graphicsmagick + 2022-09-29 + 2022-09-29 + 721328 + 836283 + 873367 + remote + + + 1.3.38 + 1.3.38 + + + +

GraphicsMagick is a collection of tools and libraries which support reading, writing, and manipulating images in many major formats.

+
+ +

Multiple vulnerabilities have been discovered in GraphicsMagick. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All GraphicsMagick users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/graphicsmagick-1.3.38" + +
+ + CVE-2020-12672 + CVE-2022-1270 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-20.xml new file mode 100644 index 0000000000..de8287e1ca --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-20.xml @@ -0,0 +1,71 @@ + + + + PHP: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in PHP, the worst of which could result in local root privilege escalation. + php + 2022-09-29 + 2022-09-29 + 799776 + 810526 + 819510 + 833585 + 850772 + 857054 + remote + + + 7.4.30 + 8.0.23 + 8.1.8 + 7.4.30 + 8.0.23 + 8.1.8 + + + +

PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML.

+
+ +

Multiple vulnerabilities have been discovered in PHP. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All PHP 7.4 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-7.4.30:7.4" + + +

All PHP 8.0 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-8.0.23:8.0" + + +

All PHP 8.1 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-8.1.8:8.1" + +
+ + CVE-2021-21703 + CVE-2021-21704 + CVE-2021-21705 + CVE-2021-21708 + CVE-2022-31625 + CVE-2022-31626 + CVE-2022-31627 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-21.xml new file mode 100644 index 0000000000..4c938a048e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-21.xml @@ -0,0 +1,43 @@ + + + + Poppler: Arbitrary Code Execution + A vulnerability has been discovered in Poppler which could allow for arbitrary code execution. + poppler + 2022-09-29 + 2022-09-29 + 867958 + remote + + + 22.09.0 + 22.09.0 + + + +

Poppler is a PDF rendering library based on the xpdf-3.0 code base.

+
+ +

Multiple vulnerabilities have been discovered in Poppler. Please review the CVE identifiers referenced below for details.

+
+ +

Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code.

+
+ +

Avoid opening untrusted PDFs.

+
+ +

All Poppler users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/poppler-22.09.0" + +
+ + CVE-2021-30860 + CVE-2022-38784 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-22.xml new file mode 100644 index 0000000000..436a596527 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-22.xml @@ -0,0 +1,42 @@ + + + + Kitty: Arbitrary Code Execution + A vulnerability has been found in Kitty which could allow for arbitrary code execution with user input. + kitty + 2022-09-29 + 2022-09-29 + 868543 + remote + + + 0.26.2 + 0.26.2 + + + +

Kitty is a fast, feature-rich, GPU-based terminal.

+
+ +

Carter Sande discovered that maliciously constructed control sequences can cause Kitty to display a notification that, when clicked, can cause Kitty to execute arbitrary commands.

+
+ +

Kitty can produce notifications that, when clicked, can execute arbitrary commands.

+
+ +

Avoid clicking unexpected notifications.

+
+ +

All Kitty users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-terms/kitty-0.26.2" + +
+ + CVE-2022-41322 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-23.xml new file mode 100644 index 0000000000..58f76d401f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-23.xml @@ -0,0 +1,112 @@ + + + + Chromium, Google Chrome, Microsoft Edge: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution. + chromium,chromium-bin,google-chrome,microsoft-edge + 2022-09-29 + 2022-09-29 + 868156 + 868354 + 872407 + 870142 + remote + + + 105.0.5195.125 + 105.0.5195.125 + + + 105.0.5195.125 + 105.0.5195.125 + + + 105.0.5195.125 + 105.0.5195.125 + + + 105.0.1343.42 + 105.0.1343.42 + + + +

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. + +Google Chrome is one fast, simple, and secure browser for all your devices. + +Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

+
+ +

Multiple vulnerabilities have been discovered in Chromium, Google Chrome, Microsoft Edge. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-105.0.5195.125" + + +

All Chromium binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-bin-105.0.5195.125" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-105.0.5195.125" + + +

All Microsoft Edge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-105.0.1343.42" + +
+ + CVE-2022-3038 + CVE-2022-3039 + CVE-2022-3040 + CVE-2022-3041 + CVE-2022-3042 + CVE-2022-3043 + CVE-2022-3044 + CVE-2022-3045 + CVE-2022-3046 + CVE-2022-3047 + CVE-2022-3048 + CVE-2022-3049 + CVE-2022-3050 + CVE-2022-3051 + CVE-2022-3052 + CVE-2022-3053 + CVE-2022-3054 + CVE-2022-3055 + CVE-2022-3056 + CVE-2022-3057 + CVE-2022-3058 + CVE-2022-3071 + CVE-2022-3075 + CVE-2022-3195 + CVE-2022-3196 + CVE-2022-3197 + CVE-2022-3198 + CVE-2022-3199 + CVE-2022-3200 + CVE-2022-3201 + CVE-2022-38012 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-24.xml new file mode 100644 index 0000000000..218e97d925 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-24.xml @@ -0,0 +1,61 @@ + + + + Expat: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Expat, the worst of which could result in arbitrary code execution. + expat + 2022-09-29 + 2022-09-29 + 791703 + 830422 + 831918 + 833431 + 870097 + remote + + + 2.4.9 + 2.4.9 + + + +

Expat is a set of XML parsing libraries.

