From 8e6121e55e6373407913036ea2889c24c0fcf5f4 Mon Sep 17 00:00:00 2001 From: Benjamin Gilbert Date: Thu, 16 Apr 2020 06:12:34 +0000 Subject: [PATCH] bump(metadata/glsa): sync with upstream --- .../portage-stable/metadata/glsa/Manifest | 30 ++-- .../metadata/glsa/Manifest.files.gz | Bin 450288 -> 462212 bytes .../metadata/glsa/glsa-201807-03.xml | 2 +- .../metadata/glsa/glsa-201807-04.xml | 2 +- .../metadata/glsa/glsa-202003-01.xml | 48 ++++++ .../metadata/glsa/glsa-202003-02.xml | 104 ++++++++++++ .../metadata/glsa/glsa-202003-03.xml | 102 ++++++++++++ .../metadata/glsa/glsa-202003-04.xml | 65 ++++++++ .../metadata/glsa/glsa-202003-05.xml | 53 ++++++ .../metadata/glsa/glsa-202003-06.xml | 65 ++++++++ .../metadata/glsa/glsa-202003-07.xml | 52 ++++++ .../metadata/glsa/glsa-202003-08.xml | 156 ++++++++++++++++++ .../metadata/glsa/glsa-202003-09.xml | 56 +++++++ .../metadata/glsa/glsa-202003-10.xml | 106 ++++++++++++ .../metadata/glsa/glsa-202003-11.xml | 42 +++++ .../metadata/glsa/glsa-202003-12.xml | 55 ++++++ .../metadata/glsa/glsa-202003-13.xml | 53 ++++++ .../metadata/glsa/glsa-202003-14.xml | 53 ++++++ .../metadata/glsa/glsa-202003-15.xml | 54 ++++++ .../metadata/glsa/glsa-202003-16.xml | 52 ++++++ .../metadata/glsa/glsa-202003-17.xml | 55 ++++++ .../metadata/glsa/glsa-202003-18.xml | 52 ++++++ .../metadata/glsa/glsa-202003-19.xml | 50 ++++++ .../metadata/glsa/glsa-202003-20.xml | 48 ++++++ .../metadata/glsa/glsa-202003-21.xml | 56 +++++++ .../metadata/glsa/glsa-202003-22.xml | 94 +++++++++++ .../metadata/glsa/glsa-202003-23.xml | 51 ++++++ .../metadata/glsa/glsa-202003-24.xml | 50 ++++++ .../metadata/glsa/glsa-202003-25.xml | 58 +++++++ .../metadata/glsa/glsa-202003-26.xml | 87 ++++++++++ .../metadata/glsa/glsa-202003-27.xml | 50 ++++++ .../metadata/glsa/glsa-202003-28.xml | 55 ++++++ .../metadata/glsa/glsa-202003-29.xml | 53 ++++++ .../metadata/glsa/glsa-202003-30.xml | 76 +++++++++ .../metadata/glsa/glsa-202003-31.xml | 55 ++++++ .../metadata/glsa/glsa-202003-32.xml | 51 ++++++ .../metadata/glsa/glsa-202003-33.xml | 54 ++++++ .../metadata/glsa/glsa-202003-34.xml | 61 +++++++ .../metadata/glsa/glsa-202003-35.xml | 55 ++++++ .../metadata/glsa/glsa-202003-36.xml | 55 ++++++ .../metadata/glsa/glsa-202003-37.xml | 63 +++++++ .../metadata/glsa/glsa-202003-38.xml | 52 ++++++ .../metadata/glsa/glsa-202003-39.xml | 50 ++++++ .../metadata/glsa/glsa-202003-40.xml | 54 ++++++ .../metadata/glsa/glsa-202003-41.xml | 48 ++++++ .../metadata/glsa/glsa-202003-42.xml | 53 ++++++ .../metadata/glsa/glsa-202003-43.xml | 62 +++++++ .../metadata/glsa/glsa-202003-44.xml | 52 ++++++ .../metadata/glsa/glsa-202003-45.xml | 49 ++++++ .../metadata/glsa/glsa-202003-46.xml | 51 ++++++ .../metadata/glsa/glsa-202003-47.xml | 52 ++++++ .../metadata/glsa/glsa-202003-48.xml | 78 +++++++++ .../metadata/glsa/glsa-202003-49.xml | 50 ++++++ .../metadata/glsa/glsa-202003-50.xml | 58 +++++++ .../metadata/glsa/glsa-202003-51.xml | 54 ++++++ .../metadata/glsa/glsa-202003-52.xml | 88 ++++++++++ .../metadata/glsa/glsa-202003-53.xml | 78 +++++++++ .../metadata/glsa/glsa-202003-54.xml | 52 ++++++ .../metadata/glsa/glsa-202003-55.xml | 49 ++++++ .../metadata/glsa/glsa-202003-56.xml | 73 ++++++++ .../metadata/glsa/glsa-202003-57.xml | 78 +++++++++ .../metadata/glsa/glsa-202003-58.xml | 56 +++++++ .../metadata/glsa/glsa-202003-59.xml | 63 +++++++ .../metadata/glsa/glsa-202003-60.xml | 60 +++++++ .../metadata/glsa/glsa-202003-61.xml | 52 ++++++ .../metadata/glsa/glsa-202003-62.xml | 52 ++++++ .../metadata/glsa/glsa-202003-63.xml | 53 ++++++ .../metadata/glsa/glsa-202003-64.xml | 59 +++++++ .../metadata/glsa/glsa-202003-65.xml | 63 +++++++ .../metadata/glsa/glsa-202003-66.xml | 51 ++++++ .../metadata/glsa/glsa-202004-01.xml | 66 ++++++++ .../metadata/glsa/glsa-202004-02.xml | 122 ++++++++++++++ .../metadata/glsa/glsa-202004-03.xml | 60 +++++++ .../metadata/glsa/glsa-202004-04.xml | 53 ++++++ .../metadata/glsa/glsa-202004-05.xml | 55 ++++++ .../metadata/glsa/glsa-202004-06.xml | 49 ++++++ .../metadata/glsa/glsa-202004-07.xml | 64 +++++++ .../metadata/glsa/glsa-202004-08.xml | 53 ++++++ .../metadata/glsa/glsa-202004-09.xml | 97 +++++++++++ .../metadata/glsa/timestamp.chk | 2 +- .../metadata/glsa/timestamp.commit | 2 +- 81 files changed, 4673 insertions(+), 19 deletions(-) create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-01.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-02.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-03.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-04.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-05.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-06.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-07.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-08.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-09.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-10.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-11.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-12.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-13.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-14.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-15.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-16.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-17.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-18.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-19.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-20.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-21.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-22.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-23.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-24.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-25.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-26.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-27.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-28.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-29.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-30.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-31.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-32.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-33.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-34.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-35.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-36.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-37.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-38.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-39.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-40.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-41.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-42.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-43.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-44.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-45.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-46.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-47.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-48.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-49.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-50.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-51.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-52.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-53.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-54.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-55.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-56.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-57.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-58.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-59.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-60.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-61.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-62.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-63.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-64.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-65.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-66.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-01.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-02.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-03.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-04.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-05.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-06.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-07.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-08.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-09.xml diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index f1ef660e97..5403be1514 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 450288 BLAKE2B 3798da941a15fcee18382da626450662d799e35257d8ad4a0b1552a6ddaae69d623b969c7ea2a3ff528f29e7ea6067f37208f6499dc6674753bd8f0bc73ac9b6 SHA512 c989a03018fd5d5d0ec3658457962a1285eb9736eaf370cd03c34b1c2e6807a141280958db2771efc54eda1120570c478512f7e244686722c0c6fc53bcfde64c -TIMESTAMP 2019-11-25T18:08:47Z +MANIFEST Manifest.files.gz 462212 BLAKE2B 5776c6001abb402454a2b47a7b9bf3bf9047598d1aece9f78d5b9c3c27b9e2beb04358067b23d0aab0fa3a39a6704dbc7989395dc50e173ff19712be407974d6 SHA512 b5ee2fe405b23fa0d01a4455e021e430490898b9d86f37bdd8cdf6f3e1e612bc5782cde9c380e6d19690d6c9d75154b7ece632c229e69202510fa1255c1cb2a6 +TIMESTAMP 2020-04-16T05:39:02Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl3cGK9fFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl6X73ZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klD6eBAApy6F7OqvbNHOVDfc0l99xjuiTuxAyp5DZ87Z0b635086T9+HLyFh2TuW -FlVMqkPe05RVyOH6Tq+fEmixQfzWucRdFCV9IpAdzIgLCue/4Ey1v/mZhoYqj3ve -2JUrfCmYKNU1N5qqdkSqdHG88wH/XjABodvPJLC3pgAMVQZ0Ln/t0HGwDr+q/zo8 -N6sUV34fvm8aF5qQfJCyaoOTmJQNDAuZ7t0Dcfz8XlHCgOFSsW03gyIxeUJfdaRW -ADn0WJGAgyXhtMdQJMTRZ5H3n79B9VaNOJAuSR1SHv6MZf0ARgYpAT9QeQE1LH4y -CMQfmqHu/pHGJxAxOqV4Q7/bV6Ppv5iIXjCysEA66ySGLn/ZSX/aMssooe9l/ymi -rMkbovWSnq4B4o6JwqtRFONliQ/N/axJWTn9hcndsJRqv/kF5AVSXyogBMQQb8rR -hz76WpLx9ccwnFnrfRLLOBY1MVBSrBH7cj5jEv/uK26E48CwACJjDvJ6FREAJzx7 -AWyGIGFS0fEwOiBEYWzLb46CsWNPMqm9js2002ygUe/FgnOQ0GwxX5y2UMvPn58h -1tHsy+RYTGE7VkKCMvw7RdNZZ3zDu1Zi/iFIArK4gtgrD7Ojf/XPNcpNVQz3MSh9 -GJe1zeh4iKwlMJnsMydIP3UZTSc7V85Y/+t5JEYCj72swdPbr8U= -=AYYs +klAwzA/8Dv2dDluNwUU99HrcwRPXsD+VHkUsSIYQz+76O01a+3ypffDSHH8/fTx3 +Z+vH4aT5UPTzB5pKfmmo8zdgJwJosj8Squ/YCE90pVyiChQHk1GTMMpl0rK3va81 +/higcbCeLg9rAu+9qruPkjLGzbXFEkQLIt8lhPlnh2ddE1R8MTeYKIkNa0g1IFyD +5lPQxDy3D7R5U1Wn3eqnLNzSmZhXum2Ko/pALX9jHTVt3Tfc2pmVqaS0AuTrUpGf +Lxha0BFnig4lMWHzniIz7zgwzo8A2upnFRl+caYxNAQwBvBCoJWBSWoGB4Kecwa2 +D+HY/7Y/J1n83//0h+3krFsamRJCwYt4pdFIdv2bBsxWUPlVPLMQWEmN7v06MUCN +mX4bDu/L25m0xeFeGzlU+LiqeVoyIl6I429OfSovMvSn3Xou8kSx31kAgZVThvGK +xPYGokcU0SAyJket82M5O4NyH+1sNeJEnLj4uya35a6w6u1ZLc7xawpiDxB8Rw5u +/bEgf6InZrX2XHD77dmfGOEEujYVnOrR32+8F9lUVzk8HkR+2ZRRM2bA32QeDQVq +4RGhSSYJHP6uMpipCEGE3NN79y4/t1oAhAREBm4LIRBoi2uwxX7nB9c15rXnTGem +XRqZUh1Ady6wN+N1iWrsJTmB9I/kaAfMgCjtmfZpsqcnQL5rub8= +=eM2y -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index 07b7a7ec9a25d43c185ca6325eb1499247622df6..e387e538aea7651398a9e2a8852d2a1777944e22 100644 GIT binary patch delta 50076 zcmV)kK%l?yy&Hs^9DsxYgaU*Egam{Iv<4tXf3PK2jUc)uCLysL1Y-Y7@V#``;NNBY z*#14dQX$BUOd=zQJf!cFTJF|}Q3F)K#tqcbF>-kdvXoAGm(xq%OXFuJFWA)@Wk!wJG?)YmD`kE!i(Miur||}wsxozIoAaEshii2ocNc&rH|4_K0~v?xILTa^IVD_5%oYsdZYmgHF^bc0U4UwiVu*I z|H>VF@!ZacP^2h{?%f1Ihppw1l%_P*v2t*G5kCRwqgRkraEa;#pSkY(N^4D zP$;vsd1vEN;@9o}O9ZJP%M-BtW3^r~i}8~av!m~insr+P>>{OjbqPdbF|tbXR&>@u#Xzx5Y0IWjf>02{rcrc&w+pnZAovybz4ZHg~hnNysN-vMKCubkz^mwp`JWhzV`- z=0CUorW{V9phhkP9E)0(-ywC~sXDbPf7TYykJWnFwtd|v4vp9W@~4e!e`k#C5CKza zmj_M_%SKcRZCqPtBMhY@6}WXET@lF5##0={`7oXjL`#m`UZ@K5KShki!{1Zaf-_xV zORVKQYXiW(bE4`!`jG_f)8n>2RbM!kp&VE#nksu)6G*npp##0R>Iz`51b-)FVf9m2Vk3tEQ|qTKw%Mq;p%C6cojN=__r;WUFbf6lTk6;GRl>H-An ztZB1f#rG#gwJ+tu+OXAFRdXiQ@skP&Dfn!Z4ZO;EI}!b3wf$%IH-Xde|T+uco6CW4*9+367Q=gOW|6a&fwv4<1v!fm5(aWmJCa4`kT0a zF2$J~x6|qMaE3uaAl3OTpN71a?dhQI&T82SIAvagS7wB>-pa4I_2O@R$!FNx+jYca zAnf)LPmLvsgPw??yeZ*VF1JB@RYElfQ#Ba{zYG6nFRPCaf5N(`EM@t!$WFXzQK$9i z)qz@6Djc&%!i@@tY#1ZJy9Ysr0xPtj)+U=(u|>ytZbjNA(O$|ai|oCxyY_M~4)rm5 zNXlpdYL+vfS_M0XvxcmA2^^UK8c%P@+DybQM_+S%oGa)jo6#Q9^Uv*TdiA$5Q0j}* zTt=YS)8_(!f7AugHCmoq@H@3O7135kZfO7Y=TeY*LSe}4=&R1DtrInmyLaBWY%qrv zRhicuWXoR*?z>{+MKGqPGC=Vm{l9N9s6y`ss=c*8sNNtAYF=&YNIyU{2WFaxlQ2cx z0LFSLKh9zmN_<_qsp!%I0+yo0{=22ljX<2WTY8xNf7yX#jm&{y*DG!7#7Cxp`LSAm zrHA9!&A!(%$CUfpoR0qENjruR=A!J~(j(qdJ_C#y6g|u;M|;Vl*eeA$`^>e|8$L~9 zz3p=TzPf{y7|s;Wqy>qx%?^r9&TY|>+&ktsg3y7wC z>SsxOe-cQ9^*AaC2qli&8cEJ249fdGww~9v*`Y#8&vOz?Skwn7Lr9^bCHko+lbiz5 zEc?f5y`+b~B-54d(zt|T?zWi$PP!fAW=E|sx5uQ7!QxMy}9!G@8Y{SC@Ha07$_`Ex8g4H^A9;Qe`+$e@}4dL;Zj1_H?8U~?u*ww;i{6y z*6$oF3x`I#yvdWCNqnp}Kfe>6lU$j=d!d7u9YIxmWbBcT6X-}*P*#`4CTjJexm(bV zENh=PLBT&(tNhE~Qh$$Hp=_1ILJ={lbdh*k+Zkt+otxV|IBK|c`Db(@b8ZR5&p82anq$uTeWZgRXr+14#b(1g;_ zPVcg)k@EO2ItAvuEtrolA)8~9GgQzEf0qNv;8C3{oGa9+frB0%J|$nQlQmaqTSqIg zE%dJd83E`wgIIND&Dkyq#?-Lg$&KbX8HF`afkI3c85P9hU0Id587$6nDQ}iB`8C%L`d2!7gisH{jBX93W!hBTZie_yVpl+gm6ZQ z+Zxe}^m2R4JORx8Xs7!);q}gbT(cEM=j%qO%KVa>z1zsGPzW}j+rDI zf-mLPhUPl-A+iWg!EtqSx3nhrGg0(eKUS;!JF|bJO(xP=^JJ?O!cB?6XhrCwTGRC#^>o|50beH;ai)kx}_jb@iHrM z6a{$QW4BVVmW80NbXNA7qA8@pq6IhQ@H2m`)_bn{6XgNqZF9pse?`=JS`wto`>VW} z+ZK8w=i0gxAjMLR({fD5q=Dp|AALr!UbDC&v0Rh^GCm7)iFWKCt+ z!*b>wx>TrB5dod=e@Ken`zt-POpW!|;*_x5v%Y4P_@n)Y@;w)`t zuPOM`QtPm5PH_}Mi6!Kv!>#1xNs8oPA2yhY56Syib@QiWSXDWwZ`rmbhb>mBQnxzd zw=@@?J)fW3*K=A{li`z|aD1}U*V7yMEIE!03}W@7PLh+Ve<7e&yGycnSZEam9}T?t zcu?T!l*Ei1V|QTEVXHxx2F>6|udI0Gb(Gclv80e6tM!+^MK%7ZeAIn7NV{HcIUutw zbrM;lI>&Q81ZbA(aavu=Rf8#6H`ZcQR^8&Zhc3b1(d^>%za5)Xc9JTG{Bd%XLCzD& z-v^k0(X6gie{+6!Y#glCiXAj`Nlsxo9KxoI%lFdgjuO+hx^n^)+lPK6YT{~9dP~j> zTJI(m8^oO>{;3k>F#6*7m0-}5Rzmt2OB0}WNk~!qd6YyDH+cWp0-9RwS_YN({?J1E;DJ@#clU1OY%+i2? z`uWs{TwEYYg70zk32Z&{Hc{>RJBO%Ao((b%W4iP?Aa2-M|FK%_UoqXa(>vS9CcIWU z=Ph|Zf9|nPP3vQ2M-b7~uV+=kV!G<6mp3?qe3m|d3daz+q$Qf3550~9@7yYkKhTvf zk?-%x1e5z492YRp8$rxR%n9(Y7oYBYsL)$=aDHMn_`hi@dya(_q1&1Y_Oa&Q+ttD|=&w+G-f0n@IzWvM;W(@zX*2jYR`kKXX7EMVE zsh-N7UTj!WZ+f=qp-v1iU~HX6Dkr;VH7D%O@~lgHB2E*jIIz>y&hx<$@D134x4awsz~0&I77%!ten~(==3F- z9>44+#V)F-O)XQ(CO$xbSCecthFG% zFSe{&V|p#HnGZ$L4}NGRW9-f#*%y>X77cqgR|j@YNXSV~mt04M-DKs?AzYD=toBQe zKM=&LFHfEJiCgQuc{DbC7BAX`e~k}7<{CmjHJphW&mFvp(>|l>88e@#YuYVCgKy!W zc9`D!6+obV#6tB$f2c#XIOk7D96J80i+ylry{#^qBY&njN#`7KAhgh8FX7An=+b8`ZP`ehPl>9!58)&wny-_h$les6$y>dRjmrb&9L?A*MZ26J*$}Ls9ngKPp!|pFJF2&h%+RxGRB6b zZc$JR;O^24iz-mjI`4j*e}~tojCfkCu{6Lej#TOLIeYNxU z{zS`U#pvWk-I_Z7jPkF!>io?}q5|j|AI|Nt@rQCl_yl>zt(mM`t1f`l{mPW(lTG#L z7^w%r?W_{moUh|Oi*9$`vg^*>vxEXiwI5b&p4f8V+bF#}ig|kxRDi16p_!mIC~x%UVfe=>#aSjSHZ&Ozq