+
+ +

Multiple vulnerabilities have been discovered in Expat. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Expat users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/expat-2.4.9" + +
+ + CVE-2021-45960 + CVE-2021-46143 + CVE-2022-22822 + CVE-2022-22823 + CVE-2022-22824 + CVE-2022-22825 + CVE-2022-22826 + CVE-2022-22827 + CVE-2022-23852 + CVE-2022-23990 + CVE-2022-25235 + CVE-2022-25236 + CVE-2022-25313 + CVE-2022-25314 + CVE-2022-25315 + CVE-2022-40674 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-25.xml new file mode 100644 index 0000000000..29e1792c1e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-25.xml @@ -0,0 +1,42 @@ + + + + Zutty: Arbitrary Code Execution + A vulnerability has been discovered in Zutty which could allow for arbitrary code execution. + zutty + 2022-09-29 + 2022-09-29 + 868495 + remote + + + 0.13 + 0.13 + + + +

Zutty is an X terminal emulator rendering through OpenGL ES Compute Shaders.

+
+ +

Zutty does not correctly handle invalid DECRQSS commands, which can be exploited to run arbitrary commands in the terminal.

+
+ +

Untrusted text written to the Zutty terminal can achieve arbitrary code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All Zutty users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-terms/zutty-0.13" + +
+ + CVE-2022-41138 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-26.xml new file mode 100644 index 0000000000..aad69644bc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-26.xml @@ -0,0 +1,49 @@ + + + + Go: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Go, the worst of which could result in denial of service. + go + 2022-09-29 + 2022-09-29 + 869002 + remote + + + 1.18.6 + 1.18.6 + + + +

Go is an open source programming language that makes it easy to build simple, reliable, and efficient software.

+
+ +

Multiple vulnerabilities have been discovered in Go. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Go users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/go-1.18.6" + + +

In addition, users using Portage 3.0.9 or later should ensure that packages with Go binaries have no vulnerable code statically linked into their binaries by rebuilding the @golang-rebuild set:

+ + + # emerge --ask --oneshot --verbose @golang-rebuild + +
+ + CVE-2022-27664 + CVE-2022-32190 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-27.xml new file mode 100644 index 0000000000..7b945322ea --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-27.xml @@ -0,0 +1,76 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution. + firefox,firefox-bin + 2022-09-29 + 2022-09-29 + 872059 + remote + + + 105.0 + 102.3.0 + 105.0 + 102.3.0 + + + 105.0 + 102.3.0 + 105.0 + 102.3.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-102.3.0" + + +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-102.3.0" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-105.0" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-105.0" + +
+ + CVE-2022-40956 + CVE-2022-40957 + CVE-2022-40958 + CVE-2022-40959 + CVE-2022-40960 + CVE-2022-40962 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-01.xml new file mode 100644 index 0000000000..2fdb25ec8e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-01.xml @@ -0,0 +1,42 @@ + + + + Open Asset Import Library ("assimp"): Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Open Asset Import Library, the worst of which could result in denial of service. + assimp + 2022-10-16 + 2022-10-16 + 830374 + remote + + + 5.2.2 + 5.2.2 + + + +

Open Asset Import Library is a library to import and export various 3d-model-formats including scene-post-processing to generate missing render data.

+
+ +

Multiple vulnerabilities have been discovered in Fetchmail, the worst of which could result in email disclosure to third parties.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Open Asset Import Library users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/assimp-5.2.2" + +
+ + CVE-2021-45948 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-02.xml new file mode 100644 index 0000000000..5177565570 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-02.xml @@ -0,0 +1,54 @@ + + + + OpenSSL: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenSSL, the worst of which could result in denial of service. + openssl + 2022-10-16 + 2022-10-16 + 741570 + 809980 + 832339 + 835343 + 842489 + 856592 + remote + + + 1.1.1q + 1.1.1q + + + +

OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general purpose cryptography library.

+
+ +

Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSSL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.1.1q" + +
+ + CVE-2020-1968 + CVE-2021-3711 + CVE-2021-3712 + CVE-2021-4160 + CVE-2022-0778 + CVE-2022-1292 + CVE-2022-1473 + CVE-2022-2097 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-03.xml new file mode 100644 index 0000000000..22e5f517c9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-03.xml @@ -0,0 +1,45 @@ + + + + libxml2: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in libxml2, the worst of which could result in arbitrary code execution. + libxml2 + 2022-10-16 + 2022-10-16 + 833809 + 842261 + 865727 + remote + + + 2.10.2 + 2.10.2 + + + +

libxml2 is the XML C parser and toolkit developed for the GNOME project.

+
+ +

Multiple vulnerabilities have been discovered in libxml2. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libxml2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.10.2" + +
+ + CVE-2022-23308 + CVE-2022-29824 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-04.xml new file mode 100644 index 0000000000..78e40dcfbb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-04.xml @@ -0,0 +1,68 @@ + + + + Wireshark: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service. + wireshark + 2022-10-16 + 2022-10-16 + 802216 + 824474 + 830343 + 833294 + 869140 + remote + + + 3.6.8 + 3.6.8 + + + +

Wireshark is a versatile network protocol analyzer.

+
+ +

Multiple vulnerabilities have been discovered in Wireshark. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Wireshark users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-3.6.8" + +
+ + CVE-2021-4181 + CVE-2021-4182 + CVE-2021-4183 + CVE-2021-4184 + CVE-2021-4185 + CVE-2021-4186 + CVE-2021-4190 + CVE-2021-22235 + CVE-2021-39920 + CVE-2021-39921 + CVE-2021-39922 + CVE-2021-39924 + CVE-2021-39925 + CVE-2021-39926 + CVE-2021-39928 + CVE-2021-39929 + CVE-2022-0581 + CVE-2022-0582 + CVE-2022-0583 + CVE-2022-0585 + CVE-2022-0586 + WNPA-SEC-2021-06 + WNPA-SEC-2022-06 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-05.xml new file mode 100644 index 0000000000..ef3f453950 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-05.xml @@ -0,0 +1,43 @@ + + + + virglrenderer: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in virglrenderer, the worst of which could result in remote code execution. + virglrenderer + 2022-10-16 + 2022-10-16 + 866821 + remote + + + 0.10.1 + 0.10.1 + + + +

A virtual 3D GPU library, that allows the guest operating system to use the host GPU to accelerate 3D rendering.

+
+ +

Multiple vulnerabilities have been discovered in virglrenderer. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All virglrenderer users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/virglrenderer-0.10.1" + +
+ + CVE-2022-0135 + CVE-2022-0175 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-06.xml new file mode 100644 index 0000000000..2133f4bfc4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-06.xml @@ -0,0 +1,60 @@ + + + + libvirt: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in libvirt, the worst of which could result in denial of service. + libvirt,libvirt-python + 2022-10-16 + 2022-10-16 + 746119 + 799713 + 812317 + 836128 + remote + + + 8.2.0 + 8.2.0 + + + 8.2.0 + 8.2.0 + + + +

libvirt is a C toolkit for manipulating virtual machines.

+
+ +

Multiple vulnerabilities have been discovered in libvirt. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libvirt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/libvirt-8.2.0" + + +

All libvirt-python users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/libvirt-python-8.2.0" + +
+ + CVE-2020-14339 + CVE-2020-25637 + CVE-2021-3631 + CVE-2021-3667 + CVE-2022-0897 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-07.xml new file mode 100644 index 0000000000..23531d82ae --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-07.xml @@ -0,0 +1,42 @@ + + + + Deluge: Cross-Site Scripting + A vulnerability has been found in Deluge which could result in XSS. + deluge + 2022-10-16 + 2022-10-16 + 866842 + remote + + + 2.1.1 + 2.1.1 + + + +

Deluge is a BitTorrent client.

+
+ +

Deluge does not sufficiently sanitize crafted torrent file data, leading to the application interpreting untrusted data as HTML.

+
+ +

An attacker can achieve XSS via a crafted torrent file.

+
+ +

There is no known workaround at this time.

+
+ +

All Deluge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-p2p/deluge-2.1.1" + +
+ + CVE-2021-3427 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-08.xml new file mode 100644 index 0000000000..258553a8b8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-08.xml @@ -0,0 +1,54 @@ + + + + Tcpreplay: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Tcpreplay, the worst of which could result in denial of service. + tcpreplay + 2022-10-16 + 2022-10-16 + 833139 + 836240 + remote + + + 4.4.2 + 4.4.2 + + + +

Tcpreplay is a suite of utilities for UNIX systems for editing and replaying network traffic which was previously captured by tools like tcpdump and ethereal/wireshark.

+
+ +

Multiple vulnerabilities have been discovered in Tcpreplay. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Tcpreplay users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/tcpreplay-4.4.2" + +
+ + CVE-2021-45386 + CVE-2021-45387 + CVE-2022-27416 + CVE-2022-27418 + CVE-2022-27939 + CVE-2022-27940 + CVE-2022-27941 + CVE-2022-27942 + CVE-2022-28487 + CVE-2022-37047 + CVE-2022-37048 + CVE-2022-37049 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-09.xml new file mode 100644 index 0000000000..dbb426860d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-09.xml @@ -0,0 +1,76 @@ + + + + Rust: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service. + rust,rust-bin + 2022-10-16 + 2022-10-16 + 870166 + 831638 + 821157 + 807052 + 782367 + remote + + + 1.63.0-r1 + 1.63.0-r1 + + + 1.64.0 + 1.64.0 + + + +

A systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety.

+
+ +

Multiple vulnerabilities have been discovered in Rust. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Rust users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/rust-1.63.0-r1" + + +

All Rust binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/rust-bin-1.64.0" + + +

In addition, users using Portage 3.0.38 or later should ensure that packages with Rust binaries have no vulnerable code statically linked into their binaries by rebuilding the @rust-rebuild set:

+ + + # emerge --ask --oneshot --verbose @rust-rebuild + +
+ + CVE-2021-28875 + CVE-2021-28876 + CVE-2021-28877 + CVE-2021-28878 + CVE-2021-28879 + CVE-2021-29922 + CVE-2021-31162 + CVE-2021-36317 + CVE-2021-36318 + CVE-2021-42574 + CVE-2021-42694 + CVE-2022-21658 + CVE-2022-36113 + CVE-2022-36114 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-10.xml new file mode 100644 index 0000000000..a4dcc0e92c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-10.xml @@ -0,0 +1,57 @@ + + + + LibTIFF: Multiple Vulnerabilities + Multiple vulnerabilities have been found in LibTIFF, the worst of which could result in denial of service. + tiff + 2022-10-31 + 2022-10-31 + 830981 + 837560 + remote + + + 4.4.0 + 4.4.0 + + + +

LibTIFF provides support for reading and manipulating TIFF (Tagged Image File Format) images.

+
+ +

Multiple vulnerabilities have been discovered in LibTIFF. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All LibTIFF users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/tiff-4.4.0" + +
+ + CVE-2022-0561 + CVE-2022-0562 + CVE-2022-0865 + CVE-2022-0891 + CVE-2022-0907 + CVE-2022-0908 + CVE-2022-0909 + CVE-2022-0924 + CVE-2022-1056 + CVE-2022-1210 + CVE-2022-1354 + CVE-2022-1355 + CVE-2022-1622 + CVE-2022-1623 + CVE-2022-22844 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-11.xml new file mode 100644 index 0000000000..7db2fb28e4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-11.xml @@ -0,0 +1,42 @@ + + + + schroot: Denial of Service + A vulnerability has been discovered in schroot which could result in denial of service of the schroot service. + schroot + 2022-10-31 + 2022-10-31 + 867016 + remote + + + 1.6.13_p2 + 1.6.13_p2 + + + +

schroot is a utility to execute commands in a chroot environment.