+F)qGHpvsB+htG~*$acK27(e2b@g_aGFn zJjCqgjroUw45V*c8%a07$f_(|3U&T8f86^=sYNRdJ?k;Lxvv~Jdr(0Mibs!XvVjxt z^^`IqxoM=rxsb*m_8)ovtFpLP>xJdN#B_P>#Ol&CXjIpde;+=)g7@egx?E}>tR3jy zN+HXr1Mn$e#pX7QXVG&U+Lw?a+ZIr%QE5rFp4eGahXTZ>vm0T( z?YtXVJ8%x!e_7g^b=B~_=_3uS{G+OVNv5;8KO7tXCLp38WAnPB)eFVqsl)K)gpzV` zf9OKR7FaTHUdmMKE8O(HR5ymaKf{#9#x59MfnH;4$u{H0WNkg?suJr1QMF8u)Z*`| zTHS#qt6pW908Un>aC>{leaA0#RH;*qn^hAhblNxce^8Xu#k#iEr~VSaA@3HXr;ezI zn0FSUwWh8s5RwFvG)(HG_yuCJ5Bg)ZUReH1nMHV`Jb)@*M1TnNQ^F?=Tj$2`@ucb0OyPg1Ih!Y*m2R={q9%*`JF$lF%eXC!%xI@Z-W%jq(v>^Y6}hfnl; zs%mu?e?fjT1dph8n~J$#GTO2Ovs**SJYee}M)|TK$%H!Ow@zILhch@FWeUa-x9W!E zUfz-CqTQtHD}=V?<{e#;(Jo_8nU{Z8>n)l7#c6K0Abf%Cx|giLZ%1m*ZI`!aN$uc0 z$8^xPv_J^cob2X^Xtd(YM04V@MP+{bqa2i`e{K#a3|qPfnTu^n#F$>V*PN{c&RTl^sXmwoPbyKT>_)`7EW!_sv!@@u=#us9p~B9+sD7k_S}>U5b(DyQlHAaV?e1p?o}QT@_j$ zNUi&%9t1cqbxjV6#3|=F#;!s&MUs8sf3=3fyea=!t@P?Nf88gNQ1WzCt&C^ius)Z=CMs57C(Jyy;(=m_RdTuDurL$$%Y%j%mOYzp+nYfdCtkw2lxDSTp+Z!7r2fMI->db)@?R>8#2Q)A zNq*3yBk#1LyOrv8W`UD;e+~!4*)x%25~Ajt_ol$j?dnM0xA%4nuZd*#p0e*OJ@#Mt z0+f*^tJvA69Qkezy?oq*v+yyC+FiaHhoYv$^sXxkc=Aq7omFBHwS*3OU2T_fTLG%d zrTVe6!mEw7^QOatGM2y%)F0PjGfAPWE%tWHYf6SbAlXtzLA!Tnf4+aLR(;t`e%<+8 z?Q$%UV|7SgD7-u`M6kir^8at( z_n=gv=v+6c)v_sGI(Sfwu;iTX=lbdfwv(W2(Gp^F218L@TN}>Sg}R+^y$3wE<_>>` z8m4()6)CM&tacI(e-%EZ4-i_5UI{xCJcJSuEtCim~ zWZ}#HsK=X{zdhT6gtKP+rAATau(LC?Zod^2eH>{s;BNOL@XPeZ*kRZ+@CStuk+Y** zly?};&q*3q2-}WERb12wD!yOQUDSW#FMTHNyy@XRpR&VMel7w;{THtx3Ly3Ip;Hf_@YsYS@zz*Ng zVgZ+L%h4?fe>RrJlp~i?SlL^nv+DC3I;lbXPcO^f2;$aN#x{$2&-OhKG*JnG{y?Yx zV7;RE(B!3!CCNoHCn)EroHXz}E2yT7S|oyW3HV-7XgAJ#8R>XB$r>0$kPaGrFUbSE zWfk#$tX6)R3V$iHPzyJY5odt60Vt8%Hp>&K%^xSve>FZo4u#i9nVMio(N1eA$TJ5O zJs+mClLV!4s@*|-erYY`qkx`l1$XbF?Re_S!~S(xLXofhF-Rm2h}l5TMo|(iUy9%t~t(4IC^&j`pv_16;c`kKY4Rp$yN$}d1+Ih!V$Rqi)6n+`pBZeiFHl+!D( zlJ{|}sxg~Ej@?AwBrw?Di(WJyDr`O>jD!#e?mPMEshoratW| ze;VAiuA~JS5Y~vmFRRxrB~e76SB;9JJNgmaZK=P=0`IZtAD1 zQ9?XE>aY#W8gtWl$#EA$DQJ{K#isKoQ;rHaU6@#%d?8m;3oa0$RK=y2p?Yz{xzS}= zapx_lEH&d%Rb7u8evge>q&GR^?lfjoYU=s1S}(1U{LO=qKdVU_<;0@kBznhFf9Fs+ z-r!Kx8?*uh$~lH}-Ib$x=xGY#zX12AMm>o$%x(upk(IBh@;p_zG6PGx63Dy`wFF3< z(n-(d7^HLDA5-D&HCCnk5X$GF!d7}Tl%p6|*^?jUjPYZGHM+-?H+v|qPH%NcblKq> z^|Q&x?0RMU6DazzoC5=r2E7w5f7dpm^LC-Qq=zozE&W)n*9_U$bb)sha^5vcCg4mj zmaSbct+t6HIeE>2XsEUBm03NXQz@?7PKM&Npk)dp19P|(X7pN& z!WVRUcYDASr-gUsd^s(f0QAR?)p}`-e6e(&(d={7 zRVts^DM7opPF@o)f`FqKw`vNY#C1})XI&ai3|jb6=(!n|C;g%&}szEmH^u&XrQ^P~w3r zDht8cR`#k#9d;Eq1ABwDuk+G1>Y46$u>YDv>mvZ2qZut(G*HEEo2X)4_wQ=G?Y)oB z-s&o?u)Q@TJ(aEN-r%45l%Dzr-05;cv2?!aAngHrh!-LS_m67sfBa;h<4}l*?cpWh zx`3eL*ovdUp%*FaQBmxC@uJP2QgaE`F@m zUo3xoMfpRkvoozTf0Q|toK~jv;lUh5(l1#}Kn|NDvB0V}6i~9n*fztDDrwXjw_17& zL>bgYB*1tNuNg-2+H;R-65gwKo>_BR1^;D^#*fp3$kn0W1YA;&XVdd<71%+sQG`nf z0*Nm>ZgUWQmSUfBG70ILk`8ulbEqfC_r5n(ND+p)C16FAeOYyjXw55vQNRFqz`&*L3qvO{O`<=}mmhITQuUHMl zd0AuywUy+xe^KcJqnx$cTH(B{yDL)3`(2ys>JVhyS%n|%aLS*N1l~rxNx4$b9L3=a zf$)Ds`Io)-_0Jbh@yaP~bwZYfR5Vhx__RLO2Fd zb2AidxBf>hN`yN+Y4^>->(G$5t54P=!ujhfoSeI2e=Yy66YVV$okO6i%Ud;}?rFnA zg`+*PRijsT4sNeQQL3nS%RJaIQxj1lX1z4vB2GH`Xe2Hq(Cqa_aMoIOqXIFVocZje zvYk2lwzB`RT7R%SVCNIJsQj`cpaehzDAfd~IUhk*8`bEN6Ik^{XFInMyz7}NlgJA^ zP93u(f75t_-(|KG9Wy~@^7OLZn>~M!9J7AxA_Bt?#h-!wSvk!2YANbNnR!@NJx&)W zi^)e3&2K9Sf>*PU9e1{XmZYUongfhBc^!|AT9*tPDDBQ(DhGRICs@R1r;3vAlW^x@&%EyOrHv*6dB+e?fBCWysPRl%pRBppRoJ;5;7Afs=cI zV-;I2s&4T7;p}xZeX2G60Whk(nNRjR0C7B96J$Dpd`hPP;b)ht-xeb8lSqQqFST|( zRgZ1&%!^npXhgdkSvw>-I-@m)R+CR~U}zC)^;tbMhMkV9?7Uc&pm*Zq2rQ9;o|CGy ze>v1EHD;;~L1m&2zP{<}$7=nJTjgtVr8(}*cP73EG6|KHS3cBWTW?c2rd*{G@lJK~ z=FyvCVPOXg9i=H}Dexc7Rdu_uq%2q1*QLPw?l{7!ex~z-1iM7}a#k;zD5U_xAE$?w zm4=EM%XhDy30^Baw=R*|^mI;u(kujLe?qG6InSeRc42$p$96dxdm69<0=56%V#CTJ z697m)YW%bLZpx2IEEx8C8ppEUvrtq1Sgn^2*;ik_E03_Y(F1{kli1YZrCd?DL_f*o z2!X<#B#@%5M9x<28lG+4L~X!Ri^(a}EDsvsNY!uADkeH=Q|u@!pxfg1|LHRLf9wir zPX6&OP(ex6`KOGVQnP5JZnz_jap*YyGl(XLXjEn0`GOjCo>VJ2`&)r`Jb?bIY!!<< zsA03@bOowrQ^7+c!aEl>oYZ+Le<$T{)9#Pedd>NKaRV)^?j5f!gF%csU)h%dnvyPu zLn)*H*=n3kQs<*>oxyhtGffUuf3#1pWLI{ zmn!7-Qb0>h7$6xrQ-5kXz3d+%>g^vq>|)7vd1mcos-*D16&*6BcuD$|JMYF~>v64e zn~Wkgzto5N>@9W;=f@TqfGJnful|}nId@yAI2@Hd5(#iRVV9E%KhG&ET-C@y_T>$# z)th7`a#&-~)bY~GQ$r+GfATJc2Pxusl@!=E6^)Ucll%CwT5l)QFSRn&Cn%k=QGo!Z zlFVT+lN_wn-`MU^gV=8`h%~78r0gnND=b$%JdwOHb+4TFU)_rPwk+91c@8#vf(ps8 z6do}0m;@rV&*~Z<26*K`vXgw`)_L8%@lNittw^YtPVaqJClImVe_j1Vr=u3Zz-v6} zn$y|v6h~ETnlQTEeI*lUVR%2ly}mo1*^y|rW%ue#V3^1p<;QBhe8|#gZ|Ul#-WXd` zpZdcipe;1HqDcc*D$(0Y8LphkuBtt?f7G6-JFB&1DR>F>NEuGvAh{0OIjnX%yZU(P zso9!kUnDau2lV_cf8P9iwe+8fPW1rZq6+#q0a^-y1Z%=i-FLY$-5MBqW2V&NAm1sj zdv&dIodn@``{0z!s-taji0WqT^UW8!^QHik#JuvGU8#onIOUw{kJY+r;+pu?7pM-g-)0B52x8t&PI&m)bO2Ek62YZ+!V=rZj5$vPL*>wGw@6LzWmf@ zs3xEiJ-<{yjU?m+I*?K25WHS^xmc2GDnp#7@^?t8s?|^60KcA&$o^QZ_OFY`61NR- z;mDGI`ZiW$f2#>0M=<^n8}dc?r51Ar2w+u&k%{=ZWVWc`P8Gz9JnjDQQR4_gFk>ZyZQbq{$0mHIf{r$yMU@X90IYH0*U z+Bk(PN68$-Gu(O*^F-=4Um&X)DF>H>fro=|Lv22Se`3-lmKr2#MpyX?>frvnT5lbj zFD+el2Rq?92ZwL$1udoIi1CCS$Lt8TBd-Uz!%LW3b4nPWoD5MKj{{KDOqx`Ywi)`8 zi*SOtmlh&+lN_v4qMv$d5^>p)4#|*f6uN({)>(^oK>bm~`WSXaw?8rgQhj3*Zx8~j zQ&GLle+6&WMgj#R2K7!a9bPE3Mi`O|y_*JISAZ38LB07wOyH|%A+udIwDG-^{MYKZ z|5&ZRJqTjXM-O7C`Vv)x)#z7C`|HryQiXk94T)yxxg2~i@sA|3A^}xJweH+=a1J~@ zPun+UQ&o9qHXgbCNsc?A!ohb>shyo>uRsu5e|;Tq1mShWP&~c?YRW?;H~IJN;EH0$ z(h)hVim1r)U`ZSdly4Ah5V1vMOFkNW#j?ABjz$TYn+B?@*zZ+Ye3HH;pZoSoOKRaZ z9_7bs{k>1DUyP*d@p>uCZ3kb@(XEQp;oQ<=37M{}CcsUIT!QR%k^nuWBrs7s2$m1# zeNfG#@Qm$h}zh?gkDBwzPWW(dq?>_eRt&C0I~GpW5psf7fOO0TtZ(bmwiKBg&!8&U|wm z$s#=H`D<_e#q#HudWJLDCRvSprZOKof1O;qd6%~9Ijtuh-KkP|!5W3^2W(AZrsO@Q zWAQ*iLDfl(n-mLs%Hs8na0KO->hPPfM=B`eSj1bvDGNi|d(UDxi`^{_PalG9N>mgQ zsf+Emmmsb^p8Fe8uLI4K~Mrf41G! z(j=lO=Jzvhy=Gs(l!u4%1P+j2s$V4b3VW3m&~|n@s3mh4Y)C~ebdsYA7*Qfy)XcHg5Z-|k3MHi9=xyA~0|dJyqF`}#SFcd^QM{^ZG9{EjR*&g~LdADuYkt%YRCnru5^ng|5M4g$7( zFNcnlp}&qZI(4vxGuV+lVdJUgn(-eKE;y{;AjiQWE|0Fmw_JpePID`ie}~TnfMn@| zW1_%<=h6Yj{swO`^As4nb=}=# z>ynFk$Fo+~(lO$4{aCFR$L9ZT$fgNh!_|AYeU@_Z%BLj9YB}7_3i8^X5%XhXP2wnj zQl+9po9%IdSBNS}&D+v7e;}JO!XuDCWv)90O$D+RK)MKm#H%(4r*h06-YI}U!rMbR zucyFL+}cqBCqW-xV*o<)PhMS+gO@qUE|#~9PN-WFst(J0-;u#TU5z_9+?4J>cIdAio3p?wC&i8Kutnk0yBjzi z*(a-4FY&3%W!89sq^BJ(h@TczwpMIgc`&beNHT@pNMzlviJXz)6$>?m%r2fHRe5$C zl*ulm?w8j}BG_D?e|{)ScrG2pf%HGH{EIJt9$%~xFw|4Zmd%p3sW;38#FXC?wvwHV z8z2)vwUt9}4vu?uw45NuvwC-89jm6h6zh}HBM8=coEs1TiqM$3leGB%c2!zwOHD%O z13$b|!?_cOPXXcCgl%`}fbT$-R(O$Aa%&gA%_mtGqKTl@eW*PS z<>)kEUWY}+(ly6&dhWiBwoYBUC&J1QJEtG3_4Y3KLJ(Jy?a`>-^bga2LfyUDkCBwv zw$rJedeEQzlJ9o1n$$3r&nN3AwMOf<%bkDRd?|^%-IBhiG%V3|IIA0+)xDc$Emg|J z703?xGr23V(sPy)l;(fvP#~hYo*ObsJwWNiG&iW&i12s`sT~GPfjFB3C?Bvj&(2R zr4@bx*d?ck9)IeGcdEFu!`muV^`e_QD+&;>xsa7&dw^(dPtSJiGbiaDK{Nrf-PiV^ z%=I8k16Jz2^?|g^0`ZXsh%5!b0EUen@UQ@oLB^Z<6l!|^K&LMsvii;6T8?71rpocs z7?k5*fAr{(eX1I(6QTfO&J)W+i3PSJ#IhPXo@WVg5>=B9D_d&hP?v&uPqbaWiV&pP zySjaAQ0ucw334iLR?-_mI5gwcEA_7$jlhA^f~F~?FtmX0UOpIWDhS%kJ2tni+EY5b zQR^lXk^~QDS+YvGr-0re9kWf z;guT@fl`;k8stcn&?lMitM4V1TNJda~V3Ry1G1#U!l}VcV2LQRR z$EH`X2H->!Y#fc9+c22?rXT%L8l~MEe?fqWlomj;KR59RI%I3r#>NVJCp6@d1B=zRVSa-B!NE48&(j@aUMTb z>*aA5;}_d45w_0d9wF*c?P`t9+k504$pX}jg%bEUcZ8Rcf7(YK^L7D?GtVxIetp;sk;v`*B?2A;6QDmg`hDNim?i z%E7v=HM+O-WIl>)2}(AaIjpLXdNr-oWa5A1d_D?fB`fH{N#I*7gGltFc(cx9a3U#g zf2`KuIp zaF7(e9~fKTY1#X0gtc%|W5$(EGW<8$9iRe>(!>q(@7; zA-+4b*ZQ$qf9pho?gyP_j>U2kn*%?OlUkIo7BmYv6#Lr4bex%{2Z}yp(Q6>9Wnw5u zXsW7qPiHhsI70yT=&af|uUK>UOTVYCElAa1I6HaUovv#jpwE0_m#yWbCDB+Wlsl6~59yDT0 zYX#y7N&nDB;1La~?cQv&{#dOy@APvLU1b?xdRI!kzDU6Af77gIv{nsAnNng-TZo0d zk!1B3RY7Kz<phAQl!jH((Ton_jD-S3*6K-1OrD>!lhqv>*ZZgKGOx7aW@hh5b3rxbn!M+g8}Awar~TH znO~6DyL3F>og|VR6=Z3$6V945<+0|I;J?M9PF-)Zt?@+#a(h8`m5Yi4Tzc}#t=Cdf ziuS{4f4)GC-qyB3RMN#c?w@{~4vuSqPS)vKIp#;|T;JDe3QC^p<$0^m%Swj>SB~{X zJ<0dgMe`bQ?%o?EfOau;-!)qwamdYJl~4M2wcfnb^D~7`4N7>(x)aEzBl+|p)+^eq ztTdzdI76R|eu3<>N_DP5(yCtls;V*`S?o`He@q`1?I$=1j^A@`NPkVKSPsmkEo;`! zx|(_G@?!JFc2l=s2f3b{$+C6aw7h8!-IieAfW)FO-kx;4632n9NLj$4PjSsZuw5dV zT!dSfS)jy|1 zf0V94VG=ktlVh%tcWTr3XmiQCf#yttHn`LKg`47&O}%tQ1$G1A^;|i6_8Md>^)y+& zq)@iq0=3>3Z|LJ);7K9K-PS{rk|n&JMsB4L?e#x03!TT5eioHhxTSqdG009UP^sIB z(jP%xcN?aj-dn++)Hv7SCg-zZtICmkf4C#q#p|x^{1La}dxoribpw@zrOu(a&^ytg z3FoxEmLw8CYPfmzHm>`8_6QxIsgYQO_>bA=;B{-cu$0mv1O&+vL0(5@%g=aCU*2+P zWNCi2^i6vR9cN`LzY#?5)yVcdPx4CXEYmBK>U}o}_h4-T0Cz51r{ZFc138OQ`hNzPN`;_{nu*cf1MsuFT9*e;wx_3 zU>G`h?LbBTJDyvv=K*q(@F`7oW$Gkl`<~9tgP-;+lCH2u9zCO$4mITQ>*QxD9TmKQ z&=r_SmbR~YF3L4hC%jkd2K0(Ef4!_OIzDMC0X{HkjO|6{ER@P;#eG3?Nq?-SIqo_% zpFl)Sbf^$(0My+%S=?Tf+SdO#CD~Y;vhCSUJe^jkg-#NB*7{meH`1_aBNP5B+HDcPTdlLe363Ey4-!kOb(J zAQ2(zEz7eJiWHQwgYsCe64p7)D;MX1+8%yO6d1+Z?4;y4=b^`6QT{KMFJD+*YoO!w z>Xj(1&Q-6rEft3$(ZX6PgAs|#Jp`>E2? zVG~QCB3Ahx9G@n+L6w1^$1BMKg#SjTfOWorQ}mP&U-gi>kJU;q zZr}%<25rSIuRn;Vz(;~O;g!$0R@rd5DkQ*qO+`_I2pfnpWfzm7OwdXX-3Q-EWErM6 z3|EzBLb6Dkv5_c?H~mc2JoeU9iUxeG(ZzeUM4-A+YBt>-e|_Gyp`R?Bo)_lRW9?Gx zQvPL7+>w2pX*~1x8e!-3eUbVM1G}=8k3u3r3yE+zT^aZIU6F9T87jwC0&+a)-<$pV zo)qTIf4PXL!ElqG18}Y0oI*BBIULfbCeF@#JM5uG&EYgd*)p4#jCep#Q#*rNAb`O* z1-#+7;$(?Qe~x4e`>9*v*2|DRFYbH-fXVqXcG>g3#o&NFCgJgrMXLfH*YSuHE`5KW ztg;oAwRbzB(BcL4LTL`-HFO^NVB>kG5Y@1pGgsXW zIX=ABAFK766#mix?-Dj|OOwYjG_%VSDfyKD;k8LDe~u~XPk0ncFwH=vfhbc*92&M# zIhQw4yebepl|l4|)8;Z^q8(KxMOEg1$$usga;h&f*A>(beOEr=PWtLNfuN985;Z#f zLhRH>-qBXJ+%c0L?AEP-I2m%0u&VLcwUTBD%?>sj)IpUp{4wp^iXhQ%MQAY70+u(2 z?78K%f9!7AkJb92ga=aGuqJJ-XkVlnS&!Gef2NUcPM9*~069xW@^o@6{2t&h5UBl7 zkX9M0lb`JNL=tyEyGn+mR-8J#XU=fiZar5_k7J@Ib)@=-@BY?PlAIK}#1 z(?&&39kfwtU`wR%qE4OI3B$5+HbMGOuf9@m%_~=DAeSQ({Hgq5jZ8fVA2o2)Wy>0( ze{i1FA4*Db+;$W-jE|RQq!e3h3|^^PEGpgUmPzs;hID0GrsNYED(IEwDuKwX~QEVQh zFc-`UAyBCU%asFNDpBZeO*u6WZHuU7-LuhS5Y`l z749Z0;8cl3Sh(Rr6ks)w;CJjXI}r98_Ove~G06 z@PtEsS_wzaC?4K4G&|?cyF?|H30L!ao+<}fr_y_KG4&d$p;0nZ_S|>e-YOEVu6OTL zTpd@Fp}+F(F`PPsYpJNHnL+8kD9V)#vg#;OL*#Y`nV(BUrp(SzsbvrIgVgNnx0rcS z%C`6nnE~N+qH6nGJ3bnG?+Vuae^{+|$L4dNm@sILN#EWu7YU-_Iw z!)Kj#w=-x+19nBasgo#jsR%Wdytg*2vgFe|tBA+di907~mA_97liV^?Pm-}oo8?aL zC=Y~RdrtV~f0vRXGM!k8&5Cfnx?M!}L-5*8*>>Hi9Hd?3;;lPLTAq@%e~QzQN(F|% z-!h;K3%ARqBAfhgJa6A&XmKY`Z`7}uRt`yjLNFolgFADmnS76d@vI(b|tbqQg$bpCdf zQ1O{h1Rm+*(*syT?*UzUf0}$BNiE^jQhl6CKi7TX%pcAYTzkErM^Qpa2=zV-yU8gb zrvXo$xr(XxJSCp;y1^LWY%5g>ftgC_p|k+I{8+8`?CWQ5W#?wtV8o^gZXo_d#r~q5 zuBax>tQuQ_(Wzi~4eZ;Nw(qH_guJIljdL#GO?4IT=5$nSr1r2He|YiM~#OZOa0(2rJRq0B3bp#k`9Hg#GC2SsQ|dGyj@lgOeM)OHK1PGa8+)@q4xew zc{VjusUjNDkCN@q=4i3q9Bm}ml34N7wfybg1?&A|(;j4uidR)<}FISCTjQW^M74DZUhgCJB|)2)$eb+Dr)MG$WY@bfyWw$+@(LpM_52Tv^# zPK$L4J2r2KxAIP4Lxq(noiu-bcbch{ZYigl=_!e}nZXASprxE(*&_`kP*k}d(5-5+C6)SpEag|zN4uXSfvCT*;we4{K!yYRPn5r2aZ9g{ z&&1u<-#e5Dl}qNlR>^Y_+9wp4u05QK_qK!9Y?uy`1{7 zT5kZBKxx0<*H4t^<5#}hp};+bjI`*^niP%zSupLqcc|9kp~y~Wu}we<@~(?@IAL5O z$dnpFyolg7Fn=|uaOp((Y<7K-RkX;J1UzbHsd-iZMRMrJ-P`oX=K zpZjy^SU*-Pzot3APGZy*ZB}b4p3knCEdC;`CN~8uYJaB0>LOV3AyC`eOnrH(l*$uP z#Gmr7m-j+;Z8?MdwhHr9kHuNzvuXmNt{P})XlketFlXtAZyrRoTNTyp>SeomZ9g7w z^BKC}(`^8&TPeRbyh_SO@TF&qIp=_AlIq7pH>1?C=v-TWIj~NaK z*yaJX6<9W$k^9GL{his5?Ymd@svQDekp8bdy9Fv6gsm-FJpi1O;ORLcu+HcJ zi5k951%`cWV{o2?C_OkO#QiDFjZM}5sEl0gbQ4Nrd{muPhm6Dgj$4;?hX!ANN}98) zE#_L%oOhi^DN*i2$(ult8CI3@6v$MD3?jVxy+PTJ0ZQ;nl28nIc8rQLg#@@+|ii=!mlbGL{|m21$}b33C{qJ zWb<@xQFy-_MXz}NjZSavCDk0d)Y+dz1PaEbHejwBrryGPKr-c3*mXmH5%K^-)rfc` zH#mNiyImYM8F)U`BNcME6k#fzN@StvW!HiouH72wREk+rLkT}t>xH+z6s45#k?p5A zz!=*wq;M9x?hb{VGo?r=6)~)`*0OF>;-9)#FAg*uy!V!_bJVy&2Q+7Xs-p^5lxCM?)+Rw73ksy^mu-m#MO>W^ z0A?9A^%r=SgLrunBrf?>Rlhk00ClY?d~M1w4N~sq4MrPUP1wx?>1%4^@as9HDzRXj z^(YmD+)=lb=7(dWMKKF?J3$oe@)zBqp5{fA@Cvk9ht8#HE+&@_iUt{f)t{*)d9Plf z$aw7a+};`9emXVTey!Hunf?0ZB0^zsX0Jya$eyD-?|wLTb}0!oTVEuhD><{y>+8DEQ)=nV zMSi4oz3o*`YV);+<8PUM3SM%YeyrAC-N5?A-vXsLF6ab?pT}n@BWOKws&)+IR4t6E ztY~4amfKP^cmP-kL4dU~sr&36s1E|PI=2&sUL=PBn3orB-NS=_44h(zKIj^gg`Qsy z%-c6F>hqyT>N8bOnYt-wX*N|-?