+
+ +

schroot is unecessarily permissive in rules regarding chroot and session names.

+
+ +

A crafted chroot or session name can break the internal state of the schroot service, leading to denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All schroot users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-util/schroot-1.6.13" + +
+ + CVE-2022-2787 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-12.xml new file mode 100644 index 0000000000..fe42a61690 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-12.xml @@ -0,0 +1,43 @@ + + + + Lighttpd: Denial of Service + A vulnerability has been discovered in lighttpd which could result in denial of service. + lighttpd + 2022-10-31 + 2022-10-31 + 869890 + remote + + + 1.4.67 + 1.4.67 + + + +

Lighttpd is a lightweight high-performance web server.

+
+ +

Lighttpd's mod_wstunnel does not initialize a handler function pointer if an invalid HTTP request (websocket handshake) is received.

+
+ +

An attacker can trigger a denial of service via making Lighttpd try to call an uninitialized function pointer.

+
+ +

There is no known workaround at this time.

+
+ +

All lighttpd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.67" + +
+ + CVE-2022-37797 + CVE-2022-41556 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-13.xml new file mode 100644 index 0000000000..2a9427d61d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-13.xml @@ -0,0 +1,45 @@ + + + + libgcrypt: Multiple Vulnerabilities + Multiple vulnerabilities have been found in libgcrypt, the worst of which could result in denial of service. + libgcrypt + 2022-10-31 + 2022-10-31 + 766213 + 795480 + 811900 + remote + + + 1.9.4 + 1.9.4 + + + +

libgcrypt is a general purpose cryptographic library derived out of GnuPG.

+
+ +

Multiple vulnerabilities have been discovered in libgcrypt. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libgcrypt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libgcrypt-1.9.4" + +
+ + CVE-2021-33560 + CVE-2021-40528 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-14.xml new file mode 100644 index 0000000000..e6f40a3325 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-14.xml @@ -0,0 +1,48 @@ + + + + Gitea: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Gitea, the worst of which could lead to denial of service + gitea + 2022-10-31 + 2022-10-31 + 848465 + 857819 + 868996 + 877355 + remote + + + 1.17.3 + 1.17.3 + + + +

Gitea is a painless self-hosted Git service.

+
+ +

Multiple vulnerabilities have been discovered in Gitea. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Gitea users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-apps/gitea-1.17.3" + +
+ + CVE-2022-1928 + CVE-2022-32149 + CVE-2022-38183 + CVE-2022-42968 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-15.xml new file mode 100644 index 0000000000..6f78f4a845 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-15.xml @@ -0,0 +1,42 @@ + + + + GDAL: Heap Buffer Overflow + A heap buffer overflow vulnerability has been found in GDAL which could result in denial of service. + gdal + 2022-10-31 + 2022-10-31 + 830370 + remote + + + 3.4.1 + 3.4.1 + + + +

GDAL is a geospatial data abstraction library.

+
+ +

GDAL does not sufficiently sanitize input when loading PCIDSK binary segments.

+
+ +

Loading crafted PCIDSK data via GDAL could result in denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All GDAL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sci-libs/gdal-3.4.1" + +
+ + CVE-2021-45943 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-16.xml new file mode 100644 index 0000000000..90204a61ee --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-16.xml @@ -0,0 +1,106 @@ + + + + Chromium, Google Chrome, Microsoft Edge: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution. + chromium,chromium-bin,google-chrome,microsoft-edge + 2022-10-31 + 2022-10-31 + 873817 + 874855 + 876855 + 873217 + remote + + + 106.0.5249.119 + 106.0.5249.119 + + + 106.0.5249.119 + 106.0.5249.119 + + + 106.0.5249.119 + 106.0.5249.119 + + + 106.0.1370.37 + 106.0.1370.37 + + + +

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. + +Google Chrome is one fast, simple, and secure browser for all your devices. + +Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

+
+ +

Multiple vulnerabilities have been discovered in Chromium, Google Chrome, and Microsoft Edge. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-106.0.5249.119" + + +

All Chromium binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-bin-106.0.5249.119" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-106.0.5249.119" + + +

All Microsoft Edge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-106.0.1370.37" + +
+ + CVE-2022-3201 + CVE-2022-3304 + CVE-2022-3305 + CVE-2022-3306 + CVE-2022-3307 + CVE-2022-3308 + CVE-2022-3309 + CVE-2022-3310 + CVE-2022-3311 + CVE-2022-3312 + CVE-2022-3313 + CVE-2022-3314 + CVE-2022-3315 + CVE-2022-3316 + CVE-2022-3317 + CVE-2022-3318 + CVE-2022-3370 + CVE-2022-3373 + CVE-2022-3445 + CVE-2022-3446 + CVE-2022-3447 + CVE-2022-3448 + CVE-2022-3449 + CVE-2022-3450 + CVE-2022-41035 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-17.xml new file mode 100644 index 0000000000..244b3eb9ce --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-17.xml @@ -0,0 +1,46 @@ + + + + JHead: Multiple Vulnerabilities + Multiple vulnerabilities have been found in JHead, the worst of which could result in denial of service. + jhead + 2022-10-31 + 2022-10-31 + 730746 + remote + + + 3.06.0.1 + 3.06.0.1 + + + +

JHead is an EXIF JPEG header manipulation tool.