+tjl8lc`ew@4M%13?P(W?l$<9H-p7P-j2*0v7@6 z@&!^Pf+y@JANH&5Qs2t*okw;6Z*H@fAFK7J8<@YN{J!Hn6rSiVxWkd>)UzRmzAtuD zH3LN8;9#%V1W^-zWA#S`Q}sfJ)QGC^GN+W3=d9CkV+1EgnnIu#(e(Z^lXB=}2j1lw zv}^t-cxo8OieBSVQb{s~vwf1p+v!}5L$exx#L$|p-kWd;`n<^70hBK(m^bjGM%hkL z>+MJ0S488vZktWRm_P*whS4r`>(d8sGi)@UKUV86f9v>{A&dqge`ZR_s)+f>I&!hY zdAF2wWj%qMzdN|v7dQ!*lyd2bFKxlpwQsHRRY4|%=a2F*AyczS`(|CqIzZku(<-aa zF+KfmRPgMg!V;}hr5K=bnQM2Gw;Skln#!FF85uw*ceO38I^~;M9R}?_W#W@t-3M0d z6D-nytk!F0|BBzvfALz;5Pk_GMps1=PvD9Y-c(XgA1Xxfhlb4Z)WJ*A>QqLR=gh{m z7_Y_2n<)FPPw8F7x2k0rShX#ZR998Za@Ab9 z=Vb3%K)1VIsmb|nRh>ZYdy)VY#@{o7J(Xa)LSn&Uau6G7#z%Vz7kAI zXmHZo1loMvWC(zMcGN8Db5C4Q)rl&vc4vVD=Y2{HWtS?>alWf+8JN7Q$d?YJ)I%rJ za}*A7*HqTNHJ6-xa5<$)pV|hcd#I`s+)vU2Z{ljp8Y*0TAH70Ux(NK(!+{D`l-l5O zd@^V6z&Y8}bSszjjRqxuO1iP=+REds9?`S5r9wru9zQ|)b10$-%m;3D&55EjXL}TO zErHD6N3g)OD^<+L+_R0pfH$JQ5l5(D%83E7EqN zvCT-;*Q0#qYp9ZWhHe*eq`I-Z0ylaccrnH5B=wm+<4F%;7F@AawUpmcdI2K1N zy>-^JC&+1E+no@USmc0sQyF^lW|c^GDoYvGbLsoCsftIJ3FWoxb}Usd|30FZu(pC! z_oyJTE0eHK?>2Oe)#z8%Kt5wQze=Q0pQqFG5f|jVVrtLqCL-MQ&Ro$v&&V41351SF>H{uVW zrc6f~6^r3~Qnz~Ru6_q6u=$Qv_s~RiI;ZHwuf9t5hpDZUBzR+ag(o=~Ji;U6JMu-N zTrR1aw_3jsXW}A%5Xg0|JeHRg8U}bd_bA#L$PxUKt^mN&FmJCDe>HuXhhs_>J$m@E zQlXyHDA=E%CF}K%FGh@?oBiu^L*`&28<0Gwpd$Y}lSx{{HEaC}}61eSeor zEyL5JMDz>?d#3P#UgHf8*i)3G>N<3SKKbEIIg&%6a`|ZTJCe5$L7!$K|9c93+(}ZE zP50+nl3zfP%2+w@e|_dtCn%>koCdHV!;;@lK>@zvVT-zR#K8C#v=^a0*i}u=AsvLP zqpzk509C+wUF^TKEzVj}goqgQj~9CU_*I`@H~aUt0A*`cg+Qmkq`IrdrVBWDo>URw zYu`d-o{HSLO7(^;JqlA#fTL1})cTZ|q{1XuE(mo1vQ0Yff2qUWohgNQ4U=bi&dq+x z@x59}0Y>6Jfl|>BiC01G6KAFs5>A~*fTjeO1Kax(PC55~M zI1@-(`c@tGe>DM0ovfRbm_!37^K=e5SIQ10EU@Za#D6P_PVNc(##AI|y8&)70QToa zi2X3Yv$8Z%uc$q^0peAPTDs8kB`7jMfz1y{cBJeJb#yMN87s~_Sf4=6bZ)X#z+-f?z!}&{X^P;Sf zC8QI~l7kBW%32b6$svl@<|A$PplWU2msXX5oavb90OPXjw#28yrrx*{U7b!KcV`z< z#l$dT{wPYdW^B$fm%PoDqeDn0eW-5!Xp;;gc3-=Xb>aa8@?Y#=UQ?B$*_^Y=j*Wr+ zlZp$me@f@HhkmoK0sb1O1NzM*z;dc%FPKy+|FK#xEdQmEWGy`8?olpiMZu3!sB>L_ zd`F$n%X?~#(K~@>^3*2zUL{UnY8PsB9=!ok2bbDSd%BU7sG`V}IO7oXQu9Me5{&_G zCEKT574p?bF`aGO2r8u6FmC?FES_4`pVfl}e<;;M)!*RUo$jSsulsDfO$KqEeb4sQ zuJG2Q@S9?htK@C@CAqE1ieNXfJJb$v^q?Nz?NbW<$ccYvF{l^5yrR5t;4m%cowvew zVBu{)sc;&jKuQGw9gxX=jS7sqMPsK+vH0sOP6!1zwryZ}cg{9cX(LOKUezg=WWGK0 ze_EaDCCDe$DhqJ#-Itg0AlFm}4nj)OBodH0J^CD4{XP}O98!^ZSm(8-($z;ICwV23 z6-qUZsWesi;X|F`F};Hn9D5ta(E+-71rtuC z8$f3Fee*j?WAr*}+s%*r9p&3p8+)h~pwfI5%ULKDd5}_3?DlVLMD*4;d3a065zvs9 zeBSlDvTKo?T)(JK&cY_9m{W@>NGiY7n@u1euyU^1W}2ghXVRJI$7=n>^2b-5e`q^2 z42}V*PS1L|dumj0md7&{+ds8XCKw+2d22^icpH{jWPn@qBybWz9Q?wz8hdn$ltuV> z4!wV#=urJN_V8&@i4BNX!0~eVz9(1iXqoER+EA15@eY$O?{#>70MFI_)Ywr~Jtn1$ zNz&5Bm3o`)P-lUVtR%Yg7)`eme||HcPThHEq@h0~K+RVHO~7&*W-fw~ExEPJl+U+xTcwvZjCl7Ub4@gDj=;WnX%qu~)+7f5i@mjlY<@ z08ylq9mXd2DwQYGnr7Rbd!sF?krgZXlyXGap(u+CaAzlN<$0B$KU~{o?fkJ?e_6Wm zdvawKZ+Xs}pC|wO@QEcVNGEZa2N*WUk#~IL{!QWt=R-QM_ghq#?1p79?s`A0E&oMi z_A;8>ulHzE0N0qd4(f$Ne<|Ij5FF_JI^L^w3^gw)V;)%}AY142kA7Jt+Fbz39^T55 zHT;)r(^ajIc$oIkbuw~~9Su8?iX9lKc4A6pH!C^m1kl3PKKu>@V*;@}Vkrgf7lJtd zI>&$Ux4Z=|I;>DSfyF~-^|g08v(77Qx+U+;@fuAFI$*9>o~`?Oe|7&$UdUI<9qL>= zpI-XQB`f7P4=O{I2;^WjT)FT%>M19fF$mfe>msOCeGe4eHSi=oN;R2Q&yvsnIMk3lDH@9AxX!?8#Q?HVNu(#r zqU+*QKu*AUB1e+AMle)u_;6H=W4W}ha#m?;zOj7jQDz$gGQec1|CRbojC)Ji(nCA5 zQN`rpuFsFvYOfx|SEo5@az!1lCmSivOALNCndM19ue->%JedZJ0e>lvvv~i+&X6{C zhaKD;`qPVMoqlHI>(DY-qUYzEylUN8( z_qd4dl0tF=?Jn($hO(ENs$5r%(V#gzubFj-%LV*LN)5>XR-t(*S2| zRMPt;1rtCJ+F{6%|-TQYi}Ql4|U(-U?BZFXh!oYPeH35w>sm(U(tu zxq-*mT(xwBQynj7K+}5K;vwcXmR4psOTv0=QrYKtq!j@0K!2fzxl7@hUi4OfE+u|C z2XI6-TW}`fkVn}PTTA?rmK-H&5v?(Y^X?@3{_X}kBTl&wIOUU^+saW75)da?6&y=M zj#M}60vhnw3xARmA8h)n{AyV3GFcnjj-n&8D!wF6T&uNHUb5M}ZaK6KxV5_@$Qj?K z2=e%WPSam3Pk-V5;mc>`XrFymc{y0EP6Yu&L%55arNC*{jK_QDs%X(3TAw$yQnDL0 z9!|gVn#9y%^$WmfpVgUE{0US@YPC(Un8OuKvkh$-H&5kj7DIYvR@hYaPc`PZKNtH( z#W^!gXv7^2Z7E5w>i9sC0;;G@=$8Y|WOW5)dvs+U@7*l*pyX{P>Wy`=HVu(qiPY z#_Qf4_kSy?LhFdy3_^|xl!?zVwK)TRb$tg+LeQ4r9SirvQ+Zv$DY z&UAy%9O#hTe{o#Ed0^Akf2>ye*WG*Sb{qBG5o1w6sG)xkiw`wT?WLXGu@Dc~;)GG9 z$|%fu)}z`kk9zlw&eKPQ_{iz0Z*5<2m})|#KYwtoE@rJrz4CnTfWx|!^L-MlUJ#k@ z)%S(Pvt<;*AiLf+<}bA>2%1zciU$HWZxeU>B%@r?ll< z^VAKdQ!FUK*U8nS>4!7+Y_kjXlr2{PyM1*7wUSB1OkNsWdvq!IUCE1XAB!s3 zaLq>6$k8iz?VJcW5*dmj4|YtNlB^dyNiR;tiHE~M14LPdlJ|POH7(yASX2yr622?n z^i%l^VmN2XJ2v?zjuXl_2v!Tj#($s+6P3c67X{8dXOfl_Y#&pHYJD$?%(}95p(i}+gFF0043~8v^%U@;uSgrb6t*`#pU34-V%7GG?oK2+a)|rPh ze<-5OMkA^Nr5>}KQ%k38MQ8m9`8xl21-QJFeQekOG)^_}7vNl3y0C2wRe#E+iW`^y zd)n4<3fO(`C=X!p)Dk%J+8tV|l1t%-B-*xvt8AETHtK3sq%AmyvJ9EzN5(ntrs17Z z(@)kqkTqp7EyJ=6FjhpZ3}XDur^K(ORb7`FM~zf|tkz2d{M(z8k8y_kuDa55CKbt? zo8)lsZZKJ~Cu{DwZSE;bw|~oCi}Dg5hcE|WolSjS+fzDNcMoUDN83YWU~dySfP|+n z^A12*$$QO#jrrl7vN#-J%?=#BZc!P0P+#no==YK;H)-UZL*Pf!0 z4|%eq)A`Kp{Y(z=YS@UgeIi{|M!r>>ZBiwal{n8fm7_0* zkF-}m<$8I?R+J}}KPRqOeN8H-=mH}clsfGk0y$pQLVzooz|qnltJPkW&!|= zRTMwz@OMf$zZ{$-WU5;VJlT`LWGsRUSV0e(&gT}n`hgefSVoYc6{n-IQyN^`bHkfm zp{<)7IiczsZ=F%oIEyOp$5b*V=g2!xUQ0ZVNb9hx$X3<^f&g}Z2~bmyd~onzy34Vd zwep;b3JlJje?VC|HKj!_;R!nC$#}as0^Xlrr;_(SR_oQV`EoM7yt!1}Ycy(-}Ks}r^9pY$O)MU;s`}wqGc$i{Rjolu`sRiSZ;0?^saBO%pVwcxDHEFnq z(g#z`{&PiQ)8{0A*5HhxlRkHqWG8X_-g-US#)rdQtK}bcpOBNdepuR??$W8YfsDLS zul7A2u=xN* zPw$MRxbt9|cjT#csZ-^vSA@_x#LQ#w^Gkd~T%!K}O%W=;zzaH*{tubIC* zALpF;9!^sNtqWQ1<0&kG7F?xP;9yH!L5!?yS1P(SYe*%jtu3W}BZ0y(HIa-rEtmS` zd9h8{z+1sjZrLTvN(l(h>p8TVRU6VivAoKYJY~nJ`l0E^YQ310XZUh$d%(R-4FWIu z9476`*DFkalohbo)p9BT#GcsqR$5-8VVo2eB7(+d?Iz%;OIYd*oXHSZ~6 zqZeSkDhbGnko&D(i^22qibP?+Bz9JWhd(v>)qN*dy*2mnDp_mQrF&2EHkt~7{6M9o ztgW_94R8Qn%U%v2HY2Xjm2uXWf@4th`JKu$gLIdAwO3I%VpR}qFGD4ao4@ueZvCB#`u2T& zl-)0v<+@b^D^5+mu!C~k!=y>h7E`CLN8;b^^{6rK_t6l0}E8ok^7 zOnUx;>a_-`K-F;@;YfRW@wKJX;)hB3C{)LPUn=U6KALvxYf_yC(m|UPHe!~C6mBw6 zBfKW9;y`dzfh63MB%_-aAXpzQpyRzeND2lJJ8t5;IFgj*PzxwNvPYZMnHo3Y$7-D~ zckd56tvv-hjvVl;@?CaVKX%dxNlXvfrfs$IO>8d~N6%pk+Cyv2D{XNuM-*AUyqlSS ztv5ADZU@D^kzFw>U=xWdO0P$!1)q5-1fo>wM@v^!cM>jTe^dNK1*I%BEO96n7w{?C zCZV{r`&l0ytgapCIB|!!#u21&CKdWM?&zD-Qnxbb(!sMC)rVwHekFKStzhq^hWf9# z_0mZCQXcM=^na-5(=@#Rdgwd=oxbLB{(1!|!1r1B>SHkGBv^iqzENMWhpq8&6o(v{VqKqXtMO$St)w=Cm-CgB|F zr5-<4>!p$O#e-<-ybLeJDJ>4=pgEJ5c9HhTV(-I?mRn+sBDh7T*R1U6xc{h@W}A~# zf44l3X6hOW_7qz{ATcG--9*kTsg-*+eH`?o@fFniQIxv03?q8V7}?(9B=*Qcv(ALh zCJWLb8X~y2G`+WY8nA~_b2_zu6s43@s&gk31$Dc-k}fYzWtn3FZ4`Or9on(1<31C$ zg<8q+`Vr;ds@7i|8Opg?7! z29Cddny1`1r$in`?t%xkuxylN3;6_UWS0b;ZB=fz*VI407<|^L>q~QgwItb4%K^Af zw~&6CPC2T%zPhJWa<%4el+syo>fJHsUGSc!n&xUKD&I!o%K30i_0T}zxf~qnt_QG) zfN`q$>-^1+)p{vPr4QZ`h6w(2K7KL~k)q6=QkSdDJIrjcp(v|9&8OvmQ$o2ZSTduY z)=`;U!Yog;)JLS&$de>cAac7rzjFZ4D4NKg>D(4jAYF>hbAF*y)-;vpRQPu2P}aNk z@-?-se(c-|x+>Tzs8vo>wPcW9CeU?kN@FxHkaf!F&WsASPNicnvJO};mtv|0P=AtE zZsC@Ckt6%Rw%#sBmR-rxd+$+b1OorvIRHV>iv(x}PInS&2n7jH&ma0eW@bcG?YM>R zI(6>enGx=!*)p?bYpJ$4DV??>poS^>wsG^`on``x=$iO-l@5#|nJM*Vo_ElrJL+kP zNldj`eYW7Fx>ZD5sbP9uCQ7fN@PDD=$B!N@Q;7jBbuI;f5B>TAU^J-U!Y7DeM;BSj zm#6hR#o+3^5yS~P3a({G$@#^m@CC*r-6;}bDNnRME?JWxiZh*=#0A7JHU!o-L*fwt zxzx^_)Go$^4ZD@bPn^%23$#pQr(@`0>-pM-pFp&?i%63O!Y|~mbC#)d+kYZx9oH6S zk%~VLT{n-Q`NJs!pKnj=k4ahIIniC|Lt|vF-%>7>3XD?W(7!-{LQ>PfO)AUOOWNkG;{rEHPtBuC zP{D{#3qas(T}qm(MY^ah-G4G25vc7$*C?2qJJr#@TV9h?=k+J`{$W&CE)+;B$qm^*F zy5dd+mDSlbf|LsV?I!-|oyHG^14Y$HPU}%+hvd<9Z3{qzxf^&*`+vVdIte_25^hJK zMD}W{RwKJEhf9B=<}%gT8c)8wD8*pAfOnlf7wJr|Z9Q3d!NW~HkldRG0i>laCdhZ~ zv|6L6BiSb1>8e&7LFYXAZ8F8&nl}D8RNQ{Y+CFi*-4Dt)EmvCuxY+98|o&+xj{1Ho}q_P(9+u?FkjrDGaJo94~YVls`2K zBrG0v>zp<{ZckNnRF%|3C7d$i8?jOUcuqe7u~{f8&Q46ZsDFca*GnbkQ>681N(j88 zENQOF5&HmDK$A&j8GEA&=EAX@N+51Q1n5uBjsl%J(8tkvICH$cCD_7{+{9L&d{1MyD-{RKG$@KlS!uFlksE+G$WUcGl-sAX14WB(-4WRsH+4ewmc&Cx5=<77?P~>alS(hOF~KeoLn?nvWum zB#ub&{L!K#M-f@%-q>EyLq<=*(bL7F;{s5VkU~{v05G*OTod7P-y9flDu04vNzBvi zX7bhE4$PBRuBxoN9tx*(RL`y-$CM3SsD70FppeP#SyQt1%A3euKAYg`n@xG~!jm9p z>3;ws=iR>0e2OAkCoAQ330>9Xc_^NKfWXK7rA~Y?Da$)2uBj;sA9a!`c%#W1MP*N! zcDfnqkUsLBvXbbjUaCeLeyGbrxruR4))wjP3MI)^cf*34mO23NXY$%*pOWu&>{JD5 zJM}m!bs75gv@W~X0JKQDw|M5}kmX3#j(=-3o#v)xsww|Ob~$&;LsnWvvXY(@Br+KVFt(z*`?#(OQ^wyMQ_Av(wAEd*m}|&f($Bn<$kkBDAW8EhlYbDC zGx8CWDQ%=Li$H`f)W^s4e7>mPJ{9DmS;$qt^k*GHd4J{{0 z>y(t>gs3SiD6H}-`CMeXsM0l6kN(7ziU5u7E}E{Br&1t9NJ8ZOPw%w6eScp+5X233 zrX1yfNZOlQI^z*+Pg$g?a`07>862=nNkY9ZPZ9BM5GU3#yZG&Edg!=rq zO$}{WtM;_>jQ_J5$D14-#olas`x1)x1`ayY@_D&*xIPwElcw zKU9CpuoNH0KW(B(e@FHhBn72hfTNr_tx5E=Cts^qVDX?cnhbOWV;mSR`A}JrM+yS{ z>HwidWkn*Lb86nJ7NV3OtCcE~KJW#P*UaZsDNxB5_w2ZnF2Hk4&wuk!YKQ>&NCwyF zQe{;+BEYA%S2zg*o3Wu)_I<0J#&6S9MHhx_BTS)2x7&E0fa@klRK42msnj_GCHF5+ z>$j?|^~32QUO(#tjc;aoVqL9uJfX*Ob`UV4`_sG;t9eks(=KHl9>d2~Pcold@tg$v zaeAXTHgvgOHISyWcYoCRksnv%_UPg{E8U|=QGZWgIRaIBcDAenY%h`-F{Ofvc~eKS z*`_hE+8r81g5q4S;yRwYRR{_K%y0wTIS*n!^_FJX&`grn)49hc1Rm7038;Ef$&}&$ z`|`B@befM(WfriI3W2I-S^2B8aH)YzD9-kXsSczmQP~pKCx7=L9yXbR8uXXMbh75n ziMjZa;LA?t8dE7DB5kzv=W}xQc(B8X0>FqPvNYo{M!)%6Dh4Z>_-JZ8b>Zo%TdzJ; zKz}sDsT!wpw5-F(RY&p3sCzb5+&*Ai`t@>R%uw-T`@H;O<{By-_PQ-JdzzC4ItEj?NCz0p$*S5YOU=8y5i(|Oy%cxG=F{Skh3@Jl_{~NmVU=M)Fv%g zxp`3w4@#wPH}Q8uR`Q3IZj$-2eR~|xaGwSV`zAxH<_7p}RU)!>p;7>f{V6iLi|5Tw z^4cZ^#2D__CjM)iYb{ZVgbrC$s@@Q&PafZ>^1|(8baw|FAA4Cd`du~*@$9tm^%8s9)_Fluu6*?6OI=MMg^T34M1 zwm1zWf}#3!oX?l1^}C;V#t-$3)|*_i?2-o$=1@SWyTh_%ZAKYcqD;}XL;!Z}@C<1V+k$>dVE1`@eH}*z?D#P!}$2Gn>i^?md zZGyM0ZOxQQQmEZ2u(H>BC)&3UH*bf+S|Qk_ajNq~T~f^=Osi<&r0 zWtHWAw8=+Pd-v|Yovrh)clxoplHKS9;0(nkH^sl&-&&OvO(;Gjj1o^zwXrfMz$TJi zU4J$FrFbbWbIJdcL!;gXRS1XC488aoD#Zk)8J65%K-1aQaUbdfKh&P*+x=*&L1p*n zb~oTKhIXZ2D6O;F0WyF+D5OArlr*(?Yy zh)@-s=ye2msK7xH|MhJBR@K1pcQ;V_aes7TD2ambyP8;mLlrF{UHdzEng}Y#Uc?P((!1^pMBhllCGYKO0Z! zM>>r|b$eN#mejd$zku(v=Q4*(OUJ{Mzm}~kY&Ks3;feAXyzy`aDVXJgN7dC#R_#4~ zb+1=a{iS@MZ=>tiV9zu(Vz;@BT7R~wuWTP$ijqXCOd!#UjDUS;lIi}(cCj@{e`$?;=*uhQ;`mPqBIQ1kI=HsohQse$?Inc> zifcbjL-!H23v~y$NNr4F|C&sp2i40dGeafMZkfa9A%u_|6eRS%mPcPc*MCKI7Af45 z&yG!4GmGj`Gvw-TL8uRt=G>If!N}n~!I=Xva6|QbO zcXYQ}wiCiQlVCTSN(n1hPS!md-+p;oe;VK)s@4zC^AcPq*HDxNUHKG;4t*xePSr?wXoo#k-}Wg(><&3HHh;YWU7YG}rVQTMh!K11~kEm-7_yV(7w` z`?6$9dz+Ukjq_Fx4KrQ;Yh*8(YXrXWZ(qK=CS=FQgbb)xVjzzks(-fU^Sn> ziHr^KE|0UqvV{&VwJ;5!PmH!gNcPp?9q$GNe(Nm61?cKfN`X*G;EwKVDI`oethS{l zsX-1YS6lU}whnGr1xaMN12;i|B`f-x)_T6-y&2hM{@Jyf;l-Cm>NiACqU{sG{96c z3ap~)zifWe-AIe)&1t&aUoKh`|15ryI&$Bt;Useakbh6@?)2qpwLf?74<9m$iN1T8 zd$QPV<8id(xHc&f;6Plu=Rq7LwAl^ss>{SU_Xa-~jelw%r~r88gCDkCo~ZF_U$T}A z_-bIE!0fD?Ck1X$aOdjEX~g=*^7bFJ87W*_vXrCe^Etts%ISN1r;9tJ=;k=m1!9{X zd7E_yI|YPB=Wtz@y`~o%7vX#ioqIunpVaMDAN&~|6y3X-n@eBGx?i5w-=5FMO|()_ zZ(6C0Cw~B#k4z5K?ORp>MH!Xo%8HCt&Uc-8v)0WbhqCF~9_k=0D?mu=gxWQu=61iX z8Prfw5dl>pZN6$ddN}88eQWi<&X$hq5}4&n*hlEPmshI<@a<4lE4fZa=&m=Bw{<`m znLIhRKSge*CDOUtBPHI#frp=)<`S-IPwm0LK!57yfil2Asi*;0sS^fa^2^iuW4nbn z-r`RxmqK0uJi9u>feCwEc>xYJy%W&4Kz4LTAoA{_YPO`!OVGtd=<44m{!~>8^Z3^srHC(7O(AR%g*M>>g`7tbYC@hVc&q@sY9)#wlI z(SMTjviJTeK79^bB~D3wmQoYOvEA8*YK!A^w@f!e3aL$HB8xal3#YRAt`z34H}Owv za(b4v3~*W!%R|PMZLZfcKT*ZGDLQuSa_%f0^op94 z{6_gh-G&nReR1!=CYw@{Qj(i5+PuuSH-9HFkNR92fqN-Za!)&<-7R+B6sIfOm%XXj zqsG8)y{P_1UCTm8Su`Pzg*Jg5Xtde%62@CW8BOx3K2w-DiuDMgW8QExDL4mz~(!B zL8reHvj4Pk7iBmeTTxE+sJJy7>VF~Qn2X5w?Y2S!$vMe$uS)WW4>@eXeu18k5^AZp zbR0^y<9NGMd0z*Y(jNB1tZOic>NS8Nys|+e;b_`FQ4`Oj0Fl;4;IaDlkf2M0VOUA6y z4JaU@g(KOz7qtb%&|`NqNV-}rI8xWIVT;CXu0SpC-B;C9!Ll169Mpt9m!)_D3BuJr zQmm#lRK{E)<03JGf2vEOEPq$Lk^xkfSxo}L-8L$SquRSZuY&+Pr#4a4mP01E zO2o(ce3|T*zX{oY?#nBAt8A%DW9~yzW7&TK-N;Q+o2qrK*t7@>6s?Z^wcJ_qio=RU zM^`my+zSC>0Q$i+&ew7wbzBkey!d&iw79OFb(e*1o5vB0vnE3R zqe_gh<9K+|U!K;VpU?5WiMw;*((Of*u3G@I5^1y~xVY}a)*4?^{rXmPa%)?osB2pj ziRaW5?$$gcJy{0vM}M}6gii?ULLKedq&yCJcwMCzb%B7Bx{+Ql1VNcwc@?KhtCH$X zC43En6d;g)>pyRI$4;!Er=d&yia@H zp~|>g+(BxttuMem8jXLFx5atVMq0UAMH9;2n3sjiRq1Z5o;QH)t<$W5weCE*t}QpD zwF!{Q4RY|K{q+Z&4*tLN$k3n^V8UNW*EyuwfU~9&;Ury0+nQsjY2tuSd3WV?WOKR+ zXa_^8rR*5V(0^p2{14u0@9FCY4?