+
+ +

Multiple vulnerabilities have been discovered in JHead. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All JHead users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/jhead-3.06.0.1" + +
+ + CVE-2021-3496 + CVE-2021-28275 + CVE-2021-28276 + CVE-2021-28277 + CVE-2021-28278 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-18.xml new file mode 100644 index 0000000000..02b970e9b3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-18.xml @@ -0,0 +1,44 @@ + + + + Sofia-SIP: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Sofia-SIP, the worst of which could result in remote code execution. + sofia-sip + 2022-10-31 + 2022-10-31 + 848870 + remote + + + 1.13.8 + 1.13.8 + + + +

Sofia-SIP is an RFC3261 compliant SIP User-Agent library.

+
+ +

Multiple vulnerabilities have been discovered in Sofia-SIP. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Sofia-SIP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/sofia-sip-1.13.8" + +
+ + CVE-2022-31001 + CVE-2022-31002 + CVE-2022-31003 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-19.xml new file mode 100644 index 0000000000..c76898e3fe --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-19.xml @@ -0,0 +1,42 @@ + + + + Apptainer: Lack of Digital Signature Hash Verification + A vulnerability has been found in Apptainer which could result in the usage of an unexpected of a container. + apptainer + 2022-10-31 + 2022-10-31 + 875869 + remote + + + 1.1.2 + 1.1.2 + + + +

Apptainer is the container system for secure high-performance computing.

+
+ +

The Go module "sif" version 2.8.0 and older, which is a statically linked dependency of Apptainer, does not verify that the hash algorithm(s) used are cryptographically secure when verifying digital signatures.

+
+ +

An image whose verification relies on a cryptographically insecure hash algorithm could be replaced, resulting in users using an image other than the one that was expected.

+
+ +

There is no known workaround at this time.

+
+ +

All Apptainer users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-containers/apptainer-1.1.2" + +
+ + CVE-2022-39237 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-20.xml new file mode 100644 index 0000000000..0efb8be7c4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-20.xml @@ -0,0 +1,42 @@ + + + + Nicotine+: Denial of Service + A vulnerability has been found in Nicotine+ which could result in denial of service. + nicotine+ + 2022-10-31 + 2022-10-31 + 835374 + remote + + + 3.2.1 + 3.2.1 + + + +

Nicotine+ is a fork of nicotine, a Soulseek client in Python.

+
+ +

Nicotine+ does not sufficiently validate file path in download requests.

+
+ +

A file path in a download request which contains a null character will cause a crash of Nicotine+.

+
+ +

There is no known workaround at this time.

+
+ +

All Nicotine+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-p2p/nicotine+-3.2.1" + +
+ + CVE-2021-45848 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-21.xml new file mode 100644 index 0000000000..048f9d1f38 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-21.xml @@ -0,0 +1,43 @@ + + + + FasterXML jackson-databind: Multiple vulnerabilities + Multiple vulnerabilities have been found in FasterXML jackson-databind, the worst of which could result in denial of service. + jackson-databind + 2022-10-31 + 2022-10-31 + 874033 + remote + + + 2.13.4.1 + 2.13.4.1 + + + +

FasterXML jackson-databind is a general data-binding package for Jackson (2.x) which works on streaming API (core) implementation(s).

+
+ +

Multiple vulnerabilities have been discovered in FasterXML jackson-databind. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All FasterXML jackson-databind users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/jackson-databind-2.13.4.1" + +
+ + CVE-2022-42003 + CVE-2022-42004 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-22.xml new file mode 100644 index 0000000000..871a489db2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-22.xml @@ -0,0 +1,46 @@ + + + + RPM: Multiple Vulnerabilities + Multiple vulnerabilities have been found in RPM, the worst of which could lead to root privilege escalation. + rpm + 2022-10-31 + 2022-10-31 + 830380 + 866716 + remote + + + 4.18.0 + 4.18.0 + + + +

The Red Hat Package Manager (RPM) is a command line driven package management system capable of installing, uninstalling, verifying, querying, and updating computer software packages.

+
+ +

Multiple vulnerabilities have been discovered in RPM. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All RPM users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/rpm-4.18.0" + +
+ + CVE-2021-3521 + CVE-2021-35937 + CVE-2021-35938 + CVE-2021-35939 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-23.xml new file mode 100644 index 0000000000..8d0b1439c5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-23.xml @@ -0,0 +1,42 @@ + + + + libksba: Remote Code Execution + An integer overflow vulnerability has been found in libksba which could result in remote code execution. + libksba + 2022-10-31 + 2022-10-31 + 877453 + remote + + + 1.6.2 + 1.6.2 + + + +

Libksba is a X.509 and CMS (PKCS#7) library.

+
+ +

An integer overflow in parsing ASN.1 objects could lead to a buffer overflow.

+
+ +

Crafted ASN.1 objects could trigger an integer overflow and buffer overflow to result in remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All libksba users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libksba-1.6.2" + +
+ + CVE-2022-3515 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-24.xml new file mode 100644 index 0000000000..50c5aee207 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-24.xml @@ -0,0 +1,49 @@ + + + + FreeRDP: Multiple Vulnerabilities + Multiple vulnerabilities have been found in FreeRDP, the worst of which could result in remote code execution. + freerdp + 2022-10-31 + 2022-10-31 + 876905 + 842231 + 819534 + remote + + + 2.8.1 + 2.8.1 + + + +

FreeRDP is a free implementation of the remote desktop protocol.

+
+ +

Multiple vulnerabilities have been discovered in FreeRDP. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All FreeRDP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/freerdp-2.8.1" + +
+ + CVE-2021-41159 + CVE-2021-41160 + CVE-2022-24882 + CVE-2022-24883 + CVE-2022-39282 + CVE-2022-39283 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-25.xml new file mode 100644 index 0000000000..e424e32709 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-25.xml @@ -0,0 +1,63 @@ + + + + ISC BIND: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service. + bind,bind-tools + 2022-10-31 + 2022-10-31 + 820563 + 835439 + 872206 + remote + + + 9.16.33 + 9.16.33 + + + 9.16.33 + 9.16.33 + + + +

ISC BIND is the Internet Systems Consortium implementation of the Domain Name System (DNS) protocol.

+
+ +

Multiple vulnerabilities have been discovered in ISC BIND. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All ISC BIND users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dns/bind-9.16.33" + + +

All ISC BIND-tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dns/bind-tools-9.16.33" + +
+ + CVE-2021-25219 + CVE-2021-25220 + CVE-2022-0396 + CVE-2022-2795 + CVE-2022-2881 + CVE-2022-2906 + CVE-2022-3080 + CVE-2022-38177 + CVE-2022-38178 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-26.xml new file mode 100644 index 0000000000..af8eba5fe7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-26.xml @@ -0,0 +1,42 @@ + + + + Shadow: TOCTOU Race + A TOCTOU race has been discovered in Shadow, which could result in the unauthorized modification of files. + shadow + 2022-10-31 + 2022-10-31 + 830486 + remote + + + 4.12.2 + 4.12.2 + + + +

Shadow contains utilities to deal with user accounts

+
+ +

A TOCTOU race condition was discovered in shadow. A local attacker with write privileges in a directory removed or copied by usermod/userdel could potentially exploit this flaw when the administrator invokes usermod/userdel.

+
+ +

An unauthorized user could potentially modify files which they do not have write permissions for.

+
+ +

There is no known workaround at this time.

+
+ +

All Shadow users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.12.2" + +
+ + CVE-2013-4235 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-27.xml new file mode 100644 index 0000000000..d8bb0cfcd2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-27.xml @@ -0,0 +1,43 @@ + + + + open-vm-tools: Local Privilege Escalation + A vulnerability has been discovered in open-vm-tools which could allow for local privilege escalation. + open-vm-tools + 2022-10-31 + 2022-10-31 + 866227 + remote + + + 12.1.0 + 12.1.0 + + + +

open-vm-tools contains tools for VMware guests.

+
+ +

A pipe accessible to unprivileged users in the VMWare guest does not sufficiently sanitize input.

+
+ +

An unprivileged guest user could achieve root privileges within the guest.

+
+ +

There is no known workaround at this time.

+
+ +

All open-vm-tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/open-vm-tools-12.1.0" + +
+ + CVE-2022-31676 + VMSA-2022-0024.1 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-28.xml new file mode 100644 index 0000000000..c8bdc202aa --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-28.xml @@ -0,0 +1,42 @@ + + + + exif: Denial of Service + A vulnerability has been discovered in exif which could result in denial of service. + exif + 2022-10-31 + 2022-10-31 + 783522 + remote + + + 0.6.22 + 0.6.22 + + + +

libexif is a library for parsing, editing and saving Exif metadata from images. exif is a small command line interface for libexif.

+
+ +

There is a bug in exif's XML output format which can result in a null pointer dereference when outputting crafted JPEG EXIF data.

+
+ +

A crafted JPEG image can trigger a denial of service in the form of a null pointer dereference.

+
+ +

There is no known workaround at this time.

+
+ +

All exif users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/exif-0.6.22" + +
+ + CVE-2021-27815 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-29.xml new file mode 100644 index 0000000000..4f9e39cbb9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-29.xml @@ -0,0 +1,47 @@ + + + + Net-SNMP: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Net-SNMP, the worst of which could result in denial of service. + net-snmp + 2022-10-31 + 2022-10-31 + 855500 + remote + + + 5.9.2 + 5.9.2 + + + +

Net-SNMP is a suite of applications used to implement the Simple Network Management Protocol.

+
+ +

Multiple vulnerabilities have been discovered in Net-SNMP. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Net-SNMP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.9.2" + +
+ + CVE-2022-24805 + CVE-2022-24806 + CVE-2022-24807 + CVE-2022-24808 + CVE-2022-24809 + CVE-2022-24810 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-30.xml new file mode 100644 index 0000000000..faf6cd204e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-30.xml @@ -0,0 +1,54 @@ + + + + X.Org X server, XWayland: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in remote code execution. + xorg-server,xwayland + 2022-10-31 + 2022-10-31 + 857780 + remote + + + 21.1.4 + 21.1.4 + + + 22.1.3 + 22.1.3 + + + +

The X Window System is a graphical windowing system based on a client/server model.

+
+ +

Multiple vulnerabilities have been discovered in X.Org X server and XWayland. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All X.Org X server users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-21.1.4" + + +

All XWayland users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-base/xwayland-22.1.3" + +
+ + CVE-2022-2319 + CVE-2022-2320 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-31.xml new file mode 100644 index 0000000000..2c913f0d4b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-31.xml @@ -0,0 +1,53 @@ + + + + OpenEXR: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenEXR, the worst of which could result in arbitrary code execution. + openexr + 2022-10-31 + 2022-10-31 + 838079 + 830384 + 817431 + 810541 + 801373 + 787452 + remote + + + 3.1.5 + 3.1.5 + + + +

OpenEXR is a high dynamic-range (HDR) image file format developed by Industrial Light & Magic for use in computer imaging applications.