<%ls}Mq0&QfO&9mMrnCeO`_?5cFEROiDb63)Y+ zTNQu?NT$euM7wckce+W$NpCBScla;FmRzKIrYVY5uYg;{;Zh{RW;ONpTfy_D<}2>W z%InD*7*N~TeN#vzT@>l%cKxzy%pLdi8iHoMf`Qq3ywt)=duJ^JkZ%JhYq%Ui!TmUN(YXywjob zD|n#ZkAKr>%ACWt)ve#|5?=BUpY!%pawY=sWeq3Ka!i1LIaRW`Zd@mbA-ZsR28{F_R5b=8kCU|HQa@?U*1kQhzirNsDDMo|NofWe6wgHMl%8NX2}%3X-HL5)B0tNeEL-n8Isv$hpM21_6(M62Fsik!>pQj zKYyxQOXgEejf$SUzL)W}4-$nF@&&1Y#-s@`MUU=9j_a=BQf*e8QmKnu8;E>Z924$8 zTyh^BTRDTO{_zuu|7u{KY5O4F^6F;T<~UMTfpZ%AISb)#Da)+=B9Df$S&NlpKJsIE z9jZQ?z=`KT{;1MsH|!p+c0E8I0XLU2eSdjczx^#<`#Z|3-|ftqI&Oi3^g|$XEBDjug|;7;1(eqJ1s{3{o71MZffMNJKyZ1Y|z?YO0d)xUEy^KL_v5 z1y^`8k_apSa8NooI~kpoy`X4TCRmZhBG1HTe=p!zZ~G8=Ep0ZE>>ZnDp+tq%lz;6e zoz%lL44`s%Q$2uqn|ka30K~xK+kPn&e%pC{d0M|(y5!^!CS?LM-CGvoA-@N=D92WR z(I$?cITcE|s5~fYl%2YGxI9rg1iC@Ez&p8ON!zQbj2f7PBd@QOTD+VG^4*m0txt4O zWR}9z;g>Q=uejyfPTKBZF46P+iGN0X4vGh&^m3j=s?kHMbJ{H(RCHLy4L$v#Nutp;wA#OF{A#B1Rphzqs8`Dt z$utx47`ZxQ3FIFQ_jCi+!_f7gQJT0&J%qs-@b;>6QLv?Cb&0Q5segM(plJ@Ub(xP_PC`n%5m#207F_JzI#3?~00V(s| z*$LwF%auOay>Ou-+?xEX$gjd}Oxt)3gs@XKV z5(FeLTO^k%G(-xbrb6J;=XKw&jt!@ks>h9dVjx*!Q91xOvW{d?&LxmdD@w^lJpJo* zec|A74+ZG~H$!$(?|&Y)00g_$I=reyfNo9-Vl_=HZxFw$|9e$dYM^`9lzd;F)}JrN zhZnm1EC^mMAuil^%lZjBd`>=Q2=&gxxBL*$V)_m=sn|30nX zSv6Vr9p#k*wc|@2qVJy$=hMTQw_ObZv=KjjQoI+yX^%GnR9k{$M{r^wmq*Emwj~2^ z%}90&#HnC?LVs2;LCeT_*c#GJQlTV0Y=l4ctyV_Z3;F<_`aNv@RsB#%aQrzJOox=Y z#_hS=kXlY)A|)G?+>hr-HBQc>du-Wm%jW_kYdx!>@pF^FIJ$htswTE;^Vd}NjnrT% z{^e=?&8j~TghX=?v%*xGK6$vPu_IUSbe*5dZT8gly?;=Av(IGU*EOc!;LzFf!;)edtTg zQ4$*;z??%}-_r^HeYQrvIP&h5o7MNy12qZNt$$*fQh%y$1wQaNdE3COy+FiIaC?Y+ zMx5jX2$#M*tzTu9^l=j}ch4!=pW@#FYPtgjUU9|9iblnYGr4PI=sIsHy*eD2+qRz_ z1sDH~WWI9hCwDxqT3b$1VEJkGj7X#B90Lz?-8zz=ZpMbX-h6qWw!8ub=K1&Yp|~#Y zG=K4I9g`4ybfgUmTdB0Der6&euEUP_NhWrMCfXK%w8v4EdFU#%I70>evfPv*!?rE1 z7_$~5RmD|J3e&fn_&2NmP{Ny_6j7c749@bSGEb&}xB=^6U+3b$aw_lf=$1|JkzUeC zHJ}z79=uIW$mXroLDribh<@Hg7Ah%@)_-31<|DgJRDGKRXn8sHtB#^yQGPjJRPWU$ z-O=pkYH&@ptpz2a9t@xwwOia{r=6)dx;JgfX>`Wa4vz4}#Q+Oc;ZL0FX?dyCqtr)N zt_VakE<(l)PKtYXGEiZDd0Kz7>JMd>t^kA5AHW0H_WSiVtA zbt4lgiU6=cPruN5Z87wV0<5%W&+r$qke@oMN}U|OojmMhIIeZs#cLifU8;Ob(G9ON zcFvkR^&HDE4nhp5Yb5^Tg!tYxiSiAd{>^`?kB^Rx&M0L%i`Ldo3zOk$iIl~IGLhV- z?$7S$a<4M^nlgmyC33CEOG*Enwnr}}@h`qV8OH&AH$Q-{stv`>ubbR!;DEV|ATvMSTRiS|e3M^zQ zPd=Ci(ATUw*_5Pajcza8#cdgKDg0%hn`cW2SH&~cNSuZo2_P?t%63pnl1h2EbMJj7 zQmx_yZ=GhUDm~kh5NZYO7>S2z3o3t(WW%aDn3H@^x8KT~>Pe&@*PynoBO}Ok9I*+FFb^2uv^pQM06UyeDk`S%-bE^U)P$9O6||oxN^^qzj7e(|LJ>a` zpc1wsFq!A*`Q``Y-A|!B;Y~kQNzasId%4w1a8oLe*9kNkU&`v(|0UTt6{C(hm0%d= zXFVnzPKE6gS5yJ=?G$xSvqOJFQh-idCy^I~N3nDbg#sP1pH;VrbZ_b0{%EBXF896M z#vyA4jghLwu5QX)kns|PP-Ve3g{bLgZ&r2y=TO^SxAH;0dPN;;s;BBK@=1!9X&uj@ zzpei!S3)P)JS6_76F}Xz-7|OcPT&b(v-%!^pAXVj9q9%`H$ck2PwRhoSk24$fTzQK z6*nC;rQ_DMdyiKiyCi%e8)#Y~^CtW8I8Oo|H(rVsqw)$#a9l$`4WZ>ASZouuz$Mn! zR@SgOQJSu*>wHzOHh-P#l&Zzu3(Oz7UY{lddmIytM|r@tb5>IMTpfUO%;B0R=ZeRw z+%dumxRs+D}R(=Tm}LXiP?t3 z9>yn|;)F~gs=_gcDNIzhC!kR~aQWe*=|Z_gyDAuScljce#joZmu*kYTRn4X1;*H4( zh>^43Zk=TXHk4U&NH7XOfawhHY#cYrSv%hxU+{xkAHap6UBRiJ1YlA7EimFk1ikiz zhANZ~s+17`Z|3l&)qngqtnMEJMK{YeP~uDP`e!LKGl=|$%qLPBFVVpvzX?1n0qx53 zhsPOxd5^xLh1Zwmj;pt`4FOyBsL$CgsUDSAV6CP%A%23vGUK)dh7W zb;T&x#!(;p(!=Qu0Fqnu?QH!SR(~|+qZ@Y3B`2k@38R@>lo)(#9(qaKQ46xFK>SEr zIbA~n-*^50s^v>}Ptcvqs>QJR#(h`a{K^exZhUL9TF*(SFZWgt4)rWR81JOGHdgSE z>%?nq0JypJ;(wuj)T&NdzPJ@^gJg7qt5SiEcXNy3NB^1se#$esRMk~(fSexo-uoi| zHpTd=)_`i39aB>Upp#n1`AZYxcUTRqdFR9nAjvsCEC-tcfpQ6Q)QVg^6kunlopYmU zyX$ilh*fFt(y!5!zu)Ue6p;s^h&bAOWqA?CiM)0q+<*T)H*ri7Tbg zUQ@A^_kWnA7*ht`^&w-C8*XKWtwxGKB<#CeB_EJ1b;lF-100p}+4?qfx5-qQZ4?5@ zr~iubc{fiM2;l&UWj#jQsbZO9O1I%bd6g3FpfYn)z+!Tdj-RYLj+->2J6hoAP?tRF zjgBWu)QNp7MxUk5Zf{wNvwV%?H63Bwm3O2m;M)wn@Ll!6((A~+aOdSI7NvVS^|*CBK;0R_S;G{j>vH#5Lk#);`xHSVwimvThfUW}Naulz&{9|iSLV_Lnrrr~P;^L5{hb+t4 zBEJ`#1d`1Zk-y*Tob9@vVcxXO&mq3LQhx@KlI)1ZZ5480K6V^+Gjq7No{2jlOTQdH z+q!}KpZ6B^mM+_}AIe6a$8pF3Yi>F}PF{i9Jt|yslF4KK^0fYlrysIEhn+>fT!?#Q z^W5MZ1%kKDmDZZ&l=G)MSTY7n2uVxJn#nVhY$^qY-`DtVvRbnACQ`gLW0UNsb$@6c zjk4(2Z9wt|VL7^+M)CHF@>LvuNp+D`IdCCpRQI9@%8a@O-TKB^a?yR*4`g zrZ>$Bfjsh5D19kiS4yg~t3*0LvMO=%r-0GdhN(g3u&y?3=sWf8CiXuH_($bavU3Ik ze_awDlC?5GBuc8K8q}^kY7U&8tAASm0JNX1aSuN;S;O>WQJO3Y6ut(T;yRlaFvJj! zkdAFPxH@sUz~taBZZD->mf9bl_O=96HjJ8b9GZnu90x%v__zzX-HOXa4XWe3RF^#a zNY2t8p78VZ5j2Hy+2a(PsomQj`(Gv7@&XYK?oM-ai-X!WFS=LjMPCb1?SH>Mt^N`L zk00oivU)mU(w$7VL~;l*)#cM2iB4k>RS{TI)~(8J8bb%&ejlRvQud8M1ezyoIv^%r zMkNlmuETS!sm5T@HB)&I_u8Aok6@E-z0Em==U|cJkc>!uyo!FKJeCOR&jZ+Nrv@~4 zyYWK$e-zHPvwSEA8P&sbO@GB6*Hrb=e8nkK(~^R54nESYCeXR9RSBVlNJX&LQem@v zd0KzMfgg)LJvh&FO)^l;{A}!8AOd0$&z~StsG=_|?kKj?wAr3jGr!}|A3`^lMjfri zK))&U^epmV+?)y$X|#HDLC{w^i5&cLt{inqAohp1JS+%r`yo>=^?yV6(JR^KUN)jg z)~BrFtDclLbE(8G z*JZhR#Va`ejq?4EHsV_HJ8mUP5C<-HxWSn~7?;&rydr>CnL{3aKF_n4Ey6OIR`z|n z07Z)oyA$q>QRzR52|wZ*u&9nPLBjKLPAku}DXkKt?mt0X>T>6sz(t4y3UdJTl(-!> z)|X+{1`~gWMVP7>likym+bgrOA z<^BG4w*JDLLj;8CfZeNd8h#PK6j z(<$Yl+|FqabQrv(DJyxb zNa;@DMmnEl{9|tvD3wnQ)Ez<+vbuB^yM`RG!=g8A;nSruPa~p8<9nl1ogXQ{z>g|} zhN3t1dE3V&<#lj?E3QW9BF&4koyWg)2j$+4OvPZK5qorqyf-XIhkSJn;#ro1lIHdBDFkJM{>hPY~hJ&Lj18PWGmDkQG;|PD9A0x6_ zpUE$(a-PcbxMxMoy1Dr7EI+(P)kE}{?wV`fE;Mud2}QR$nX1rgIK#sr0D^taqznmH zppt-2#gMxG9k=>JU1?{R7Xbg<3f}2|JzFupDBu)NAC#m*Z96CgFW@d!j*B#>5+66A zfD(3wnRzVJmf6K)=o)PmtuKFwo4u!gsz#XrLVQR6kEwRVqsN^?V_m5e>EEp@S&p1E zM^ne%yUOoHpYrGs=D3;z${A9vUi3;4r)SU_;&f8j=t`6+-KA(eKw#@~6D^i>ONtG0 zyB?-G+TXSTr5894;fL#K+C*ei7Y3>a-COw$AdB?nX{Em@#>dLt)}((Lj}|K~jTRSD z6g(s=T53o4!T{BZ^qs0!gPj3@kDV}y3XlEGMRB(eJ|Rt2p3N!Yn;*6d-J=0+k;SMX zo#@56b>NT7bM~g`Ql0b^{P?7P7tqhnnN-e{0HqK#NGXs2GZorXWO*OTkLrEPapE!# z6-0G);i&V9k3^)~B`UQrOFT5SKYLTjNqO$RmjOTlgl%apIzmzT zl5MBP8c|uCt{tkxj`_NYeM^MQ0DM=$vuT=LZ(AJGNyz5ql`Wigo-Ub{>CL*;xXWakuA+z9PC*MhzRaOVQ#&*a z?anzCFXh=Z83Fzd0Kx0TpvO< z+I4KLZXFP13>>m@^?h$Ddn|X~`1cakfqH!4vy!_V$%ubuGLS(-;pxo;#XmvewL^$65>X`v$H|Epb@G3KXH@QQkZGe_XD2=oggA*UoD^8`)*R8_bLMxaITpn|#mAMZi^IuxDZqIF z@=1U3>`n_O?M^PAks?du_k-(;SUu`X(0D%81s~@toJOLnMsuY-S<}k(Y;uRwWA#>p z^?N3W4gT7+aRVUf@Bt+VO>64%Co;A01-VUnQaqL^CE^p9ZtGb)U`45UpQDjTFl}Z_6 zqApg^c)qEW`hjbjs_L*C_g#Nz;;~jW6yT98#z_1d=Vw(PZL@CANyQTvN90i-?>g*# zYd9H$nhN>?+2?Jd!F65Y_9fdQxMZLtlRKl&{PMKQpA_B)shMO<9Yf5i+bLUDCO3Xa z8bgaz`v_DvAPEhuxE!FNTT#WZH^tWePESzhLI>DcEhiHisyDV~7Gy!3Rt$(zXc~ z54XE+eU6fwc>pmf7y)nDH<6KBLarocb+jh;yxZgm(Q1xO6 zWmv+g7H0D3S*Cw}-9)~egn54`KnTb;6rSM#s7xXWi_A)jIk-Dr1f`C{eNW1>)0r!$ zkoTyVXZtbC1u0L3sL1s?ScB!K8vzd&Kz&j*6*ykd~|FSre0yy zpEZEvRJ^ZfR9xJBki>CZyf{FFF`ZM*Pu5ve?pp79{8oK1n$z>U9%Oy1!eE22JK+y@ z&h<~%M%-=KrvFz^nNsGm90rGk`0-{|4JNG zu%)glik*y8YY%^iUr|%lb4h}Essm<0;bVHxrbHvzu<7?)10C4;NMD}T-xAq}G|QI)p~4uqr;&1)@HH z>iRqaRO){f>A1j>CwD)3>@)BER1KSX=2l1VC_f$L9($5>-h(&D^GHvO8r$iQ0*(U@ zsIbK8Dre#66VeH_jwtI@U8QneQ4tv34SEy!b?Wnt0N371TEKU{BnXm!(v4O<7ds+X z`0}*=X4RiUHkTx3^=9s4DeuF*w_SZH<-OdRPy&Bnkv1^tIwj7kK4eu2ymCzo)Ihn& z<7hRgJy_jQk;qKNO-(giiFa1KTq8L}@eWmaB5DD@@RsWS)v*%?N(KJ&Ud3vcWMWsD zDt7r_Za##3v*vy~?{hxE;3=vadNoH);}j|9%<*vvwiLZYw{|Jtku`sD z=1tj=ubS1V^)=h}4&o(tfmk$|Ta9H~`l^Wfku-5gSu}j7S*FmP!jy#c==npCdW>G6 zK0T|Hr^;z4yxYD!tv^AC4<=>XV{`Qu!q_g6oLtK8M10g$*sW=0oFx$5KRn)cfCV&~ zb5uw+e#m*0*qWtq!yZMn#Hr1uh&_KN=^L?YALgi16%1;SOZiLnM_+MkDdYz>NlkjG z+>>}~XcHu<>4@}LVYV{@kBO<3s$T{$D8iYbu%+?J)PF5`>&ra56?tmNsp_IjiphW4 zZk<)*%S2Jd$&3#;{L9n&>z#gZ1KlBWH-{r!lB3Uit0>3F@0q$FPle9w)9rs3@j++j z(*Rz@>%iq5UldO}Y&Q`1#v?t{WjsC}pJuvP&q-0^;vhv(m{XQd{-Tmh>wHTbfWEn$ zN&}G9fXI<#q&vIZ`Qcnk{Tf$qA4?w2#FI%ay0~v;8O524SC#*#I?__LG32R{l37&? z6jJ`x?DO-$NsWA(WkE;r`6YiR{wmeOve~KH~AjZ&AMfJ+1PQ6N%4S+Yo=aG3v5L39&bkFkiZWJymL?_t_@px9*jxhx+2GhcwhvmZBzUl(Kb7~n?bBk_#Iqf z48+w1kZx5cR2NS7Y>zC^iC>P*&YR@=j6&sBzR2z88OIODBVylK6C+>^Qm4 zgvIAMUS|sgLTux6gD#u%iu&9xa)UETkc8$ZXPUU(+Fe?jg~-M zj*>NzAyMCkY0!VK1&6qo@FcZ3Y@VJZkG^@ichOc-#b;H)t0ji|`6OcbEFoqKL~gDS4a8V2`+nUbZ=a>fGM0eQ^~uS1QC!;->bZXar~o z6doPq?R{v1H;*mVIW-h^vhRkfvTS@Nu)S_mE;Cs_e0hIbe}WJndp`VS=a-glPtVs@ z3vfSJ-DN(oX-;y@ed_w5gQ6=(+rWNHJUTGp=<$GEB^9eBDwrU1sM#`?owpfTh4OeP zqB|8vJnpRQHD&jEozrzhAc;WTS%`8HsW?UFhE>JdZPO3V)^l9? z0-s7zA1bpidEuwRwC&xO-x6hm$4(|87yyxhqZ)tb4f&B=eA!u`gj4xAzA}*O9yVcT zn-u;$E&edYy)Mw*1e4bC;NSd@VYnofr8{9mjz6V^&XW{+ju!iuZs4Eb>G8o0yxcv% z4sDs6qzbjfPj#5?70)H3XqULaV7JwmK8n!>K4_eWda8|9wX&CMLeSuUEARwFx_avZ zXG(t)?IAd2hd$G*>=q(nSc${u&6m$l>wwdqrG|GkyifPAAKpsg;wfO8`FT#f_wMT^ zcxOU5HKmgY{e2^8$jQ3XBOAUv!{a(B*qhspx$B0mVJ&ABAYn7ORC}QL{(>N0J7gaQ zio65@oZI` z&(li3dp;k1`K^wgPhD|?7cEXM=6xrZ>skWa5&jjI9I9wvDy&F*0Vb*-ck*rlWyIBX zD047Cv4hO2l8(EJi|8P|W(k3b{(+yigFK&K1*!8rA*<91krboTiVLzXiBZG2qG09# z;;2f_HN0*1MD;=_ht%L(eG_nb1zmqu8<~CW&7JA8hO|({AXRW(9AC|RPD;7Xt=HRe z{wOz{dPdbkL_%-e%uV?!FOUKSIxaQl^Ygymx~SCDb`ZmK8p0j zn7Wjw7^f4D{-t;NyF>P$B&A$P(VsyXImcF%@pUx`@3O*|R-MFtpfSKHj&oa@468Yp z?sIfiD!DVJITr}OO3SQ#91wr^l~4En*PVfu!Iu4@ubMkoJl9EXAQFC5K01HP!t}Cf z^w2Hoq7u?uRwr?19xc##5X)`IQ$|p|boJ%z1|5SauU#)v6-9>yt&!x^ow1jn0ov4? z&Js5As&xswT!Wz`{qnT_cE~>FiGlc`2}!<~%UIc)WETXGB~&3uvfajGtUMya1_Cu|aHZ-MxIN^0huyjUaZy@lVNMPU@wu zDhE#gxS(K&gzRxvN2^`09hq&Ew{jFa0U_&{dpi?Nw_D^}Jqfhk7k3fxaBes5cx5tJ zzTTTFLG?r>0@V|Ci)XkOR#aHB)1yp;lC0rqq1}`a92ajTA<}>UG-Z8Uo;uQ9)lHrn z;#RE%$k$d7U0IN@C5;Z7UwT@{IktxQ$lnme@$Y2+us;7W7#MCa%M&%&x~VOlmvhVE z1MP9|4h`){^iqw8L@KI@{gwMsr$%)?vWq^FColoDJE?~D2BmICoW|lN3sqZilUM(a zx9Q3=&W)<3qfmb>R@}tDn!-2A1_in2xB3FqiIM60?uM4syzZiP?vV7iz$M)PphSD-EMQfCr|+y*in+Slx-oh zRp3%w`u%}sx5s63cy290IJomg6&{YMie`v?D?5Mu`?T_}y?6iM%c~qmeo%cmNo!N) zeDXDmJ)B&*_%2PGwLC*aRBRhCK@2 zXHgga$?@V%YZ-99x`BGSD>rPJt5lFKg04zi{#8A~DP{S;ms4JD?IjzX;23SgxwN7Q zY$Jaiji>V})dX6qwP=1ooINy!AY+258+i3($CZDsj%_Ah5E$3MLFj`9yxlSi5Z z3i>NaK1*^k2Q+jU9DLQ&qqmB4`{hDO!EwJiB`uK~D8s+tt^DFNzZu|Q z^IO#|e($|)c{sm(=d8mP3@BJw^p`3r$ zY6stK6f&$UKem2}Aziz+29oC4y|)YGSvXCU!0@<Y}vYtkLwz z^39zWj!jdQiqb{WHlMlZ0DS=%lAC|HNo?NqF%k;89PB3KO$llI@`POm7gaBGq&9&A z?zan;y#CgeT%S6zY_-=yTqLu0%?@6?Q=*4kVbkKI?0E_ZoIzmT~2+{zF1qpJHT-H2j3$iaWj(;cWYP?N>$Y`kq( zV3TsOcXSU<+mx#Pl`8BGqipaFm*}!`EJH~QuE+*j=^1% z1XX9jzCBk}9V0P#v!8i_>i^hKvMWp>0%)tcpemhD{R2c&&5qUYeZ z%g8b;Sa}WS(r8!v0rgP6a0BySU;fA+n=2t6WT>%cpQ`>+wO{Qel(eX78jZmh=?xjRv-Q9dmZrWC?0K#=Qj?&e6k&?VPOm04M2OsG+ZprnxwwwEi z?NSSog!6x7P1W=1F94Z3-~v(d;#`M(B8k%NZ{9D}zl#P`W*S*JC(b&JoqMr_4^3W7 z?mO6fI9+zRGSB$ni~#E{r%QeElD}a268<{PZ{Dc}S771^?slh2$2N^jT)8EUjq1>Z z2-V!om|eS)8YEJ#ZR(pIqsk8S1dyqAL?adSq-uYOeR}e5k5A`fo$6D92Zy|0zzz*LZE-25(y9Dgm41;)kx}W_o9l1~N|jTX zAX6;4Um!)mE6Q*xwxH6z$P2?V#2Q7rTXt@?;OoLNNRw zE8Knw?Wv>78#-%aOWVCoOv@*uXgs$k0E zvRD@kl2v(i1E=caNf}Y)Bi;U=Hy_1&-A-$K<%NI-LE-?PXaE$}6f|>I;(h5g=aPT3 zmJaG5ZQu56*uNFj(2+}P(_`&DDG=PP9g6)3yX)td{#N-DYX0cha12APyq%z)iRo6& z==rD;lC=Pn8>PIj)KT)saA94ML~R(Wi{5+^wSUPnEz8Ap?XGb6r;MsANW4~kZg1L#YHsT%!K&mx?&vWFRwu=*!dk+fO_`xPgaVHcA0m z-|A%?a=nZ6P>xsPDM{p(KN!Kvs`OGC15f~%N}%uox5F|xThT$l8pm-qt!#gkQ6yQB zi&B-7Adjf*^;5#n(Cu1__}AH*7e_Y&MD>j%3_o)!lu8^Ws9)~s#V2u2ozE@zFLJXc zQ`#AHYOR>abd+jcS0CHw@&=9LM7OPksnzSAG|w|{&d`xOu&wDe_~mJRF(RXcAfboT z?b{>YoZZP6=_=6ZRSc|FJNRDm-5048)y1m@RPcZ0zMZW<)0On0 zcS@wr4m%t1=aLI`$QC=BJ#Z4DGv}qisanU&{V2k|>*C6B$x(1J%-u4sN#=EHIJsdC zek`slwsQ;ffCPeK&<2kt0(f{>*IVIWCVejC>bfSnH>vDayLcZdEw^IyFc8h|Uu?ar z8ec&b(bYhT@=zUoI8cA*N?a=PQIBr-nC3m~x9%O4fc9A3%KnTx-PTMl%3rX2`RmKK z_#ta;hI-Uup{R234r=5RKT5tz1>;fKG+LW`pwssVZp`rkgVoZJv#s=|q!CY>GwI#{ zLCX&21$;Z6T@K$$+LAXw_Q?g>^w@)XYr7pry+k2HxFPB-Wf6aYO8iFRj0$etqv~5x z@Vg#EQTw6?tiUj+seie5PLiRRp8B(g3TEa2>h9QiPva(tbfaOPmLO98lAb97G3fIm9#OMVgyZ2N6 z6qv%h>G)MCP>O$?>KzZ-Y!1bW2dM6x(idbn^SRzt^+SGjj`*l1;%?83P3f0MCrhOZ zmATQ+m5&O3YH@619B0@rY&x4&XIl*mFc*0}s2NbK9iG5tcEzOVE^VLuxF1mXvVF6Z zviwr{ls_#0aTA|fcnkS*HJ5KgSei|BBq|4vGF4qtBZ+?kTM(mw_go~)<~&CuQP(8o z#ArfEfY$VoJNqLuXP%-u0M{4}0beep@(xZ8Vj-}4XkR=C|L-_BPp7*9{5GPf>Mc6H zDF;IQYCqdlO7@)5_PrzXHJ|&^M}P-%HQr^VI^^v+VCB9fj^D+Pxa5bbuJcSC87)Ib zb%#V>VLpHPm;P4$!