+
+ +

Multiple vulnerabilities have been discovered in OpenEXR. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenEXR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/openexr-3.1.5" + +
+ + CVE-2021-3598 + CVE-2021-3605 + CVE-2021-3933 + CVE-2021-3941 + CVE-2021-20304 + CVE-2021-23169 + CVE-2021-45942 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-32.xml new file mode 100644 index 0000000000..172d593855 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-32.xml @@ -0,0 +1,56 @@ + + + + hiredis, hiredis-py: Multiple Vulnerabilities + An integer overflow has been found in hiredis which could result in arbitrary code execution. + hiredis,hiredis + 2022-10-31 + 2022-10-31 + 873079 + 816318 + remote + + + 1.0.1 + 1.0.1 + + + 2.0.0 + 2.0.0 + + + +

hiredis is a minimalistic C client library for the Redis database. + +hiredis-py is a Python extension that wraps hiredis.

+
+ +

Hiredis is vulnerable to integer overflow if provided maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When parsing `multi-bulk` (array-like) replies, hiredis fails to check if `count * sizeof(redisReply*)` can be represented in `SIZE_MAX`. If it can not, and the `calloc()` call doesn't itself make this check, it would result in a short allocation and subsequent buffer overflow.

+
+ +

Malicious Redis commands could result in remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All hiredis users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/hiredis-1.0.1" + + +

All hiredis-py users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/hiredis-2.0.0" + +
+ + CVE-2021-32765 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-33.xml new file mode 100644 index 0000000000..a59781932a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-33.xml @@ -0,0 +1,54 @@ + + + + Libtirpc: Denial of Service + A vulnerability has been discovered in Libtirpc which could result in denial of service. + libtirpc + 2022-10-31 + 2022-10-31 + 859634 + remote + + + 1.3.2 + 1.3.2 + + + +

Libtirpc is a port of Sun's Transport-Independent RPC library to Linux.

+
+ +

Currently svc_run does not handle poll timeout and rendezvous_request +does not handle EMFILE error returned from accept(2 as it used to. +These two missing functionality were removed by commit b2c9430f46c4. + +The effect of not handling poll timeout allows idle TCP conections +to remain ESTABLISHED indefinitely. When the number of connections +reaches the limit of the open file descriptors (ulimit -n) then +accept(2) fails with EMFILE. Since there is no handling of EMFILE +error this causes svc_run() to get in a tight loop calling accept(2). +This resulting in the RPC service of svc_run is being down, it's +no longer able to service any requests. + +Due to a lack of handling of certain error cases, connections to Libtirpc could remain ESTABLISHED indefinitely.

+
+ +

Denial of service can be achieved via establishing enough connections to Libtirpc to reach the limit of open file descriptors for the process.

+
+ +

There is no known workaround at this time.

+
+ +

All Libtirpc users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/libtirpc-1.3.2" + +
+ + CVE-2021-46828 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-34.xml new file mode 100644 index 0000000000..06c691d6f8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-34.xml @@ -0,0 +1,76 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in arbitrary code execution. + firefox,firefox-bin + 2022-10-31 + 2022-10-31 + 877773 + remote + + + 106.0 + 102.4.0 + 106.0 + 102.4.0 + + + 106.0 + 102.4.0 + 106.0 + 102.4.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-102.4.0" + + +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-102.4.0" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-106.0" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-106.0" + +
+ + CVE-2022-42927 + CVE-2022-42928 + CVE-2022-42929 + CVE-2022-42930 + CVE-2022-42931 + CVE-2022-42932 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-35.xml new file mode 100644 index 0000000000..386fe8be29 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-35.xml @@ -0,0 +1,61 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. + thunderbird,thunderbird-bin + 2022-10-31 + 2022-10-31 + 873667 + 878315 + remote + + + 102.4.0 + 102.4.0 + + + 102.4.0 + 102.4.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-102.4.0" + + +

All Mozilla Thunderbird binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-102.4.0" + +
+ + CVE-2022-39236 + CVE-2022-39249 + CVE-2022-39250 + CVE-2022-39251 + CVE-2022-42927 + CVE-2022-42928 + CVE-2022-42929 + CVE-2022-42932 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-36.xml new file mode 100644 index 0000000000..04ac36eb67 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-36.xml @@ -0,0 +1,42 @@ + + + + libjxl: Denial of Service + A vulnerability has been found in libjxl which could result in denial of service. + libjxl + 2022-10-31 + 2022-10-31 + 856037 + remote + + + 0.7.0_pre20220825 + 0.7.0_pre20220825 + + + +

libjxl is the JPEG XL image format reference implementation.

+
+ +

libjxl contains an unecessary assertion in jxl::LowMemoryRenderPipeline::Init.

+
+ +

An attacker can cause a denial of service of the libjxl process via a crafted input file.

+
+ +

There is no known workaround at this time.

+
+ +

All users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libjxl-0.7.0_pre20220825" + +
+ + CVE-2022-34000 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-37.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-37.xml new file mode 100644 index 0000000000..2d82af3c3d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-37.xml @@ -0,0 +1,60 @@ + + + + PJSIP: Multiple Vulnerabilities + Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. + pjproject + 2022-10-31 + 2022-10-31 + 803614 + 829894 + 875863 + remote + + + 2.12.1 + 2.12.1 + + + +

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE.