}1?i4^8Ea^PX*c9QNw%B90IO*o{bW8C2OQ~s;Owc7~?u_kg4KVyxB6|nv{g+$kWz!sVY>m zbnNRk*||le!%K2}9E0oR*m|liTrST1P+Pe1>uP`Nr-T#EpbBtVw^8oRQlxfkm6`J? zJtF_Tlib@Tu%v)Mz4oO}tbbY~ADw2cgq9vx>RzdWqLe1dENbzs`G$*z+kZ~oVHZ)T z*(#yI{y#yMI{48+jugjrrj~Sk|0q>Nf>M&Y&A4~Bq<_^Ys8VH0Z@e|`H{Mc&a{?`u zJa2!_cK2pO9X5-(ejw=1H6V_4X>-d}a*bChGTaZXy3ZDKUmzZm0-7CoUef|#`SYmb zj^-nuG4*Wa1tcN=L_u6$_1oD>zlJ^^o#rmZQ;y-KDjHQM-;^`bio0SQW!bRF$z@QN z#=cI`7|b<2;(d2sO`gdhex>DkY((>IAI5(lQLK4v1Nonsk^?Yh$kLJ|t@zdbidzo= z#kKmU7d2BjXp`rmXDQH3FH{rUt=)Xn#o@9Cw5UD#x8x=lTu<5RMK@1pbl~CHuOaKH zlT1%3Lu3p$TnMje6ZxpCU6OHT`UOGM-`&^vG4mM!TX&gcssnWR`6{!?W40Vqr-pwR zzy;-`xUCk?S_-ec+4{~gsKj@uUIUcaUzHpIpb>HFRQ&ALi!0ILpgy>|nO&N+1}V2p z+t)l%^3kH|?8z`hpmHyOdj@ij<>9OAk;uzB?6z^r#OkMyAn8yH?vGQAjJ4g6l=2|P zxn6Z#D=0jo&6zqREf(s-#+yC@Ii!D+vJw~m%hP&kjlAR5!S71sr(>S>EJ?ssgm9@XbR6yrD*2;jkF99QYSql>Vvh3N)%_|87}-j?>d5xe zdU51n-T3N3%uXG_QE`tLluPlpe%#$;Fq6N)13by0?TyRbQ=^ML_5wgzg>8QqLZygf zrZ(ZBw(hiwN@H#N!9v7UfIE_`h+l3vUw6}ShC7hH^dRalmaiY2W(foqjy8R={bVkm z`+llZO^W3*HxbDzSCy{0buw`URKX82d{vfJ`3?>t(Ow-$*&aX|o~HEDmFC}^=^HSB$L(bXlVYwvnf@)S4qi}kX5ij5=H*6! z)2&5#b!mWjPCy>LYj*FhfQFcSRcf+BVJwnL5hbtc81p#vL|GgM%kY1L2&z!0d-eLT zPEd-@rWC%dx%9TZJ*lwC0`HxDTeVVP%G9cu2X?x};@qAuUR|ys_`4zr{5q-@U2c~f zakpctt}T-qHAs#I9Fw^ew@`f{D5jDW8kX~VKHR+qaLB~4DPKMEtG_(0A1trT#=EMn zJtyECnQp3bxhWJTr>cK;%{m?T0DW9crP$G~K$kJ)g~;N>U+Rgtv}HN#owfXUz%<~H zGj-1SR3j{9Ui-bZpSwdZMWSxI=ftD;*#bWjl~mOpT%M_BKUn#eDH0@LB|R*H#*@T> zG4xF&XsY10waEv_Ox4h8Uyy?g*iqiGDo1oaJiD_1t&?V*?lFILfjGsY@<}|b{$=`F zUwruwQ{fu)HSBVS>sBl)^`fi-k`xj!+37x2ZbB7tf zoF^_H-Q|BoX~|S)ItRE0r?e>dl1$4v$m&-n9p;xV80RH{;FS{(4PN#2nq@Qnk|LAA zO}}dIgOXh(r^ zApDy#wiMV|E$&Vu=>?kIf=b;X*WTW`$wX1jA1QLw8#f4bd3HG)ue0@Bt?_7=;ajt# z5?t^EkgGJO5+)zP-5lx&wY0KkDGCqIq?2lVbU)$ra`#i_7*$7TWS~(LQaJ$3JSRSx zGO~XzJCky#zyj}^t4p-~^0d+)r}_P~hVrzY0P3dXmvSo4rK`n$id;2Sk|QOVi$&^~ z-d1@^eB4dN;c{z4rxB9_X;U=+piD!Rw_5_wukNKEw~u)F1UbqPP&7&8c}Mv}zF$#= z9OMs%&!Z52yAISc-3~CkTQ!l)Q3)N@)xdw#q~}0Y`4jbAn%^bx0eN0-*RQNVUYOdw zYDXcL^B~7^TFKZ;QKFEq-Glz}wDRAC>|OaRc^q1HTk6Z;s(xeD6ip)}6esZR4!V?6 z4(pZNZ12c1mOB;6qa!F!7q7bj&!lv!47@bJq<9?i7eHS2O&d8x7fqLTuPOKIRaJlI z^>pn|2&%3?>1GdFrV_4MZK_+9!FyYOXveh88WO=_m}#lF3I9rDOiMJLx$QDg(5=Z> zd))h=LQ%wj=toFYl+3DrFjyvQAoS&FmA}dU@u3bIHKv-f!V*7_DwL%HBqcBhQbADj{uxsS(( zZQD_$H$B(AL$7wUmPkdBm27K1{cIu)O#-MiwAhkLBQyQ9CueDWPDMre5xY5VgY}eX zX1C3upKS7~3;TKAQ8r_~)NHAmA%EcpwqK4-`_M=_l$=yBZK%ppYzWKtvFU&P00U*Q z5c|QqIuAbj1eRkLNxXG^7P)?^e-VX<2B*$MpwY6F6`1*Iw&26wF>Kec`{Ni*qSDlF zJG57w$e+@>0kC}D_G}0@8inY~ERkioNN_yrh=fK88(e<^hHUhxs;qwyC)X${#n~=`)Q*O&ibjSO=eR|*I>tN7|{6xj}+ z)>i(Pb|@i*B))5P!cvJtA*>-p*HpC2tf81Y0*~l94z&YaLy>yYfI@a%r+n|W_XPRT zN&}|NsCnTna(!4}&nTYk)}9JEcJU@R@pdz(Uy>KE7?@9d~xiB0Im9eXU zC>BSmd!g(iR%t!wrYf1e>cqvny#pX#@elp_s&|+_S=5UWp#Y8^2m1An%CUn6BL$k9 zHa3fS5un}V4(vP1$3TBwqq9&H%P6E&bqU`TKDXNYO+DzI{Lppi)ajU8;%dZ`SJhv3 zCdunLG=~ek+BUahlAcr!MTmDKo0FUJOm*(NqPI?L$1~cOr}eu-RzDODvb0W_I)$6) z;P=$~Ydlo-cA1Y$hyOH$PNRoHnHZet!o6~UwXQYyZjF(iI$#IC(C#t_(wu%-Hq{@|d z&GYnO%9bUmNTjK^{7ya$RWAs{ep#n7JeS8?3>$Bt+*x#t_?HJ!{KQDAD%_MFAL_-gS?{qcOH3?E^@r|jCd{3tjz49ltwx@oP z8l|~VSg!2qevtB@T3hZh^Ye*qnrKK1P@h;Isy>w>aZGPOyaMN-4~Z4XsbRAp`+kbTf%b&Je zis{qof#Ts%c#))|v&1cs29^UZ!BSKnr)HD9CgnM~bU*xRZCvZt@Rl&cJ z)J1+?yn{=}!;zY8uA@sX+7qC250WHK9WUM~2vL7uKY4sqt*%SDfsa? zvHjWPzI&&x^XXDIR@48+ChyWycw9QFWL>PKRCDn6{F0a!_u&XtnabJ%7(7xWJ2C58 zcdvgZsr6y1IyrRP`+;BB5`a+=pj*)w)k$xq&fXKU{OHJN)mL~bW$N1kJhEe_SeCug zHJlJyN>L$2Em!#~j}|NnFLtuV&`j|mDM%qBPqtO!wbFHT)mMgl9{r&-;<)NO>(a4) z5OLNoPwSU=nm<&3z&ym@;t-b75AdCS^x=Qkqzb!L>vjS60SNw8f5k1HUHWDJOng1J ztQG)C;stHOZ@2A*hS2|4iKDsM~4<#p=ws3*K6Q1>^6%m7w&Akg88Lr z->2cy6%?icpk94Q9Z?gT5Ti^>IVhpM0=8|+Quj=X(HWd1ECp|fVQ-F2AsV~>E3ul> zIrK_aK(R^P*Yh}R!-PlH8pwkC-M|TF+B*J!P1W=*1)0340JC1)ww0zhEatGH#Ro9QChP;O@{dHWm z@=f9d49z7Lw?_kr(Gkp%Yq?dg2^pBtvzbXzH7bHz4ZxAN$C?3J4<-KTIp1uzQ#aIp zpv*jxNgD7dn?swgWiQKxOs;>mv6BIS?TO?B{?M&`ge!}u+GLux`Jt0)K%=S8c{x!7 zX1hXGBhW!jK@P_3AXbnQk9@`d_P_nF|NH;(fBrB3)BpJI|1tl+|8f1t|NB4R|JVQh ZT<(_j)Ptd#k^EOv>soW>hys>;-5&E~)aVt&1!QPyD?UI< z{wsIz#dA9&LXn~*x_1)<9k!N3Qkv3K$I8L&Mf?Pyk6uAi!6m9cAg+}bfAYhZCtDE& z^_!vcGGr1n3t5-Hp}Y~N%uA6&fstVwf9{zQS?lyNjg4}~a}}?I$B6uj7nj?rMO$%q zL7~jj=ADg8iC?$>FA=1IEKk7lkJWm~EXGex%#OZ4YSwKHu#1%9)g=&#jl(XXzG4kC z(KC3%acGl%@cK`}>WBoZp8f4e8Vp+~*cNiJWn{yNCt)z*~2LSI$O{@8vj#>gtkThUnu6$8aKr7fFA2|_^(n?}(A-Y(Ftl7H{n zW7GuQlcFSv3{s~?>!rr|_Lg7zmQWO~A35>G-vao3Sprt~(rzlAKyL}TgW{tClNG+y z{;RCIF;3TTovlsC0rv&#L#N(Ze>F-tiFmRQoa~D7Z-_c%?CdQs(N#ZK+j2!iBI31D_G@{qu4@uV znE%}Rn{qgbf*QFHa4c$Beuva`r|Q(I{8?K(KUV8y+xB&zI5c7h$e%W@f1NS5Lj+8z zT^=|!EE`cNv~g{njWCpsRN&TubVVRH8&7c*=fikD5G^@!d!Z`K{}eG64}VWx3(jh;s828;QY6mPpQCC^@mfh0_e$e>lswR6K1GstXXP zv!=~{72lr})xMMqYr|G!Rn3`H$4@FCq~NnrHt;Iv?L_pC)%uI&(^v2G_KptVb~Zji z>RWfP#!F{H*OsX{DaCRj|F476C)pe+dQJ$B^yl2>_M3fhi9pGBD?9F+z*Ld%Ri=}Q zx*lCxl}Xx5;h+X;f8e$C;X$YiIOO-9OT4e1EQM=vI)jJHjmJn@S3ashTQV%I>2Kox zxfEw|+)k(0!x;tzfmG+Wd>Zmvwx@%-JF8_U;FNg{UYQZjdMm%;){DROC7)q$Z`Toz zfw0?0JT;ai4tgSn@}`7ex!eZrRSDG`Ox0u*{4V^Py{tYye+cWMvXte^B0KS>MV;24 zR|jfQsc_652{$SnvSEw>?;Zph3arqATAOTE#TFgoxfN-fM0+WxEVB2$?%K<}IMm1J zAt|E;s9DZ@Y8C7l&Kk1fC2(W{Xgs|oYcmnM9DU94aju}BY({%X&p)@X>DAxLK&dZI za~XkRPoE0_e^M7f*Jyce!SB@CR76`DxuN~npG!gN356lEqpv!rwocSM?%sLhvcViy zRApXskS%{LxbKRM7r~gG$^gZO^#8uapbEVksP@+Wpn8KesCl)mBmDr;9GGb$PQny% z0~qV2{5XqMDDidarlLy=2v~{|`|p-IHv)0iZs}q6e`g1hH8KZ+U9YsQ6CarZ=ErLN zl^%{?H~U`898>OVb2|EuC+!$Qn2WM^OOJR<`3x{-Q1mdX9PK5GVy_h3>@(L+Z}>Ec z^|s6T`|1u-VmMPglNKb(HajRbIk!bia_^Ym2to(yq7aa?suW`_zXJwI`tYk^=$(9d$ zu8TV3_U6j#zl-nUprph~VW6-u-HN-&&p+hMf2hgW%6qy1gi8rw-?XZ~xG!G!gsVy( zTfcL#EF2o`@+MDmCh@V_{QORMPI6@e?}ZLtb_7-Nk+DZUPM{-ML0MfEo2b=?=59ed zvaEgH1O@+Ct@1B_OZ`1+g|bx+3q{1J(naEFZD*WOc5ZI>;Hcr&<)6`s%(*2HKj&nq zf3RIMg-~%Y4=kfVT^@X8#Z8wsZPoIPa))g-$%KcO_eEREHR2`F&tE|PBKVKT*o6@3jlUSCxsnmBXX^-Jb7_gyUFniWm~r#K@&_FHPS#wdZ5^$| zw$Q%;Jgj_}^fZhqSNMghb}$jM%AXiNnb&D%Co)pyn(C$}V;iMeRZO)GR@wf5b>l zBVf-un@@-0t5d2s0bg$OmzI^ynH~?QN8qMn~^1J(^!mv)*DhRWw9#z{33tg5C zrwa&C+a3Od7>>V*K4_=OV#>$7m7om45+P}`Tv&Y&_OrHcC?GyfZylyz?_M9R5yBZI zZfis@(#!2F^8_&Wqn-Lo-`P9Yf8gDI;Eg(}pKQ=L(#*aBB=QS`@?vNqC0pgxMV1sS zHAv%64r$q?2g@w0hmcOM)o% zMkONA!&Irp>q~OD!YXn$`ENT(#8{9{(H2w%Em9c4&>4)WEUth}6@{zte?^)tS;~h_ zYWf(FrAj8|*U9t4=|RQo6~)kX%)PH^SnnX`)7f|x9JP!aHa#Sxu3Nqm$mCM>I%bk= z2)>kC8=C9ThsYv01;^FR-O`%e&qUE@{aCH?@67&@Hkn9g&6BNCj62Q^bwY=}1BYYg ziGOxzOi;6ueoU+pnRoj^f9mQ}Wf<_Hs3sDtotFYWAaf!;c;NIpQS(h{7W@P!p%qM8 zU$WMZ?CAXPRRWu`JDQf*X;D$Ou9HTnPL!Xl*B*8n8lR_=JxJy*gl}!C>Xw2$#mlV3 zQ54{HkKIbeS{8!7(plMSil&eXix%9J!_WM&TJO2)Pm~9cx6KXne-u&YX-SYS@2~P^ zZd>S$oNMb&fD}tLPRlVJk1u_g%p{OU~R&_qoREi$xku{ZN z56hW%=u)9hMFe!deX{o&OkJWl%`7iSVXKO}wFY^_z$D4gtiLc;!tu#YUr%r3v*b83Fo@NQI!R8de};fs?JmjQVWCwNd^GUl z<3WL^QxY?7jNO4rhph%(8Z?6=y|Ut!*HKpI$C5&Rtkz%t7S;Ht@=^EUAnkg&<$%n# z)JbHG>KxDY5TIGA$7yvfR}H3Q-B^oJS#^us9=Zg3N3)C5|8{In*-5G#^2fdpyJY#;iOsEMmZ=`A@k zXuX?MY!G*j_@_#g!|03SSAs!LS_$cAEKPvgB_T!akLSl~z3h*^^|x3nfa1O-Rr6kY z6K6;56!PI7xg9o6NKjiuR!6Jpn3*#uj%%?002SmIe_5nUkv|~m;Xpw&cv15Wfo2dY z*~C`gpNd6Sj{_X}zNgQ7*a&dtq3BJeCC$RO*+eEeN?;N5gc{a#6jOo(nfVg32{l{vxf5mjyPVa0ZoA6rc zoVVotf4IjwHLZ`89YI7_zn)bEi|MMPUf$pc@>%)-DjY-Pl9p(CKJ+>cymPBC{yuVOnSu`av zq|A7!3V4htcGEQDcz}dD|0(|~TTy-5 zf6PMi<~Y?Hje0nHEpd+8yE)MSVqr}=qIx-!F1E)lRpzY}lM2L_L#w}5>m`}~WnPfg z%LI%+S|cA4E`knE#9$DPt?Tn4gRylQshsSd)ts<9%d;-+i8xIZ*LM4W6M$~wsv>cO z(n~%lM`&)xC+B~32bp)}KgUJg!uI%xf9aCGGC%NANh_p5tP4c;u2a%&mJ3e6l*22} zlK|m8x1#v#i4L!D%FW#T6!O%u?o>MPii3SkN(e;N+|{Mof7`Db zH1ETKM8{0$DV@A1&+Ay~V!!BQMY1g6o}`ob?gmzM(R2%xZck z{y-3~zC3l>CvL6t=F!;nS-fZ$e>OeQT}gVzJxFPqf4K)v}Gf0J|(K^K7^B$XueL0B70MOCU5mNl2iBDFSq`c zL>(^G7cb{3l>|A6#k_6e*D0>nhnOk_;6HjM_N-!}qjn){KD9pYzI^HBAkL7$$`~7# zx%9AMe;!_=GU92m#?k<@I8v#bXuT{X9zD8v(IS1Xdx0~=_0`VX z`x7mb6{C|Eb!+PQGs?f_s`ED^i3*@=d^oqm#vjTJ;S=N;w`Q_(t-1hG_bXGDPd3$~ zW27Dgx3fxMbH0xEEV|u!%dR_j&nhAYJI@qtHERfaJ0!yfu=H;-f3wmTmS=Mk6qVaM zyx%D6)P7j8d1A|bZ=>|`DCX@&PywoLhh~D>puEwWlV`elDvGSOImeAe9K6t;%78mf_zGh!-sAz0+9=2RqxQmTlN8WVqL$V0)hmwX+3w}PN zDtS%(u-lpz!AfP^f65fHV;w&wI0u>YLp=sIii%CwqRL%o(u{{x+TCAC^DUn0-GflP z@({C|H|8G#GLXJ)Z6w_QBdfA>Db)GX{BiFer53F;^sL9|=Du>^>_G)3C>}kk$p%im z*Hg-f*jHE_`s!wVi&u)bE zw)1Xe?Z7!?e`jfH)>XszrjInR@{g+eC7I6V{%~ykn}CRZjLqwgRxcEbrw+rH6H3a( z{hKaGBR4CjET_wuvgb6?A3o9Z zsjAgoe+2o>5ImyVZ7Sw|$!Nt3<~za6PLw_V!kwW&(Z5nZ(1OD&rB`wvcDjI;GzARb3!lpw)4CldrzNUW6|f^{ZaS$2DHH6>MD<|11}|L`<0SJ1BsQG=tx90IrhjM+w!ibGDQekvvUM9a zC3Wi*{z&zG=d+X^-#1&u#G|UqqIx;hdstqUNgh-kbSXxn@1Dlf#tlHy^47OE#Z%rV*ypro~ykmz{UMjb4!(FlkNYsiKSXDe00Bpaff~bFlSGc`p$#ysm(G@5v&ks$U4?ZX_{VDf!Sc=ze4@Pak$iz* zUtGVGrD*riAVvjGpwHOaI=lh_f-+4`-#451K_y`ChtBXgofwXU{~ANr;+n-kSn9x2q$0-`?9Tye5*_d&<7E^w@vl z3s6RytYT-Ma^$-?^zv~J&ceqmYIpf+9EzF})4Q%H;K@5RbykT*)Dk-Ab+ui_Z3U<* zm+HsP3a>WS&YKPo%2)z7P=8#9%_N1gw%FS(uPGV&fMiP<1?}FQfBF8gTJ>c&`E}=W zwac+Yj`2laJZvdDN?fe&f`ji`yI#4F$;sMNmWv#*a;!baq_O1|q44s&5Wxmd%m2QC z--A+xqI2D(R?DV%>EJ;z!jf~kpX;j|*iM47MN5dy84N{rZEZMP7wUGx^&artnmha% zYMADIRiw09vD!&Ee^mICK0s(Kk_#Wn|GG$b-4#fi&;CZOQ{^hc==h6=+QFOuu2z1} zkcBV%qaJT+{`PDO63&|Oml{Qx!_Lmoy8TvA^l_xkfVvR zf2`J9H}FgK2MjufM9N!znyvwn1R_H8P((+gOA^X;Xo2UA4khxXgQxzutR1_p0y}&| ziv?W1El0N`f7nYea?-%_te~1QYLN)iCE$BSq1`y|Wu)WjBx_(0K{{ygy(ACt zmQ}?2v0C|MD*UC)LM_}pMw|iO2B1W4+bmC{Hh-Kvf7kf@I22wZWom*UMLVsfAkQ3B z^n94kP7;*HsdfkT`K7g#j{f4s|}^x%~LSgn`6clg#C(cAr6s)Qco52_q0E^?lV%~KBikp|IFa*+&)2r|3D z%7;{_sl1L=66?#R%7vt74CR|DKj8eP98||JZ8l62yXH7I;pp8Bl#4WV0zb*a z1k<3jBFD}M=L~`JX{T&B)=dKA>Wvu29wRAae~GE~(t779wKflWEJ*p(f=`!?^2aRY z2G8qTDUQ6IdEo)QsxH6w)?Z7&>uVOHR-G%9D8B%OW;vId&6ylc?Xfo*LyjXO7L`T&XHxv)h{h_e5p(HNoj@77w;F67g%Un) ze`s*mx{?-TKv*LJzpP#dWuXF>$;G6!A>1xDyp!kIHrK5R#dUxroW#G#(-Z@}XgHP# zi2SgFB05wPGjSq1BX=v6R5f`aZ~j=VzgiaD4vyQR?>sae|c~;t}|t?SqRWWa?n;|Te^1iK=}c-xv8J3 zMhWrwsKYieYs^jKCC6P1rJzv`6`RhVOgSpxbYWt3@`YSYEx160QWck8hU&!)=SG)h z#htgHveb-6RdqdX_&qjik>2EtyVICWsj273YQ3~Z@;47c{;Vc#loN}Bljt2!f1N|+ zc!NV#Z_o-5DCZc?bytq&p{FT`{{q~f8ucX3FuNTXMOMD1%JWp=$_y;&N+9z()Dj?Z zN+&&+W01~qe@un9*I1SELnxnz3R~&XP>y0;Wlw&XGsce%*61En-t3{cI=$5)(Pf8k z)Xyd#v+I@ZPoU_>at;hg8uU)Me_Y#$&fA6Jk{-HNa|!{@3&}fAp=t3?hFt z0qa!@X|`2hO@_ix!8r?^UvFwO4mi=yt82ESo)+Gj^X0T`0?;2nR_moT^2O49MzhaR zSE+nvrv&ZZI(bdJ2m+2`+^Q*n64y!Ho^@$7F=*jOp~Dk!`Z+9~1zF>4hI4whrQBqS zv8fBC%*D$0tjgzul%0vQe=vxj`^2XoCnx_R11vI{Y~JA{GRKO=woD-uI9E!sLx~5j zs4N6$TiL4~b=Xzd4D1cozRpY6sAsz0!TxIwt&ae7j%KuE(LfcuZK8^G-M_2#w)Z|h zd#kIo!uHmX^i;O4dxL-KQ+nzjaHq=&#nSnvgR}?iAzp|S+&`+hfAf=ljzb|LwuhI1 z>jHv~V=ImZhhC(xM@6yo#fvt7O5Jt1MNxx(@0Xb}r!~(0@P(aBNW7`Zrs-#hC+-m79 z5M@vokpSa8yk;25YtKEVNqDc`d1lRN75tYu8b3}CB3Flg6L3jAo=wlcRbU6jMiDL{ z2qeDjxXnTIS&Dti$t0v}N;=rJ&7qzk-}~NFAw?MGmVgyef0762q zJI0UIdht%bqI@DI5|f>0vv>O3CXlOo*+w$R*K(wt z75^?r%vBkB(nE>~}VMShi#HzG5{H z=Vg%<)K-$$e@3MbjB?g$YlZW+?yg8B?{{skt3!}+XBB?5!zq785_lW&Cgn;!a}TJ=j^7Nq*!`b%$xurBIi#2$zQzg5#lqYQbs4E^pO@x~B~f z6^{1ER*hcWIk>$JMX93RE%RW z%68`H+sgjOYW>0TfSpg=qVmg*fD!-=pi~o_=6nQMZB(O6PGHp+o$cI4@UCa7Od>Dv zICadDe@x>IewW!&bj$>q$y~ifIg0?fb)1b2Ttw< zj#X^AsJg-PhqKqw^r_bL2f(QEWi^ zn@4Yog@qj~bd;u?rNDnQSJmytlCoT3UzY;!yWqLcy%f1Dm# zRvId5EZ@C)CU~vz+`2?+)6+QtO0y80e+j9&=RA+P*@f+WAKT?*>}kLb2-N<2iw!G_ zOaLJHsPWI{yD2{=v0&KmX&lRX&q7W4W3^sBWM6&xt~|opMh^rEPGVDsmvTkr68$8T zBLoU}l0b^K5;vpi^kBUQgetC;AhO|he_fNqQ1|EJ5~f3qv3 zIr+!CKm{dL=btieO3k8?y5WvA#-Zc*&mfv0qEVG~=L>4oc~Y(9>~96$@c{a-vQ;ed zpoYzo(-o+iO$85)2=83ja8l=~{GF7)O}jr<>ow=|#SOHux_7*`3B0#y;~77I>+!@MMYX$0kThNLhh zCCO3m)k+F4W}q6y`b}wRvxPIK*Y%+e4tqWGhPHZWI8@uKKE`#OP6Zt#CVqO+nkp;A zF8M`9d)bP`_HQ`nT@znbRaeKZg* zUaFASO93r4VSr@hO#P|l^s;}5sJDOcu!|+v<(ajUsglA2S9Hjj;w9- zZ8D0~{8At4v$xnaoF7|c0H$0?zxr$T1Ngk4T5{5+?ua8)A**_St{ zR&SD($YG5^Q^!j$PYsb&f62QP9;ArlRZ?KvR5V6%PVVE!YQ3FIztqZ9pP+QgMg;;))V*@ve|0PF+p=U6%CyQ=oo{!x3T?yT05rQjvhBV{;wgXB7B=djx8?CRsC zr)F!GeUZ$t9MJQ(e|Yon)zW_^I@JSsiz?{f1ZXJ)608Y7b>HR2bZcPbjhRx5gM6pB z?$x!E67$M$cBLBPt+P^L$OWZcV zg(FM;>DyS1f2}5j9KrZQY{(bkms-pjAb?d7MkeCtlG&n$J5>-b^0fQIPgy!So(fn4 z!}fNVB=IMZR-Jp&&Ot?nY?yp^Y*YYNJZurDsizKJ)ji}1RO;h&pB7=a!Yhw-tECYb zY2y^G93^uQ&v5HO%oC~Ge1WWHq#Rrh1|AN=4Ym0Qe~L+$SZa`{8C~TosDu0OYQ1%A zzO;1J9qfeb92~x}7qpa;BgPYU9J3?Tj=Ub=4liMD%_(7gaxz3|JPtrnGig#q+GglW zF2V`oURsFQO>(eGiGJ#-NyKGGIwV7`QRx1)T4ycV0rf`_>tomz-Tue~NcD|Lyg>-8 zPDS-He;2%28wnJQ7}Ptxba^lln-T>)0W1@-0!F@dk5h0J!<(8l*t@?Wdt z{$sWN_8^EkA3cbn>Pu7&R-<1n?XN>)OBMEcH6)s$=W_79#6ObAiUd>@)w*-f!8!2s zJZ;~YO;zQc*?8pkCpqqf3J2dkrFM3jy#hgKfAw{|5ro$fL-F_qs3{MX+~nW4gDZ+1 zOGo6eDxxCGgC%h=P`*L1LBtl3E%|8h70d1hIvOQpZW^erV!u~q@k#oYeD2#TEvbdu zc$6Qj_4hupele1+$Lpmmw;g;rN4F|YhjUAhC1kp?ngBN;atX56NdokglE6gmAXq+_ zf1fCo#U}X}o0ZB-vn>|%8fS}0BWh#o5_%b#`R3MD?H%R!kUv1XY~|^^$8GroEJN6V zbFCiqtG+l`!yCQA5?T2_UVW*st5XNBm0&>$eQK|l{9T(B1XOVA)19|{jwpvVJM+zP zB#ZE%=dZo>7t5bt>KV>pn`AZanaX_Ve{^!`=3UyZ=d_-5bf-$;1#1+tAFwrvnUeRI zj>Q871yv_CZc;4lDT~)P!V#2Ts>5%_9;u*=V-arwrz{L&p*EOxgzJbehZDN#{K zq%O8Yi(rPaSr$&DZ(>{50M85aw&8oG9!aEw=5vuNt&1Fl)cx;v^A(#A;}bWBawBxCUQoGS1i;NGP`(+ROQ)m zP$s*Kx?f%^iC}YmfBK;;;kk4W2h#t*@-M#pd3>=(z)(*qTQ*DDrrt0Y5L13n*h+Rb zZh%Yx)m9F@IXLds(Q<+q&+6TYb*!51Qmju(k04m*ac)2WC_-cAPSWCk+f`|$Ej0<9 z5B%^>4d+fAJ_Uql6Sm!@1HJ=UTH!@f$*o=dHlJi&h&mExf0Rxla9u{DsTx0s^r7}R zl%vytc^wuNOV=FB>ACwh+B$XZo(L;L?3{kA*4w+_3qf2-wnw9S(?3lA33c~oKSokw z+fJu?>Op_6ki!>pSU&Jz{qFQe`JO;5~ci;n}%+jCpeewJJ!9N zmsa=*V3(XCdi<#$-l^is4sWYe)r)TKtSCUh=0aAA?E#{-Jw4m4&zz)t1knV@c3<0v zGS`DF4Opr7)(6ru3&cknAhHwy0~j`Tz{3JS1{rVaQ>f|v1D(En$m%zLYdMP5nkvUj zV^EHNf6=2u_Ni*DPKW}CIZrGPB^KC@5X)-lc%CJ|NmNZbtZb=~LtP5uJ<)dgDngKE z@9OrgL9Nd!CCI6~SxIjM;n0j%uhhS4Gy(@s3!0{o!q5V~d--6jsUT=C@7Ub7YES9# zMy;DnND@4pWyvb#o??32*Uq-^I2w)S#FJ_Xe=`({2-Tu5Im7#7wfrI=m6JLUod}dvuj)+$Prfn%t?I7oS3Roc<+6&)v&9;KK3A3?x0Z5aHm9z` z@`K9X=dZz0`5?(f-b=iETaa@Abs0GLD|!P_SW&f^Etl| zgja4r1WH{BYmg&RLZ4*5w@S0YSbc5>A<Ta9{}XO z9-Cgl8h{f`uyHhYZo^>mn|}01X_R(ve*^(0Qn~{$GR0!xmrO(j#NMui(=lKK9`Cl- zrn=#y!F(w43CTPJyr~+7gAd~dP{nR9pZbKf?M$|p=ZTe@RGoZQlLY!GZ&*Pr$9eo% zt(V7Lj9+ZGMA$l)dxWS*wW~EYZ|{+JBnwb87E0jb+!0<%{%Idc@dcTC+n_>Ke+G?T ziBb2h?)=eaMTlZpQ)=krk@D_KDoP6FRz8APHV#hY~=gA++{ z`(w5K)`|5?lhO}*mi7S7o~QyHfBEZ+NaTGV=Uxds4vdVN;!uvAUTB3Qs|*0d|1AGgVykf+CBmGH&6%eMn{x0;4| zvd5Gl4oa6sJy7%+i(Ug+EfYgQ zLQ_?>dpe_8!WjavM`zW(dBvK$U-~_DZ9%FA!`aE(?sQ!P0e$8ZyKF5dEs4f5DUYdX zpYs<7e@-UIb2Tj#yom5Re_bWnswRMiv4g0@d)}Z3OlbiMq83z|2Q{a zwg0E=wbWJKVHm$o;;T;l@~hS!==9DmvX92mLiZ`FO^5U70A$`&|B+6{imyWmntDt2_+C%fBM8NKRdHGEV)T9 z+7hHYYD0Bwuk1a%m@OxgMKd+T<_nVlsk4B_x6|D5@g|!bPsPQKI=46iSTd5khw~!$ zo|3;y-Ru$#Fgfr1`TS$G>dSNG>m;VKeUzHq1(5P}@i9~qo*xS3sBCvQc4c87LC)vh zfQ(IdUGin(YhD`Gf0F`w3i^2K;H%Un81-OD?a8ycM+0=Tpc3X~LEP;=zEpqY*s?Pd z;8t77uAPeW$qm4uV((On&q+4@8p0Mtwz1dsGd!*RC^3{x3mYC@YNo`VPwj=l@SqV} zS}PDwNcx910*`1=ZTDuI^~Y+xd8eO~=qk(j(z{aP^+f_^f1hSOqqS-{%9Ijw+CnVs zjU=nTs0uQxET2Y%QXz&71te6tIw^3)=DI`Cbvv(W$I*ci53Ypg$omY`{`{o(3|Z29 zDmoR{cmYE%LQZQT5BQz-ZsuGW*KCc0No`i7;C)#f6}$Y&NF+HWb3;BSgk*GVh&%bKfsl0y?2vNDfTR`REkqNX*g3ax{sGi zSf$yhVj*wuFQn$(heLNPTT!Ew;Jdwsf-)Jzt+2`?(C%_x%>0$) z+rMJnm2R)ryr)CqUf`y#As9H45-$CUTQBc|@|iBsjJuK8fJnEkp^LYn8VoSci{t0q z%KU=F-lgO5?j(`qs31#|op9EiDUUUu1ph4-b?SPPZH+G~klPEgt6WqZ;L?*Pfz@E}GYfbNAjT0kn&$`>xsgh(m4$t9;VGtM%rco}VdnYEZ&M)}25$9m%H;v0l+; zWu+Ot#~J!$^b2I4RjP9hl2-NVS5=kq$YOume`ETvXg|S8aQvQgL;7n<#d2USZCSH+ z*44~gmlvBawwt>BI>`0pOqQ+VrsYj@=(Ys=1|$}R@%E(Sl{gM;MalvWeTr-Tf$b8> zujk6qv)3S7si(>E zC55u>7O3^UctaoW0#6D-?zSG1lq})(G;%A2Xs`c~S?D~b^s}h6!Y%Dvia~Z-flA$0 zl>P|ny4x`I^xg{oq{g`pH#wgTTUCzSf5RQYE?#$S=a0A*-!o+Gs~e~!EOidWh2Dt{ zO*p6RwIq@FQNzuvw{hL)vq$IvO^w7N#DB~_2d`Vpg{71ZAs|SW2=Y2ITYkoC`tp`T zBTMtErEl6p=r}7|`HdiYuST}#d6HL3XPI7^RPVbUw-|^gXJr9tRgimRzD^n*a+xK*C9{jXtk#vPM^5_}0bf_VZUnf6P>8RiZ zgs#9uvb25Gb5X95I^n%qH=tLXf9Yj)(eX)B3GjhQV{9)nXQ5O+EA9)DOZsCq&2iVE z`2-?rqCo(7ne}n6GUj&Ar z#j!PRBu;5?Ws^&F!OB6NZ@ks`KJxdxu#AS4y#G)XdFV%Dze~9h5OQ|NX%S9%ha^C+ z1c?YyZ&{v=P^6%Y9hAp%m9WlXUb#3A)b{XOqQEHLW+x@bIS)Plit>N4eEGuiS_2)Y zSFc2Ab*_4~ZK*g^@#~DVe`S1|n)2RVcsEzTf~vB%(@FH1hF4g;rLKE`S}sZt^(Dq^ zs@^&FaCt%IJ+urnuWHB|?f%TZo?3$e{K-};v27`q6v`Qnp$9-@@0MVkWJ*uRJ$a+L z6zayqcJoqC^#Q$ChrJ{>Fg1DJ_JnLb*#J+_24YJ`Bx$`ZwsETme>~d1nw0h3v8i9m zEJYj;B%(P+b}JS+l}B^Nkdq_(gA8_TQK8sbF5Bm2-Xc3ctt$^PHA5d^UtQ=*-cOaD z4x3mC6|u_q;P^Dj4XO+TJzhx`ApAEv1+4Q0oT8_M03+~Mv%HuDptlb&2&>5va!Q1C z%^f3}!>(kKH4o=4e~Ox6%IoUIrnKkj9KZK31pY@I9&+mN7B|RQFHQz|UB@54eymn{ zaRWc-G-xY!dHq2=1wInQ39o#{waSLeRUrY^YbuHwMA$%-DZ7{qWr9|E=sx&PBFiwn zVYsS16Ou*RjEzKDyy<7E=CQY?QZ(RejV|7+B?8rrQnTsyf9UhB4gF;4^t>>i9&49k zm+~)z;*RX&Oyili*9beO?~BxD7}%Ayd=wH1T1bS$>B_jr?}~)$%}_bE5|HCT|K9A^ z_oOgy{>w!~4ThWi9Dr-}<`lA7%HfbcHF0*{+hGqiY7VCv%9h!@WW)n{n%WuE0s#!h zDc}vq6(>tfe{v*S*iYROw_b+qd2#0x08Gx8vCE$KEd~edF$s@{ELs)txQ<7paOwN| zWRchXnK2?T|#lBm() z7hr7O=cI zWX~<9e`R;eeyr9HB|MPghBawxMf)Pv$a=iy{WFbpbHbD<2gq46lBbhn;r9T4fk5qt zg0#v|o&03CCz7}W+Ep?fwc^y_J#&WBcI&xfdK?oysUy`teD}AWB8S%Mkvhb|&!Y23 zwM(dR4R0ykiVwT>iM%=zlBW#-ksW?GUzB<@e>-;Kn~Qx|0Z{ThN%nb>s7Mv0r=`OQ zl?|dA$KngK*MF?m>t_FGUsbh^*O&IE4`tO>Y$BE16v}67j^2yP8gPrvkB6Ndi9lhYhJlJ1GyZT;7{cbYh>y{_^5%SE?d?R ze}(g`{!mhi}`%d2mT? zi*Hg6fF%zEFlT3kJ03q)>wM+JFSgs=fHPH@9~RuPZ}xFWF_w)3MO2 zg}Go>2!To+SgsuCQi(!$Ys#s4Xj?=r>#n`E$skwSR=V~2qweWWy2)}?k3&z7yo$nc zs&F@10jEkN%7PXxFZ@B28NXKR@6CSw@~c)B%hcoTsG9e3tk$J%Zqzx2cR04ULkSvgf|z_EwQ_b-jD1 z;_A4X4E>dNkKxoATuVho%?wKSMNzI~kX1*K8X~tl$oyO)GG%s#N-cYsAEahqzs1ax zQntls$P5Ul6II*i+VRogdsndTf5&RQJ2s#D#6-y64weLIxddAGMtv1{WC?cK`O4=c z8b0f^yPZKp8n7$UO`SxMOGT)uedBGZYb*sKWGtJ_6nKLoGslx^3I%0b#iF5bG6q~$4Df2%khsZ?MH z{4E2@uyDIvS`Ma?+WihrO3FGp&VRk4*fk$?`hU}$bw-i}unPoE+6ELFyhgGw&I_cZ z>QZ2B4chs?9Eg%#KLIiF^AmX8fN|YPwGT2I4^!9}^1;bPU_k)nt&_)fQkM``OXqJ# z2^F9DMBtG=K0San^d8Wqf2Ya!k<=1SE!D@V^mE-8&ivsl!L`@>c@!m-gi!CZu$!C` zavJc|nX8z3&r{+luN#a3&bCsO5SXcy9!d+a%a7H1&%S>4R(5WN4MuF5;0EGPRO~O> z>56L7%&M^^7@Z1+*TBAQY5SgR?4Oith9BS|1 zlxI^jl`5hU{V3V)Y>pP&&CwRZ7Ii3@U9Bdb03h%6QTnl3`QIq7i@@+6hnJd8b;gtw z=BSZ#ruxciOPCaOe_{gCKc1xlU_N>u50ze`%y!T(s88QD(Imb_P3+Xqbv{nzz9c#B zzF67wPzZXce8ax`=x-ffH-codY7viIk8#uSU1AjL%mV|vNR zUkn%Pn5MJAq}ZSj-DVWvgZg#&*NXeE<PK>(;2zc-yjl{K!&EY+s&X|Z z?xPc!b?I{Ai~5(KMW7pw1xCljiMk(ePP;iA5dz+=e-K$#Gg^Oax-I;aTOn>xKyP7pr+sF6+P2ngBfU3NRjE$6n43D4@rCt_$=tZv_;^59fwd55*l zKlkU-v3{&peob?J&Fn{A(Pp)#;`!{F$>J~4YI0MsqJL)ga2LUHFoD|EX6nmx2r5rR z5r4Yzm-j+;ZI7||Z58IJ9*eWaXVnBkT{Y0q(9}>PV9!&0^B}6-s;FjHFWb#)`|)_2 z{}4=x@cb}2i?=lpVJHOe7jIQPDXz_5>P49=58_CBX1lE9_8v8mc0m65BRZbE5{kE*lkka3vbH)NM}hX!ANy252w zTg?=a&hywlC&= zZGYce`P8M@?t5lmF$le;wSCt`f|A)O3Y7^(N{?Ebn*j+Jp;qBApSv^nh-;iYTuo9N zxLtPf31R~hp4-_nPq~9r6;U03--z;uYWUq71(uW)Ijb{HA-yuGfvfx=nEhQ`DB3rR^8?cb~%wJjvIswVx& z3zO{!j+A1a_^0mGivtZD@4cn#95rsx0nM48>ZrmMrP(E!wN%(j3focamu-m#MO*>& zh}uR?{RN)oAYNVsiAz3J)o;!LKwWDJUz;*agOq!DgVBao6L#}J`kLA}{CZBQN-WrB zJxT>3choJV`Qg}TQOrW!P7npV{6%-Dr+E<-#cVACaGMN?c_o()iUt{f6|S}<@6{_5 z8IQf5+dISCPp2l^uhsfHvtPelL?{f-?DdFaocxF`l4i+=b%hUCm$|nFR*c84x1zPY zKPL*bu}$6-F;t0weu_qHPhBtNK$ zDQ^5r%9~XHg|2b(n<->}?j5!7V@bp29OZfU!?CkVNub&KA_;-ltJscXs?L6mI&+a9 zDP3=S)sxzM?cw-ark{eB9H$?v^;b8re(|?JDUJ&|f#K)zS;`1T{lQf`26CzvMpag{ zuvW`$DH=QgEQBDyTA9>+b`R7C0a~5g2}3WE!vM_73%Bm!K?Y8Lu|pqpjmbjKF9+uB zn-}%@&?EJks;5ldl(RIODyjDdyj(3UCnsm@oYp{)0==0R0w2dI_b$}g55B-fz`A^a z6p7#o`^ks>YP;08vV7-}9l)F0?B&O5{pkkg??hp#0hwyQ!K1 zB5-i9S8Rf)iLv^Bqk^e=p+jm!Rd|_GO3HKAX}B?h6C+I_(2Hn#|CvcSbg~2Q@(kKF ze-u15jAKQwaVe=J8N=B=N#ay1i>z_zxFyM@HCw$m;SltBk+%aVUs5n{fFhL|k%Hgb zkG!vl#&g{^n}#u=6G|z;lJI7!lH)5TE1o}A>o0%n_^K0^C5#3if96=8s)+f>I&!hY zdAGUpoKGOXdH^1X)45Pnr1SR`)@Z zSqK*CKUV8Cvwy{Jf9H6uXb8WA5u>Xji6?MH32!Q?rw}^2%5!F8 zdgEA&lQ&WJU7ymsif>iRFtBP{B&n{dn3u<1YH%)kQ7$-tJcXM?P8FcoW#>@!{{g&6 ziE>W%t_5_v>y?_E?^e|b;D@fM5e-|}X30~(b!6Q$jvA2{L zlJcTsa3BJ;e^=`@vwyYEYQ>x!b@@jV$IB?#l#87sr;vDC@s+NJtyNZ12KuSGy zGCfD(5O+;wHtl=K$p@EHs`ROCP`ZbzD#86EJ@6*3wydGT#rM%GM5T+sk3AfyU`447 zF2^Tx_70qrZC@gn_KgN5e`Cd5vCNLkk)io!I&YbO0 z*pVxl8vsfal(7qDh}ZdX1ROfyoJE2Y6`-^NPE*&pLTO`;4+n_T_3%h!$V1=f0)k*3zd&ZL@`u}vAe`EagAii{()o?71 zSbFQMXHSsRzP39dD6z-^@uo8L{OOAtmo4AWm6T8E)&XY*X>xUUjBVVFJWy3 zsqRrhVpk?%pWbcg8mrN-s>$#B#1M6l({=th&+NQDf0pAoEbGJeaV;&dB{dXrtVRw( zQSwFkv{R}#Z>7l3H7-MNLbTFtTul@WrrM(fiq)&eX=hZaACynUZ+EZ%SgjX-tA4GP z&SF$7i*pXLJRDE73(1#Ij|S0y+D+tjds--zKT3G1?%jY$)^g+-Ue(i zS-e!|!>g2dZKS5~fk5Q|mE(A~GW^?*f+9!Jezu>IJ6BOVp$>0HDtr6Vpz^s>^RAY! zakA+1SKNB(Z+)#+DaW;cD4a++yD1A=qRN`K|1=KCvno_|tCBgD&vpFATT|ZG1Tk}7 z9BEW6hVx0?>aDx_9h|`CJ67F86Vd6Mq7%RRD%l^Vwo;PdjpY@dqC84mVL;RC(K8yv8wC`r|I=mdT8!<%v>heGA@(d2g|mgETfG!yyXQ|RMPlB#UF zKhJvht&U#Z)q(GSGoLy^IlbXDfDIXz{B{Zo@D&eR)SV*+#QF>HuV$blg*ahr2sd3h^2y&+?p`{gmT- zwUPpi#C-y#q9GEmg4!p}Oe-XuGBLF)U?9(h&x_8<-)`H>*PA7{8AHjVijFFkNj==R zl(c4@lACT-w*%#{SHmlDm>oZ2HLJ%7zQ{|~ZW_rcs z7DO2BrY1ifmo#+~TubOO0MyO`b+ zh7t2eQK~g#bC$UjZMQ_bxuy@*%^z)&LB#HB_pweqfI$9>9n5R0ax|NBR@t#Juzyl< zAy(;soc7Rf_BFs?19d>ZnFLr)b?gO`O65OR>xJdNG?J`^hul5N1+6IfQ3`dg3y|-q z^GU(Fy2j|8z%zMjlYFldr!Tb&H9C*pfT)8TyloaGD^W#}DRIUj=%wa|k|Y`f-b%Jl zxhmwVk77F8wh>fFvtiu)jafXksz0j-3s99&O2{~@4&*_ zep2ByMuC(H06HL(`x+G(b&JMMmtyhPS)33GZfx7Y^6s2%sM1E3BE70pF3Eg*=(Re3 z)k~01s#O-?+`BI?tUtZg?x?st@LQ*G>_R)9+LRV-(rROCTQMX}qzu@TW*OQg1eae89@NW}9h_8lFjKq93dE7t0@Cb)xNm&@ea# zq&hw8awl26ujXv_*(%tJ|?J2AJ zx<%1NC#{!LVBRWHhdKco&2HnPNy(Z50$7k+?+vn)%9nlVea2o1mlr#K95()9@&ZJW zPIefZ+^bZcOlz8LckYe0s76+-OoFjeu;O&p-NQm1uVXD0_G-OV;pT zu1#09LgHcCL)Xd3J$5wgL@IV*lxmey+09B$Isvq>wGY1o!I(fSk621U`-LFRzs~XP zOW|NqXy~v)=>!%Joz>Ug>C8H>u<4e(H^*x(%{#FL@zfDR-!I?REUMLEZZmec9+BRnju4rW0!lB}H3vSi9m zjoUNeLDpt(tws$@8D{@>Qa}>-+SF0?P-F4m zTZ}Ki>iRY3la+UWAa5LC_eW!CE2~Yh?Fs;?pl=Id8#PMYzbH(`RtKE+l}+wuatZ48 zp@O2C%5(ExM#WndlJw&oklrygatAplG;mik|*&&0U5B4&DMXEv&s zJlys9v0ClbgZSz+M@_D%|Xe zOhpbLqbMZh^&EeQdMXpy=t|G}bZopWwLRwi`Fd_$U?~TJlSGH|+1kEIFH!{ztS&k0 zG8{Ocd0cx&pFOGbV)UKS8s)=$(Qo#BQ@Nqn+V%C{OHT4zuds% zYpz;4!l{mzGoWcbZSfFu8%rxQoF!pBHmU4$JkkmPc%Xk!!`!9tOfPz?KbI0eodY-` zn=Lq#aLA)xDnbiI;7wP;4`-cA2b=ZAa0OSruOrC$81nDKFXVUbh_D2He`+5#)^TQv`YZ zK&R<1mZyJk|M2CraTmSj^#yrrCzJjGL$OHH#s=GAnGV`llN6+n&=t1pR*x9u~%CnxlX$3a2J*yIL@Q2BN4L z$>NSkVe#M9O0WCG{O!2{fCRl~CG^$b?Bt!SlmP2bnj04|rK|VY1j3hWcE#7uc6gJj z(A3bEeaP6F3iXhTIMVDqA%GGjV>ai=hf-|5R=fQ?of5eenI9jrb{|yQLt2bn)_C2! z<9>f7RcIYin?cAifim$qrZ#85udeUlNz4T>=w|@Fp#&f(I0^!qQnCBk;%y*n)tPSa znFAe{-8zm7I1g;P`j6F0|GIlm-EO14J7O#f2sQNYVez4+slBw*I~L*rTbwYeR2hYt zoce0JJnG#yI!_-J;v=W0zO{Y9VX6s{{=k2=x|p>h^~&?T0}ks_&i6^IdO>8qSKk*F z&z4aLgY0_Sn7`DjAZSv(C>{vhyk$}(2}c}@^RZ-jbflE#-LoXzTtKF}X)j`Hbdp~M z39q-r(8b|AdznQwl=)+|-m@5=s=C=tZz(mc!H8Z@-gCl_yn|D5eB!KhLzV2K6Wo95 z6lj1cQ-MXOnq^-?3#FWhSXFwdNKLYO9B1F-1L;34GDg-?y(sx3hHp zBA%eWXLh(pJ0!pY(0x(zNSaY~K}jNq7=;Ui*W9%&)IF%}A3eOnx+FI){+2t4U{Dmz zt%t&MX^)Gt?|A{RJNps=mJI@Uqrgp6aqG>1Aoxw*X(*@fL4DqRa z_L1ic+5l-LEOpbas6R#~@3V#)6>`|Ft+lNoc>_l4`KMu-+{Iv}Pi+kt*>iu{oAOdi zv3*px4^O1zw`@!5W1Y@St)&v+@nf~#+HPOnK&@mFF_V|Z)*f97epm9M+sC2`He9oj zHFEUIT{|ZNjzor{$b%h|rX=gdPST50apF;ex86xjs6MniVsWayu3J+UMR!x>n|>;v zK@8_CdB-OI#Bo9y2f=D#*cg9QVWLu4^P<3+=S^%kgxNPSAfe)*~f+rK;u*ce*w;wr3>4}P^EutsOxk(Q9 z?go<;d$Q(^+vc94bi04-wJ0y~aR_q|*4fnOwLPVSb@ygt@6WGO$@?Fx_3GGsIhkJGT&n38mQYwj8E3Ue z-xC46I<`@u9!{DLaWpMzGG~|leA+TROfjj(ZV%(sf^kUj24-kDHoO_J%j=z*G~7e! zgQ;f!xgxRYe{&LRaK_L{pSw!3lQ@2Fy&i4j!{M&g@{hVt$Vps3ENxA9j%W`_1)5Ab zebbi>erLv%IE8TS9_=zUP$PkC@kr>X^#f3w)CDQaQnw15Ja+N$xI`OA}| zxqY~urUY6SvfRg0SOP7$O0B@bmbii#S=p{sbZgd-N>W=}O8Z6vg=1{O zo3Memf}h;7OO}-q5T4g_Xf>-gqN=lD-8DG+&m8vQy^%~!o#^$jnc3fw4Bj*>R`wq7w|UZz zz$bkqGOGagAZQT7>_S|dk|SVfS?f5LepxWvZy{IOcE%I8ZD;*ok;4&Uen zSg%R~vLfVutJh-iyu2b&7%+*Q72)AeO@4LX$yIO7J-kZRT6O8(le~?lLLfg-DJg5K zZBqjrfY-8@!-vg?>od7Br7p>UTbu5OFwKuP244L9qJ^Qa%dRfAN=!dZdr0-TInTr-4+2Acc*XarUeMrM+@k9?+%iJ0mP1*_%4nlWjWLWijVBkW_6~iINHFMuBU5mU%2e_jQW8%NAL-S@`@&D1#{az{%8$88;K_1hT>z6?h- z$Vv{Xs5sj}_#z4?quekQW