+
+ +

Multiple vulnerabilities have been discovered in PJSIP. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All PJSIP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/pjproject-2.12.1" + +
+ + CVE-2021-32686 + CVE-2021-37706 + CVE-2021-41141 + CVE-2021-43804 + CVE-2021-43845 + CVE-2022-21722 + CVE-2022-21723 + CVE-2022-23608 + CVE-2022-24754 + CVE-2022-24763 + CVE-2022-24764 + CVE-2022-24786 + CVE-2022-24792 + CVE-2022-24793 + CVE-2022-31031 + CVE-2022-39244 + CVE-2022-39269 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-38.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-38.xml new file mode 100644 index 0000000000..82ab949397 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-38.xml @@ -0,0 +1,42 @@ + + + + Expat: Denial of Service + A vulnerability has been found in Expat which could result in denial of service. + expat + 2022-10-31 + 2022-10-31 + 878271 + remote + + + 2.5.0 + 2.5.0 + + + +

Expat is a set of XML parsing libraries.

+
+ +

In certain out-of-memory situations, Expat may free memory before it should, leading to a use-after-free.

+
+ +

A use-after-free can result in denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All Expat users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/expat-2.5.0" + +
+ + CVE-2022-43680 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-39.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-39.xml new file mode 100644 index 0000000000..ef2d7e2ae3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-39.xml @@ -0,0 +1,43 @@ + + + + libxml2: Multiple Vulnerabilities + Multiple vulnerabilities have been found in libxml2, the worst of which could result in arbitrary code execution. + libxml2 + 2022-10-31 + 2022-10-31 + 877149 + remote + + + 2.10.3 + 2.10.3 + + + +

libxml2 is the XML C parser and toolkit developed for the GNOME project.

+
+ +

Multiple vulnerabilities have been discovered in libxml2. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libxml2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.10.3" + +
+ + CVE-2022-40303 + CVE-2022-40304 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-40.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-40.xml new file mode 100644 index 0000000000..6f4199b223 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-40.xml @@ -0,0 +1,44 @@ + + + + SQLite: Multiple Vulnerabilities + Multiple vulnerabilities have been found in SQLite, the worst of which could result in arbitrary code execution. + sqlite + 2022-10-31 + 2022-10-31 + 777990 + 863431 + remote + + + 3.39.2 + 3.39.2 + + + +

SQLite is a C library that implements an SQL database engine.

+
+ +

Multiple vulnerabilities have been discovered in SQLite. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All SQLite users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/sqlite-3.39.2" + +
+ + CVE-2021-20227 + CVE-2022-35737 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-41.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-41.xml new file mode 100644 index 0000000000..ef96ac8f4e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-41.xml @@ -0,0 +1,43 @@ + + + + android-tools: Multiple Vulnerabilities + Multiple vulnerabilities have been found in android-tools, the worst of which could result in arbitrary code execution. + android-tools + 2022-10-31 + 2022-10-31 + 878281 + remote + + + 33.0.3 + 33.0.3 + + + +

android-tools contains Android platform tools (adb, fastboot, and mkbootimg).

+
+ +

Multiple vulnerabilities have been discovered in android-tools. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All android-tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-util/android-tools-33.0.3" + +
+ + CVE-2022-3168 + CVE-2022-20128 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-42.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-42.xml new file mode 100644 index 0000000000..608226a9c7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-42.xml @@ -0,0 +1,44 @@ + + + + zlib: Multiple vulnerabilities + A buffer overflow in zlib might allow an attacker to cause remote code execution. + zlib + 2022-10-31 + 2022-10-31 + 863851 + 835958 + remote + + + 1.2.12-r3 + 1.2.12-r3 + + + +

zlib is a widely used free and patent unencumbered data compression library.

+
+ +

Multiple vulnerabilities have been discovered in zlib. Please review the CVE identifiers referenced below for details.

+
+ +

Maliciously crafted input handled by zlib may result in remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All zlib users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/zlib-1.2.12-r3" + +
+ + CVE-2018-25032 + CVE-2022-37434 + + sam + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-01.xml new file mode 100644 index 0000000000..b95d1a1de5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-01.xml @@ -0,0 +1,43 @@ + + + + OpenSSL: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenSSL, the worst of which could result in remote code execution. + openssl + 2022-11-01 + 2022-11-01 + 878269 + remote + + + 3.0.7 + 3.0.7 + + + +

OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general purpose cryptography library.

+
+ +

Multiple buffer overflows exist in OpenSSL's handling of TLS certificates for client authentication.

+
+ +

It is believed that, while unlikely, code execution is possible in certain system configurations.

+
+ +

Users operating TLS servers may consider disabling TLS client authentication, if it is being used, until fixes are applied.

+
+ +

All OpenSSL 3 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-3.0.7" + +
+ + CVE-2022-3602 + CVE-2022-3786 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-02.xml new file mode 100644 index 0000000000..982dbfe367 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-02.xml @@ -0,0 +1,42 @@ + + + + lesspipe: Arbitrary Code Exeecution + A vulnerability has been found in lesspipe which could result in arbitrary code execution. + lesspipe + 2022-11-10 + 2022-11-10 + 865631 + remote + + + 2.06 + 2.06 + + + +

lesspipe is a preprocessor for less.

+
+ +

lesspipe has support for parsing Perl storable ("PST") files,

+
+ +

A crafted Perl storable file which is passed into lesspipe could result in arbitrary code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All lesspipe users should update to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/lesspipe-2.06" + +
+ + CVE-2022-44542 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index f83144c1e1..b85b4f37be 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 14 Feb 2022 12:39:11 +0000 +Fri, 18 Nov 2022 11:39:53 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 1ddda011c9..856b1311a2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -d2418b0a913a694a55e21440268b44301931867c 1643686264 2022-02-01T03:31:04+00:00 +d2caa7d73160aa5b9c9cda07665068a8b25fa730 1668098162 2022-11-10T16:36:02+00:00