a;Dzjx9Ieml|3EzAJx)qbCT-s zmgmt-T|>d1Vhac)rUbg1$eAUza?hrZgMKu=f?7X{QkRxtL{Awb+gqH(9$9GCnb6r} zK{`Z31oxJv_ZCkB_E2h0f2WqBl#)ty?qs5%Zg*GG<)tO#{sh`6^2j^1V_C<2CTa_{ zlH>Iw%D+{uzc@B5k=W`YHYgDfPL}gVcyRuTH+$8GwEZM`j8foKTJ?5VlQckq%0vwu zfBQ5~xo=L1JdE504{BlAD9aY|3Dn3g2|C-V+-$F@e|$0ctW(#Qf97gQvZ0m(aGh=; z{WP6&RC9fGPpRZ;&D|)avobKdW6ZnYJxw*u)lgKvjlz}l;h5^7fxvS)IMQ7YU=ac1 zRPopOn;)z7Qj|(xsy{=+iE!wA{A3^^MVURNE?1d%nAu`OQC5ALPs{(NgmP1`WJW!$ zqcXXKS)ORAk4UYNQYT43%l^+0&qKWL8&TRn&(xuou=NCFQ!rWxZQ3 zUsK!a$Ih*wtAee9TIEDlO9ts>0$s=xC{Gqj&5$@iVULW1JZe>Qen~~@2 zeI9!|RxWW%S9V5LwZ#c_+Kzx4rs&(o&3jjx2`Hj#;@6csFp6ZR)SG$UMvv~OrxcTz zDqDTF;H0`$L|aG0^twz?uc7dvf8xiF9xYRe0WEbd1%R7=eE~2URB+)FM6jcaEcwgR z`sreDb>0Z#1RVv}vZKTK*`n|T#v|P+5+Ri*TDQxoNf5=E&V$4S#LpH4);2@p5dgW= z&YW-;W5R~rO5-Qa=gkFLrm@pD^sw}NZNpC>+S^5>ItIco5h!`$3>=samrUtf=A8abalm@ z3YgW|HG*^$`rA$X)jN$J3I~d+k(}0}$_~k+>)I9$mA)+CRqg)g%a6| zrCN>bx-(q*6IGX~#@2Z92s0J^xD>wg%>>BPPh9(2Tv=GS%bSUiaV-sFe~vhsSN_d z;EHS6Sys~5G)gp9fBo{bekLiyM>Ws^X7JTd0WIoAvh7Mc(R&Yn>Ol};!?`Ip(HvvQ z*5@NA$Ai=ce|bGy*5V`$@tT8*_jg@?4!ni1WCm1^_;GtebuoxRQHtY*PJ!~LW`Tso zR<_P*)#LV5HAhuRO;p0^M0_PS>L1VPCm>ddqT=ktlnWljf4g2PDW4*(M^i%J9kisn zDoX@#zyO-^2*Ho7#2QEV*J-!?w0^o6=SPPuUys%Es8Qmr32%n_t1nvpA^O-|yEOvO zb^Z+eGF|xGwsw}J)Z|n#LP-=uN6^&5&!r$k)(6Fkl%JXONUj2nIS_VBgZ06A*B}%y zcFmaQ({vZ)f65j2)dBoANuu5SbR7=JYL0a5k?R_ZVMLiwBda%by7J?~H%|#%WVsaz z)=qa=W`wJD4~R+-9K6!NClKN<6`P+)N+&1Yaf>TpQF~8W{PD|n!?0E>AYC<#dz&3E zlhr?!Fwk458HYf?A@Bf+gn?bMDBie3jtJrecTO%V0u5}Rr zZJe&QMV0V_&aYgdYtQF8OTizp-25$Wy_`(nPb+NSX^rZ*F742|zV1z4U@19QK|s|| z`c^AFe-ziXkmU+XmB1uLJ#1~d0iyuT`Xeh)?A4_9C_8woHkOoA)*#76k?eUrtnS3O zZXnrRDySrE1Q>HK4_6A{<%TF%LnXApjz`+WQ{a}8n>v~Esc<6KJ?w`kp5^+px38iG zzu1+!DaK)>LM$J8NpDo83}8ll><2{VaL*db+6!;u@bXy%SKn+p7cV>s zf6gp5Ao8)x7n)B&qII%TUYF2SOrA~g^acVS_ZOb{nxxF{oVcc@D16jOrr?bxZxqZP zns&MwX_G$ko(?6^Q@K=)HvGWLLcWP{&!H{S*%eB1R^1H?Zd&R9z(1YW?(`}7UdK*V zkhW8gtx}hvUr+0@dJRB}q|-W$de3Cb%FBukM>~xCn|p8m*nGWuV`8F+u1sP(CPW{wCwUk5U0MF zoa1sueazZ8x|e{RjN>LQx~7{)8g6F#Oh4I3XPd%2p$-C<)a4qNtbMIVWaZMTC&y-GB+ zoFuJ7DZvR*Q&vz|;Z^dv$aYbsYgmu|#85?mMt2uY*U3{U5F#WY^8TxKf12OEuOA5F z20KU9a;HOkb4zDDg6-)PX(}9im1G77>{60Y@5@s}yo*GSJ_whhD}-{QH0O(e0CEJ= z03Gs*WTyu{X3Lug4qS@ca7?pq-g5r%=5$&sJu6>BM*xoHR6*20SR9$KYgD&EFF`_m z{@bF4HmpT^+Ie!PY+^rZe`UixAao!pJ!+2RVA2B6o)$UmU~!d>0uLhBcDwa+etBBI zzONsuKY2*Shw)FFXwqLhJO)WYDHq_NGpC$HKYQ}EdIgdPoza{?S1`tg;c_18P~;Ip zpkEyzG^?ygq_a=Wd(}b|3bJZ0PSOXyV0-m^PL%?cd~wf?JLv*Ef5-GZn^Hpr$j4!D zjV@JIbw&jERQC!eL10g8XqA26YNzqrG*!`s;jj>-IRp9V zU!K+vt1jik=^s4IGbC(K1L4X-%s`r1f;}u?c|(_3QyuJ*k|O z;s1PjTE9BY?NgZrETlr9s#!9Bbrvpel3D(+MhrV}ObKR7e^{T~huADK1vTg|2h+)# zHz(%eOM)*unQKg?gow0J>d)uo?D1fS9R+|9M`UTnV~l>!Z>bopXyT)(@zjNo zLk09lGn}GvDo0BmMy_hvC!_A!RB`7yru&+j;<=V+QIxMj=DU@MJ-JZ?dLo(oZrTZK z2iswJm(Ts>e`)=)>hg|T3W2F?8FlAL_61|Uw}OyLEbbnQiP>h53N7Y8 zB2WO9osP9E!+X%o*1n#8n*1A=`3FZI_^v&LGXvqcNf=eB;aA0`?C?1OFZYam8yh7` zUFO}W9*;+|1Ec|j8n87bMQqye9HZ9SE}%ypF%`pje{NgTrw%!L!(N#ZIkn?=oI`EW zj^b=y)WQR*^zA18bjb4Yp{1Lg{Mf!dHfXp{gM@vPp;dDO{MOXR;HX_-fk3o6|U%!Ft@Mq4WtI6CYzs?HyU^D;P0w+ z)p=lx(?B8^s!zxHe0f?w`-x}#P|v8nI!kuAu{RP_8GbV#*Z9iJ zDzD_a2fQt9Yo?S5QgL^ImA%$G(Yk%Oc{>nmg;%K@2X-24po#wy7qVSHgnM0 zvK?F&$SA4O`D)^MPikoDzo|U9UcXw1w5bT-sh|#o7i1o{OBg>NAWy_m>C3%T7mj{& z;;rjTQWR&ntx$Ohq+2Uwm&>cr;gej(ndW{T+O&g#$t*S(!y>{Bw>r-f9ip3%e+gg^ z*;;Y+t6OnWG6P7-WpIg1H4c7$ND#%l^!p3mieL5io}kCzjfX1;VRjZgs;*|T zs_*Wrd%X_TU&;siHhMaNCIq2Se~I1ZGPrD2U)egeBT5cZ9Rw1s$Oza?lT7zNwxf0H zeTw(Apg3J%4Z1OwrraF)73#r{D8rgO$>j@{e`$?;=*uhQV*5`CBIQ1kI=GhIhRyF= z?Inc>vTHw8L-!H23v~xLJKC7U{w0}08|>wDGD9WLF3sWd5JE@}3KDu>fAga+pX;JJ zi)8M}XT>J0d5H6}%IG%8QhB-@7V54*L@j&s8e7Em2jW4<1qCXs|o>9ZzTM|aPQ z!qs)>j_y{=c0w3u66_wPQo_o0Bzcd15a z(CI=yt?A@%(LD~jHbG{8f0k|A085*igRA&!SLhG2>{N|}ht{mI`nI(b0rQhOw?;Kd z(T!-%<%{`1FHe^XoU4Lf=Ila->QVp}$eH!h9ITZ=YWU7sG*|T*TQ&mVftMQ7%YKS@ zF?8X}eM#BU-sXj+ao%#%Fw^zFO7?PcjlehluFL0Fhpc^c$bfn|e+KeMQ?>m#&-*k# zhNoMmnYDh5E8 zR5#6gXrzJtuJUL`e^M>1`0tnNX}N7d<hAn;pfAud2yhtd%Ul?3kSzLrA5&|$SL zHAxN5kaD$EuWGOQmJ>!xQqG$Rwx5^qk?>=M%MA+kySjd6e~#Cb%qxPq%%nl$3C41A z?dmQdC@G0>wJ)cZ z4ESnbpTO)xIZp^~P;lq!%4x*%#`4x5v>C}+H84ps^XjrQTXE_+okHZH>X7&`ZY0zau+t8V-m9TeTWnR}MLkafR2t=~PLkDDk{ zP;XkPe~c#pnA<@P)a~1;0!SH5bRCL}70!2=$DUd@i!^1^wLR29*r@;^tsQFDjH=uH zx@N$kq9OvSLRx&)cC^{&t$l0tzs{D9>JBhFFJT>_>t0@D3Ef=bf#DRx@RLvz^)t=gee}RG2%>!kCfl^ijuD}xpVe-q<`ki(Q zZ@k5yR4#?Q0C;wFh65A!y7B@XYI-N2uYv67jzHwyMb&Ico0p)Ai_q1-PyDH<>N*iv z6W?V^RKxdTSMjJvQnB{W?2=Vub%Vj?FaJcRcLzuaF7r4}qUObOIjVSNN7Ecd0WGW1 ze;?eVCFg0RbwAms&tWUXDMz0jsR^TPcebJ0;yB$c(~S@!wMUuAB6iZkscgP0g~!*M z_^UPYfwzdF3g_!%r2uGca@QN_6_I=1a{?kpYj zikeVo0FIaKi5X!UW%05(@JP}i=8*c={l^- z-Z1v4F|b=Ns=vV;2^&^eyOTQtg`%s+pPAXFE)Pe|Eq~H7muMG1l#6qb>ULUFuZZ(Y z#pYLQq$8g@(_2cH4?x}!0h*?W{H$;-ve_OR} z`6QZ=1HGMNx_G#gklt_ibS%TWAqe}ehk8Pg^ZU&cmrlIu#Od|C&26Afaz-b~`Io_T zvHiV|=_D{8IFE-+LdI26st~yQ<&rLk$QjS2Y{z3e#?9=k5J4oV!tlWya5qSB8O{~} zoA2}mo&I#l{=>#ybi%Q1MLE@@f8y3`D9wpuE+XHzTM7vz=j5DwQIbb|$YBfC3-o++ zpccNR<5033$J?FC``WmiF6jiv%?KH~Mdo1bq`@sKCn&t@@_Hewr8tyR)x6>y`RIBL zFCs+Ls->#bN&4NDnXsxlwtODAqvJ)z%B_CGRq3g4LSQYI6uEu@{yRjXe_yRQrE9xi^lC)fs)_5ud1hlWj8`-a6+HUQaphK z;c6c#R#O_7F_*}=NX+1$f68)DmMdO#5L76%IzaHaGtEP{j0)l?)~?U15n$)kCJJsj zoCH^ixSh|J&VK&wkp0KHypp%dmbx_NJ|rB=`V;8J*(9~8YS)TQi?9G`we7Fv&T_6e zteAClRfER85FiGiA53F^?Z~8#OT!x>*|4?GIo%eYK}}ZWM8;bqf9Y`2$;JcZmrNIJ ziQ8t@r^7K!=qYiMBQ~5_22p3O9N(44%-iFVDXHto2~Q)rNyFjfdw1=uyHn_vd2F%R zYa--7s>BF8+QXCn^0a>aeA@da?#hKrw--^mYyrqZq|uV#;<^t@YkW=h>uc7@t!|B? zu5C>up2I2Jt$9d#e@+?1Ke9z6d_rIs>S)jA$m4JhudDQ;E)Z~1H`42cAfUO0S8=Me z>QKF@gs(x60tE7J{byUjvlA6ojX%tvkl}{RfU~9&;UryK+nQsjX<~y)=}r? z5((#_=~e}x0g@>);Go^O4|lpr#7S=}jd%DT#Fkv7a;7PYRj+_s#oo)4 z!}+p%vd;A!8W_NBtiCBEk}gPkzFog88uPlFQy#Sgf5A3~PcZCPuEyfgxS@jVyz73u zvcv7QC<3Qdb3@kmPATiypHJk4xn>uoORWscPfod3PiK zf~ibUjH7UBJ9_naD4b-nyY1+@y zsY-f~kJZHEIRi%e4yqc1k;h5eajBoQX06|z*6%jwN0he*Y^U@98fb~DSzdQp%z>nR z>2FPqbP-WA(bgz=^4wG3q%C5Q6O7Bn5*-A1e~EgFZ`+3KH2OtwUCk~2F3zpFKNk#V zK7jg>-kU30){r68<^p8hd+m(uqt(k)nO<{R;l-sQ>?w|1CMH8mJLd3`VAYab*EC*%uK0gVaRpl77+MYij%;Zp6PIHgh-w>A(* zlN@Vyd%V!;qhl*)P}M(vBJp1h%rk8t#M`;L8MZl&BdfqU4gKteaJQ6Y)_##k18vq~ zrOn6rSYC&!&n9r zsq~+Xcl&}XyeEMz>F@iV7FDHqHGQlsqD#lz)^IzylvgbTcrE0(mqn#!nwNjUQQTB*g$c_80S z=e;jwixruLnA-eOCg~NoT-!<8e;v#vdY(Vgh|d9eAWAR$Nu(M*v^u9<>Y$>-%5LZp z>OmH=p3Xysj_!5>>|m0}?_2ffwSY&hk$UV7xOC5N((Q`dvRwc8^0eyTYW!-Z@>QI3 z)lskHEs|*__D=|mEs#D$6jwg7B%#`a2{TNebz$q$=0q8_cS!7Zf1 zQ`u$irdv~Fy+D5E5Z_y?PTNqO+EsH`#gZRDw74AmcPnYZ-8D*buJ6m!YQGan9|+=f zKqdhxkG-=Wpgzv%g5qsfe`sB5tI0*RvQ@9vuven(YfdEfN;uu~9WG23b<$5q%Z3qO z3%EyK&SmB?YTDA(Z&K6d;1EC#UN><%WxMt$noSI7m%B`Ll}k{f=FZ_5 ziZfm9xOr-aL28nuvf4I${p-mpM1rW@1NMe+njR%k=b=AI$y&2pe_GWQ?C&nd`P-{@ zc;?Nj9f}&tNWtl@z720OUxaW`UFAJi)WGU|#-57mCKGaU5*|c&Aq1Iw=(Zo>Rd+&e zr`~{SHqEXC0SU|!$)ySnk%FkH5cu?Y-S?|v!)b-}xRFl`Bugx)190Qekt{lM31riX z(%~YW{&l*((0JTKe?fY{&2T!YcMn_87hSExt4IQLb5aniYGQeV_+990fD}RaJd&_l9ZV^1ufj_Bg{xErdY<J2)T%Mt!VY z8z0*CrzHZA>azGnbu+gO+@+odbP(W^wL#O$8`59_h*Y6zf}`0114y#P*oya}M%60{w`iGf@m zB_HaR47@cXf7vAvyMpBjhk^-OM$TqwNH`8DTHz198U=vfb+sbPM5{r3b+r)5@2a-w zBa)8kp3r?N`#43p&t=OQqM;r!&{Ew%ZjEyE$K|w8wzEX;+Ai|#?S&2;ZhO~HssCVP z(4D&JOU+Rd8#iE1Q`h&jgMXj3k}uk^YvpG3f4%eoCxP86mg(qE(XGG-9w%=bn6(#( z_z7+gkN#6Euf}5P~a6;jAS$_UYyBYBSY7DJJPGe zfw^t_*+IDYUmWJkr+#wnan)Kn3BmHy>>iOu&qoYA%ysKXe!3YO%6iYs1GSwiP+*>a ze?K3{b#|wTXKR~;*rOwDP}oYPMfEci32`+m;wPEd6`E*S{LvmqRpz0q(Bceb@XK;j zh74P`xMDoC7%3{QYEqcK-NfHs^@kGP1f_`bY+!JfAC-9y2*eFo2m9I=2bROU$D>;| z!N>8EPO1U5Sn%L&YC<+|r4A0g$${wSe@$e8NpZCHvNs>uZKC4a96-yg4e40gMxK?Bro3!*;F9E?)C^=~Cre zif(wFv2)hkspnXR(Fif1u95hU9pZbBNq^*T==8T&-99QdI-}%iFIrnWElh^1C5|jM zXd<~y-Jf00}ABu>K_2_P?t%5qRj4wdq5 z=id8Fq*}!Z-a5^&Dm~kh5NZYO7=MX}X$vZjWWlP~m~;4`Y`>K`)ssknT!ZSij*KAF z*__TFsyxCQCkU8V42FP$h0Cc3S5;l(TM)cw-z4=~(*5OW{q(AV{U5@CPin-^vQ!mu z)JQQMf&_`8IPjN9lR;M)4VA$|&nO%^K+d5jpX**p8H2;s)@ec_g16$V0)Iq0YC6JK zek=?^-5jFXi(DGTt1tY#z&v1p(`tW60@mzMDk`S%-bE^U)P!~XDri4Xl;#Ba8I#r` zgd%<>KqYKNU@}kZ$ITBoc0C1p!kd0%NzZi1_HwJ2;HFd_uM=o8zR>E}{~ofjD+Z4_ zm0%d=XFVouPKE6gmsJ7s?SEu-PY;`hqyU|^P9iS|53+O(g#vA{pGCKbbZ_b0{%EBX zF896M#vyA4jgg9ES2txY$ao1tsIp+0Le%tUZ`SDm&Y`xuZsmh~^@?h1s;6o%@=1!9 zX&uj@zvX|EE1?tYF&z9)CxE(cyJzm?oxl^oX7xP+KOdy6I?@e>u77}(zn|7mvznLj z0Z)hfDsDPxO2@6M_inE~R!R6m7SOap=1unY*iQl;S6+%1qs|qQ;JAi>8bV7WSZouu zz$Mn!)~R82qBLDq*ZC@5ZT>pfDHX}x3(PlNuTPVKHI50!gC210?3ENgR|nvKbH4rtU4-1+cPb)j6MT@{SEyL=I7@vC?WERxr!qPbLD zyfJ42V&v@CTW48;4K!;G2aEy`VA{hwE5{8wYvr5c3w}`R1Go^hD>(I&04!?11x9>` zpx5ruz(V<;N*Mw0<`KS>nty+r)%~NP=w`VFN_^?ff0i;cgUH{Ud?Kas5^Wsvo4~^k zpk2rOGshWyd5^xLnb&tXJFec&K7?Fjl{W%e%poBT$WV?vMk|kX>0$Q<0Ld--cD8;Et3L|!(G9!ml9N){gwX>oN({a=54{}RQ46xD zK>Rqga=L~DzVG_~73oWNPtcvqqQ$WJ#(h`a{PGQEu6%2JCLOE_1UgG_M6JlxLjiV% z(m6Mpw!1zDK`csp=YEZ<{QX`(f_&jz@mp*R+yD2 z<}}K?)Epqx`bjLco-N7i?|(5lVhjzu%R|N@H{8k$%SN(5B<#Ce96lgf>W(Mu2RJI{v-NG}E|aM; zTOk6;r~iub$1a{M5JCfq9eRw`Q^hjdly1X=@(L8K!OYwgkW4Pp@pGt-<0j4MwiY-# z@RCQp(eXqFbzUpBn;M)v6^Ii49((A~&aOdSI7NvVSd|Vz6P`8J0me8Uzw%tZVO}9{j>w*JiPaq5=)aBBvV6kXfB09^(0Wh-87`Nz_r0|{2-t9nlWii<;* z9?)BCkgQ6a{3&4cwP9*-a#&ZJI`p0Tb`$&W2>1u{ z$%lOg0)JT!JS4d?KqNX;3mep~J8BMm*nd}*{{Xa~L*pKPW|G77wxA{pg2LAzQ(R}& z0)`mE5z?{k23IF87nmIU#qEXK9gg;gr@k!#l?{Vaj;2`{YSE&qenlU-Y#Q)qno= zY4w)~c>F-8(CTT2Np~{c63HRNRF_Y8Bsz^jup+RgQ@1L+X$&27`+bPwOW8O65NMvT zX@i)28I?HLx(?5^rW%7;*G%O>+-t8kKY~TN^)}}eo`XeNa~KhRyt00yJeCORKL)VZ zN)2f4cH@Qg|0tYoWw|K_8P&sbO@GB2*Hrb=e8nkK(-Ois2OsHH6X@L5s)SHNq#{^r zsj!*9Jgr~hz>h_r9_(kjCK+Hee>Qe55CO4>=T8vHu;@#RJIHpL7TXWi%j4R)i!M2XCL^GVC9m&OMeNJ^U#@RT)MVdDCRIL;7V{-8s%*&e5f(0zeUrx)nXe* z%Sn>!KBxD5+2!Z?MW=`x=SA7yl5|%+Ipr}zxH;8Tom4@eHVf{DuHsdM;5>JC#)WgK z#4gumxp~DaXn#lf{yR3}TJk$?B`Amu7c1Q0OdyQQYBgRFz^hCTKS7`8+4B}*8C5I$ zzFmN#B*W^2dt)&DM={|?Tmu%>F(x?hyzJ9DXIhn3iBb2TATD*e^F6>thyx090Q8i& zZ8nydVb%r{e@zmmDhAXY037r&1GJWwWN+2Iu0V!1X$8)GbYWNRkL|H|YWJ=;Yu=IZ z%hURUPW7|?Fcmh2!;JOPOb()v{6vFbVPh^3D+60X(NaXtxaZQjd`qi??mPx3 z;~a)qeHY6?B1(b(Pn3nGTV$DbwvT){XPipEEzG>oe<^wCg5HF@i(|g5t~q7n+h$1T zP;lq5E9RU*b>lDJVOoxUtS##9=Uf|bL489Ih;#Ko;N@~lnLA~S!Pz3fT(HQgNJ-}k zYE<6uZ)fXwE$X8h*x+Cqp7C@B-}R}wOiUG}?zQw0s8(j&$%S&vsWP%s7?J#?pqvUr zPL?*8f9y+94-U!(9fKC~BOgaJ-4y|6o+{zH#UNf8;sE~f6}OxlPykxBv!&x%4)@Tr znxFCTh4pK%WMb&mUHr9%+cNytzMI-sE%=m3ST`Wo6|Nz*yL9?au*?XO zoOUUjay!F?*e_4(S2*y)oD;@G7~vjUe&Eroe=!>df$3I=^Z1wUpxnE$N0%O{k4qn`a$U%U>)reaJ@Vyg{i4$kNhxRla#s=Vfkcs2fggl%AT*(09O}eC$XnHSkJUSV zsvm_$WshbBMoZ5Ygf2Y}Awgn-#l^EeT3G$4Lr?)j5|w z*#;JWXpZudFkJLM)Zsl33l6rb45%S#RbD!$j3ab@w8%<%CcmgS^OT>*Ju70?&Bb?T z`QbIH9-_x|*Ie^gehSc@%xYZx(N;|u} z0Ql!t@J|2rY{mE*0f#(&j3i~a?SKegz+G5>j*B#>5+66A017+9Ja{bAlG(*$=o)Qh ztuKh1y{CSvMwtLYd`JJwR6F9))CCZfUQZybQuywhK7Rzx<$OgGx4^tiOZ_9v=7uXNshwEv7 zT18}27Y5ja?ydX=kVX3Pw9;=E<74G+Yf_CzixrnfvkNH-9+DNM+R?o*K(!)$r>fOp zX8_=1CCovE$NJ`i-0g!;NK=((&y?`Zo8?0HXno+KLtSvAcrwhA9bC;v^+~7>IeV*#W}QhM;d<9g+qR|( z#gLSTe5q=Q9;)OTV%*`doPCGMNBnjZe+MBxyBJQ`Ce=U!n0){~bT8&d5Fj0b%6zWs zKsGNgZ{e)-bjd7FZ`Q5G-9e^*=_-1t?G&`IUl$Miy{`ieRC$hqs5Yn|-jjA|U1c)JGqy>c)}`IE?f!9kpEIH3t7pOd4%1qLAF zXFGR+*^OLsASXu)aG=9~6;S#j_%hURUPFw$6UFlnLZJuDZ`&0;p z5T*W*GPMqAU8MQjdFEmxdd#B1Y)K0J9*|>=B6uPi?(xQ#+fJk?$>y!HjkX<+vnDwi z4=)GlbaOpb-v$Ri#IEx1m96%m1-;#KL!X=^H>A>XT2^f*j z10Ydm1B$2;gYD!*j5_(iGb(q_GaW7x8~~T*$XVYFKjP_17WBV7tsit+KLk%tw-7aY zgroIcT!4Zl#i~eK*AYZ}deReDqPsU%!k%T>K@Z7Wok2&pltEchkJhdZa?=@pIBBC? zXD2=oggA*coDi&kcx#U6?>Ucmr8#EBJ;lcb*2UrEyJXjzr;+HY(Oj<2p=srM_Hc*YWA#>p{QV$^4gT7KVT+X^&V&*-;_b*2?9MzhCyRmrMs;+>HTd`q|K15fO z8DNqccERaRFqjk9JU>F%k(^-UAo393X6Vqhlx=8TAft7;E*jb&8nC^S - ZNC:Multiple Vulnerabilities + ZNC: Multiple Vulnerabilities Multiple vulnerabilities have been found in ZNC, the worst of which could result in privilege escalation. diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-04.xml index 38cedbc06c..4c7b0637d0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-04.xml @@ -1,7 +1,7 @@ - cURL:Heap-based Buffer Overflow + cURL: Heap-based buffer overflow A heap-based buffer overflow in cURL might allow remote attackers to execute arbitrary code. diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-01.xml new file mode 100644 index 0000000000..6a4beffcf4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-01.xml @@ -0,0 +1,48 @@ + + + + Groovy: Arbitrary code execution + A vulnerability within serialization might allow remote attackers + to execute arbitrary code. + + groovy + 2020-03-07 + 2020-03-12 + 605690 + remote + + + 2.4.5 + + + +

A multi-faceted language for the Java platform

+
+ +

It was discovered that there was a vulnerability within the Java + serialization/deserialization process. +

+
+ +

An attacker, by crafting a special serialized object, could execute + arbitrary code. +

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for Groovy. We recommend that users + unmerge Groovy: +

+ + + # emerge --unmerge "dev-java/groovy" + +
+ + CVE-2016-6814 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-02.xml new file mode 100644 index 0000000000..38ac4d0553 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-02.xml @@ -0,0 +1,104 @@ + + + + Mozilla Firefox: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the + worst of which may allow execution of arbitrary code. + + firefox + 2020-03-12 + 2020-03-12 + 702638 + 705000 + 709346 + 712182 + remote + + + 68.6.0 + 68.6.0 + + + 68.6.0 + 68.6.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla + Project. +

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to view a specially crafted web + page, possibly resulting in the execution of arbitrary code with the + privileges of the process or a Denial of Service condition. Furthermore, + a remote attacker may be able to perform Man-in-the-Middle attacks, + obtain sensitive information, spoof the address bar, conduct clickjacking + attacks, bypass security restrictions and protection mechanisms, or have + other unspecified impact. +

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-68.6.0" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-68.6.0" + + +
+ + CVE-2019-11745 + CVE-2019-17005 + CVE-2019-17008 + CVE-2019-17010 + CVE-2019-17011 + CVE-2019-17012 + CVE-2019-17016 + CVE-2019-17017 + CVE-2019-17022 + CVE-2019-17024 + CVE-2019-17026 + CVE-2019-20503 + CVE-2020-6796 + CVE-2020-6797 + CVE-2020-6798 + CVE-2020-6799 + CVE-2020-6800 + CVE-2020-6805 + CVE-2020-6806 + CVE-2020-6807 + CVE-2020-6811 + CVE-2020-6812 + CVE-2020-6814 + + MFSA-2019-37 + + + MFSA-2020-03 + + + MFSA-2020-06 + + + MFSA-2020-09 + + + BlueKnight + BlueKnight +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-03.xml new file mode 100644 index 0000000000..65df80e511 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-03.xml @@ -0,0 +1,102 @@ + + + + PostgreSQL: Multiple vulnerabilities + Multiple vulnerabilities have been found in PostgreSQL, the worst + of which could result in the execution of arbitrary code. + + postgresql + 2020-03-12 + 2020-03-12 + 685846 + 688420 + 709708 + local, remote + + + 9.4.26 + 9.5.21 + 9.6.17 + 10.12 + 11.7 + 12.2 + 9.4.26 + 9.5.21 + 9.6.17 + 10.12 + 11.7 + 12.2 + + + +

PostgreSQL is an open source object-relational database management + system. +

+
+ +

Multiple vulnerabilities have been discovered in PostgreSQL. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, bypass certain client-side connection security + features, read arbitrary server memory, alter certain data or cause a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All PostgreSQL 9.4.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.4.26:9.4" + + +

All PostgreSQL 9.5.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.5.21:9.5" + + +

All PostgreSQL 9.6.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.6.17:9.6" + + +

All PostgreSQL 10.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-10.12:10" + + +

All PostgreSQL 11.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-11.7:11" + + +

All PostgreSQL 12.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-12.2:12" + +
+ + CVE-2019-10129 + CVE-2019-10130 + CVE-2019-10164 + CVE-2020-1720 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-04.xml new file mode 100644 index 0000000000..c822e21abf --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-04.xml @@ -0,0 +1,65 @@ + + + + Vim, gVim: Remote execution of arbitrary code + A vulnerability has been found in Vim and gVim concerning how + certain modeline options are treated. + + vim,gvim + 2020-03-12 + 2020-03-12 + 687394 + local, remote + + + 8.1.1486 + 8.1.1486 + + + 8.1.1486 + 8.1.1486 + + + +

Vim is an efficient, highly configurable improved version of the classic + ‘vi’ text editor. gVim is the GUI version of Vim. +

+
+ +

+ It was found that the :source! command was not restricted by + the sandbox mode. If modeline was explicitly enabled, opening a specially + crafted text file in vim could result in arbitrary command execution. +

+
+ +

A remote attacker could entice a user to open a specially crafted file + using Vim or gVim, possibly resulting in execution of arbitrary code with + the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Vim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/vim-8.1.1486" + + +

All gVim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/gvim-8.1.1486" + + +
+ + CVE-2019-12735 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-05.xml new file mode 100644 index 0000000000..ee3c3f3c44 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-05.xml @@ -0,0 +1,53 @@ + + + + e2fsprogs: Arbitrary code execution + A vulnerability in e2fsprogs might allow an attacker to execute + arbitrary code. + + e2fsprogs + 2020-03-13 + 2020-03-13 + 695522 + local, remote + + + 1.45.4 + 1.45.4 + + + +

e2fsprogs is a set of utilities for maintaining the ext2, ext3 and ext4 + file systems. +

+
+ +

It was discovered that e2fsprogs incorrectly handled certain ext4 + partitions. +

+
+ +

A remote attacker could entice a user to process a specially crafted + corrupted file system using e2fsck, possibly resulting in execution of + arbitrary code with the privileges of the process or a Denial of Service + condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All e2fsprogs users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-fs/e2fsprogs-1.45.4" + + +
+ + CVE-2019-5094 + + ackle + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-06.xml new file mode 100644 index 0000000000..8dd5cbb7ee --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-06.xml @@ -0,0 +1,65 @@ + + + + Ruby: Multiple vulnerabilities + Multiple vulnerabilities have been found in Ruby, the worst of + which could lead to the remote execution of arbitrary code. + + ruby + 2020-03-13 + 2020-03-13 + 696004 + remote + + + 2.4.9 + 2.5.7 + 2.4.9 + 2.5.7 + + + +

Ruby is an interpreted object-oriented programming language. The + elaborate standard library includes an HTTP server (“WEBRick”) and a + class for XML parsing (“REXML”). +

+
+ +

Multiple vulnerabilities have been discovered in Ruby. Please review the + CVE identifiers referenced below for details. +

+
+ +

A remote attacker could execute arbitrary code, have unauthorized access + by bypassing intended path matching or cause a Denial of Service + condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Ruby 2.4.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-2.4.9:2.4" + + +

All Ruby 2.5.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-2.5.7:2.5" + + +
+ + CVE-2019-15845 + CVE-2019-16201 + CVE-2019-16254 + CVE-2019-16255 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-07.xml new file mode 100644 index 0000000000..ef7f30132b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-07.xml @@ -0,0 +1,52 @@ + + + + RabbitMQ C client: Arbitrary code execution + A vulnerability in RabbitMQ C client might allow an attacker to + execute arbitrary code. + + rabbitmq-c + 2020-03-13 + 2020-03-13 + 701810 + remote + + + 0.10.0 + 0.10.0 + + + +

A C-language AMQP client library for use with v2.0+ of the RabbitMQ + broker. +

+
+ +

It was discovered that RabbitMQ C client incorrectly handled certain + inputs. +

+
+ +

A remote attacker, by sending a specially crafted request, could + possibly execute arbitrary code with the privileges of the process or + cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All RabbitMQ C client users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/rabbitmq-c-0.10.0" + + +
+ + CVE-2019-18609 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-08.xml new file mode 100644 index 0000000000..2860dda152 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-08.xml @@ -0,0 +1,156 @@ + + + + Chromium, Google Chrome: Multiple vulnerabilities + Multiple vulnerabilities have been found in Chromium and Google + Chrome, the worst of which could allow remote attackers to execute + arbitrary code. + + chromium,google-chrome + 2020-03-13 + 2020-03-13 + 699676 + 700588 + 702498 + 703286 + 704960 + 705638 + 708322 + 710760 + 711570 + local, remote + + + 80.0.3987.132 + 80.0.3987.132 + + + 80.0.3987.132 + 80.0.3987.132 + + + +

Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +

+ +

Google Chrome is one fast, simple, and secure browser for all your + devices. +

+
+ +

Multiple vulnerabilities have been discovered in Chromium and Google + Chrome. Please review the referenced CVE identifiers and Google Chrome + Releases for details. +

+
+ +

A remote attacker could execute arbitrary code, escalate privileges, + obtain sensitive information, spoof an URL or cause a Denial of Service + condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-80.0.3987.132" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/google-chrome-80.0.3987.132" + + +
+ + CVE-2019-13723 + CVE-2019-13724 + CVE-2019-13725 + CVE-2019-13726 + CVE-2019-13727 + CVE-2019-13728 + CVE-2019-13729 + CVE-2019-13730 + CVE-2019-13732 + CVE-2019-13734 + CVE-2019-13735 + CVE-2019-13736 + CVE-2019-13737 + CVE-2019-13738 + CVE-2019-13739 + CVE-2019-13740 + CVE-2019-13741 + CVE-2019-13742 + CVE-2019-13743 + CVE-2019-13744 + CVE-2019-13745 + CVE-2019-13746 + CVE-2019-13747 + CVE-2019-13748 + CVE-2019-13749 + CVE-2019-13750 + CVE-2019-13751 + CVE-2019-13752 + CVE-2019-13753 + CVE-2019-13754 + CVE-2019-13755 + CVE-2019-13756 + CVE-2019-13757 + CVE-2019-13758 + CVE-2019-13759 + CVE-2019-13761 + CVE-2019-13762 + CVE-2019-13763 + CVE-2019-13764 + CVE-2019-13767 + CVE-2020-6377 + CVE-2020-6378 + CVE-2020-6379 + CVE-2020-6380 + CVE-2020-6381 + CVE-2020-6382 + CVE-2020-6385 + CVE-2020-6387 + CVE-2020-6388 + CVE-2020-6389 + CVE-2020-6390 + CVE-2020-6391 + CVE-2020-6392 + CVE-2020-6393 + CVE-2020-6394 + CVE-2020-6395 + CVE-2020-6396 + CVE-2020-6397 + CVE-2020-6398 + CVE-2020-6399 + CVE-2020-6400 + CVE-2020-6401 + CVE-2020-6402 + CVE-2020-6403 + CVE-2020-6404 + CVE-2020-6406 + CVE-2020-6407 + CVE-2020-6408 + CVE-2020-6409 + CVE-2020-6410 + CVE-2020-6411 + CVE-2020-6412 + CVE-2020-6413 + CVE-2020-6414 + CVE-2020-6415 + CVE-2020-6416 + CVE-2020-6418 + CVE-2020-6420 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-09.xml new file mode 100644 index 0000000000..60427a9d7a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-09.xml @@ -0,0 +1,56 @@ + + + + OpenID library for Ruby: Server-Side Request Forgery + A vulnerability in OpenID library for Ruby at worst might allow an + attacker to bypass authentication. + + ruby-openid + 2020-03-14 + 2020-03-14 + 698464 + remote + + + 2.9.2 + 2.9.2 + + + +

A Ruby library for verifying and serving OpenID identities.

+
+ +

It was discovered that OpenID library for Ruby performed discovery + first, and then verification. +

+
+ +

A remote attacker could possibly change the URL used for discovery and + trick the server into connecting to the URL. This server in turn could be + a private server not + publicly accessible. +

+ +

In addition, if the client that uses this library discloses connection + errors, this in turn could disclose information from the private server + to the attacker. +

+
+ +

There is no known workaround at this time.

+
+ +

All ruby-openid users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-ruby/ruby-openid-2.9.2" + + +
+ + CVE-2019-11027 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-10.xml new file mode 100644 index 0000000000..f14245582c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-10.xml @@ -0,0 +1,106 @@ + + + + Mozilla Thunderbird: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Thunderbird, + the worst of which could result in the arbitrary execution of code. + + thunderbird + 2020-03-14 + 2020-03-14 + 698516 + 702638 + 709350 + 712518 + remote + + + 68.6.0 + 68.6.0 + + + 68.6.0 + 68.6.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the + Mozilla project. +

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. + Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker may be able to execute arbitrary code, cause a Denial + of Service condition, obtain sensitive information, or conduct Cross-Site + Request Forgery (CSRF). +

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-68.6.0" + + +

All Mozilla Thunderbird binary users should upgrade to the latest + version: +

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=mail-client/thunderbird-bin-68.6.0" + + +
+ + + MFSA-2019-35 + + + MFSA-2019-37 + + + MFSA-2020-07 + + + MFSA-2020-10 + + CVE-2019-11745 + CVE-2019-11757 + CVE-2019-11759 + CVE-2019-11760 + CVE-2019-11761 + CVE-2019-11762 + CVE-2019-11763 + CVE-2019-11764 + CVE-2019-17005 + CVE-2019-17008 + CVE-2019-17010 + CVE-2019-17011 + CVE-2019-17012 + CVE-2019-20503 + CVE-2020-6792 + CVE-2020-6793 + CVE-2020-6794 + CVE-2020-6795 + CVE-2020-6798 + CVE-2020-6800 + CVE-2020-6805 + CVE-2020-6806 + CVE-2020-6807 + CVE-2020-6811 + CVE-2020-6812 + CVE-2020-6814 + + BlueKnight + BlueKnight +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-11.xml new file mode 100644 index 0000000000..d8f1f2bd98 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-11.xml @@ -0,0 +1,42 @@ + + + + SVG Salamander: Server-Side Request Forgery + A SSRF may allow remote attackers to forge illegitimate requests. + svgsalamander + 2020-03-14 + 2020-03-14 + 607720 + remote + + + 0.0-r2 + + + +

SVG Salamander is a light weight SVG renderer and animator for Java.

+
+ +

A Server-Side Request Forgery was discovered in SVG Salamander.

+
+ +

An attacker, by sending a specially crafted SVG file, can conduct SSRF.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for SVG Salamander. We recommend that + users unmerge SVG Salamander: +

+ + + # emerge --unmerge "dev-java/svgsalamander" + +
+ + CVE-2017-5617 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-12.xml new file mode 100644 index 0000000000..4232a5655d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-12.xml @@ -0,0 +1,55 @@ + + + + sudo: Multiple vulnerabilities + Multiple vulnerabilities have been found in sudo, the worst of + which could result in privilege escalation. + + sudo + 2020-03-14 + 2020-03-14 + 697462 + 707574 + local + + + 1.8.31 + 1.8.31 + + + +

sudo (su “do”) allows a system administrator to delegate authority + to give certain users (or groups of users) the ability to run some (or + all) commands as root or another user while providing an audit trail of + the commands and their arguments. +

+
+ +

Multiple vulnerabilities have been discovered in sudo. Please review the + CVE identifiers referenced below for details. +

+
+ +

A local attacker could expose or corrupt memory information, inject code + to be run as a root user or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All sudo users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.8.31" + + +
+ + CVE-2019-14287 + CVE-2019-18634 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-13.xml new file mode 100644 index 0000000000..4eabdcd70b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-13.xml @@ -0,0 +1,53 @@ + + + + musl: x87 floating-point stack adjustment imbalance + An x87 stack handling error in musl might allow an attacker to have + an application dependent impact. + + musl + 2020-03-14 + 2020-03-15 + 711276 + local, remote + + + 1.1.24 + 1.1.24 + + + +

musl is an implementation of the C standard library built on top of the + Linux system call API, including interfaces defined in the base language + standard, POSIX, and widely agreed-upon extensions. +

+
+ +

A flaw in musl libc’s arch-specific math assembly code for i386 was + found which can lead to x87 stack overflow in the execution of subsequent + math code. +

+
+ +

Impact depends on how the application built against musl libc handles + the ABI-violating x87 state. +

+
+ +

There is no known workaround at this time.

+
+ +

All musl users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/musl-1.1.24" + + +
+ + CVE-2019-14697 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-14.xml new file mode 100644 index 0000000000..a209c716b4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-14.xml @@ -0,0 +1,53 @@ + + + + atftp: Multiple vulnerabilities + Multiple vulnerabilities have been found in atftp, the worst of + which could result in the execution of arbitrary code. + + atftp + 2020-03-14 + 2020-03-14 + 711630 + remote + + + 0.7.2 + 0.7.2 + + + +

atftp is a client/server implementation of the TFTP protocol that + implements RFCs 1350, 2090, 2347, 2348, and 2349. +

+
+ +

Multiple vulnerabilities have been discovered in atftp. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could send a specially crafted packet to an atftp + instance, possibly resulting in the execution of arbitrary code with the + privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All atftp users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-ftp/atftp-0.7.2" + + +
+ + CVE-2019-11365 + CVE-2019-11366 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-15.xml new file mode 100644 index 0000000000..6ed03f0156 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-15.xml @@ -0,0 +1,54 @@ + + + + ICU: Integer overflow + An integer overflow flaw in ICU could possibly allow for the + execution of arbitrary code. + + ICU + 2020-03-15 + 2020-03-15 + 710758 + local, remote + + + 65.1-r1 + 65.1-r1 + + + +

ICU is a mature, widely used set of C/C++ and Java libraries providing + Unicode and Globalization support for software applications. +

+
+ +

It was discovered that ICU’s UnicodeString::doAppend() function is + vulnerable to an integer overflow. Please review the CVE identifiers + referenced below for more details. +

+
+ +

A remote attacker could entice a user to process a specially crafted + string in an application linked against ICU, possibly resulting in + execution of arbitrary code with the privileges of the process or a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All ICU users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/icu-65.1-r1" + + +
+ + CVE-2020-10531 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-16.xml new file mode 100644 index 0000000000..0e89f97242 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-16.xml @@ -0,0 +1,52 @@ + + + + SQLite: Multiple vulnerabilities + Multiple vulnerabilities have been found in SQLite, the worst of + which could result in the arbitrary execution of code. + + sqlite + 2020-03-15 + 2020-03-15 + 697678 + 711526 + local, remote + + + 3.31.1 + 3.31.1 + + + +

SQLite is a C library that implements an SQL database engine.

+
+ +

Multiple vulnerabilities have been discovered in SQLite. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All SQLite users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/sqlite-3.31.1" + + +
+ + CVE-2019-16168 + CVE-2019-5827 + CVE-2020-9327 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-17.xml new file mode 100644 index 0000000000..42fa05e084 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-17.xml @@ -0,0 +1,55 @@ + + + + nfdump: Multiple vulnerabilities + Multiple vulnerabilities have been found in nfdump, the worst of + which could result in the execution of arbitrary code. + + nfsdump + 2020-03-15 + 2020-03-15 + 711316 + local, remote + + + 1.6.19 + 1.6.19 + + + +

nfdump is a toolset in order to collect and process netflow and sflow + data, sent from netflow/sflow compatible devices. +

+
+ +

Multiple vulnerabilities have been discovered in nfdump. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by sending specially crafted netflow/sflow data, + could possibly execute arbitrary code with the privileges of the process + or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All nfdump users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/nfdump-1.6.19" + + +
+ + + CVE-2019-1010057 + + CVE-2019-14459 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-18.xml new file mode 100644 index 0000000000..26f12a64fe --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-18.xml @@ -0,0 +1,52 @@ + + + + libvirt: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in libvirt, the worst + of which may result in the execution of arbitrary commands. + + libvirt + 2020-03-15 + 2020-03-15 + 711306 + local + + + 5.4.1 + 5.4.1 + + + +

libvirt is a C toolkit for manipulating virtual machines.

+
+ +

Multiple vulnerabilities have been discovered in libvirt. Please review + the CVE identifiers referenced below for details. +

+
+ +

A local privileged attacker could execute arbitrary commands, escalate + privileges or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All libvirt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/libvirt-5.4.1" + + +
+ + CVE-2019-10161 + CVE-2019-10166 + CVE-2019-10167 + CVE-2019-10168 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-19.xml new file mode 100644 index 0000000000..30fa979f68 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-19.xml @@ -0,0 +1,50 @@ + + + + PPP: Buffer overflow + A buffer overflow in PPP might allow a remote attacker to execute + arbitrary code. + + PPP + 2020-03-15 + 2020-03-15 + 710308 + remote + + + 2.4.8 + 2.4.8 + + + +

PPP is a Unix implementation of the Point-to-Point Protocol.

+
+ +

It was discovered that bounds check in PPP for the rhostname was + improperly constructed in the EAP request and response functions. +

+
+ +

A remote attacker, by sending specially crafted authentication data, + could possibly execute arbitrary code with the privileges of the process + or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All PPP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dialup/ppp-2.4.8" + + +
+ + CVE-2020-8597 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-20.xml new file mode 100644 index 0000000000..696a1298d3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-20.xml @@ -0,0 +1,48 @@ + + + + systemd: Heap use-after-free + A heap use-after-free flaw in systemd at worst might allow an + attacker to execute arbitrary code. + + systemd + 2020-03-15 + 2020-03-15 + 708806 + local + + + 244.3 + 244.3 + + + +

A system and service manager.

+
+ +

It was found that systemd incorrectly handled certain Polkit queries.

+
+ +

A local unprivileged user, by sending a specially crafted Polkit query, + could possibly execute arbitrary code with the privileges of the process, + escalate privileges or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All systemd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/systemd-244.3" + + +
+ + CVE-2020-1712 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-21.xml new file mode 100644 index 0000000000..5f5c03bbfa --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-21.xml @@ -0,0 +1,56 @@ + + + + runC: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in runC, the worst of + which may lead to privilege escalation. + + runC + 2020-03-15 + 2020-03-15 + 677744 + 709456 + 711182 + local, remote + + + 1.0.0_rc10 + 1.0.0_rc10 + + + +

RunC is a CLI tool for spawning and running containers according to the + OCI specification. +

+
+ +

Multiple vulnerabilities have been discovered in runC. Please review the + CVE identifiers referenced below for details. +

+
+ +

An attacker, by running a malicious Docker image, could escape the + container, bypass security restrictions, escalate privileges or cause a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All runC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/runc-1.0.0_rc10" + + +
+ + CVE-2019-16884 + CVE-2019-19921 + CVE-2019-5736 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-22.xml new file mode 100644 index 0000000000..c69d16f0a6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-22.xml @@ -0,0 +1,94 @@ + + + + WebkitGTK+: Multiple vulnerabilities + Multiple vulnerabilities have been found in WebKitGTK+, the worst + of which may lead to arbitrary code execution. + + webkitgtk+ + 2020-03-15 + 2020-03-15 + 699156 + 706374 + 709612 + remote + + + 2.26.4 + 2.26.4 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, + suitable for projects requiring any kind of web integration, from hybrid + HTML/CSS applications to full-fledged web browsers. +

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please + review the referenced CVE identifiers for details. +

+
+ +

A remote attacker could execute arbitrary code, cause a Denial of + Service condition, bypass intended memory-read restrictions, conduct a + timing side-channel attack to bypass the Same Origin Policy or obtain + sensitive information. +

+
+ +

There is no known workaround at this time.

+
+ +

All WebkitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.26.4" + + +
+ + CVE-2019-8625 + CVE-2019-8674 + CVE-2019-8707 + CVE-2019-8710 + CVE-2019-8719 + CVE-2019-8720 + CVE-2019-8726 + CVE-2019-8733 + CVE-2019-8735 + CVE-2019-8743 + CVE-2019-8763 + CVE-2019-8764 + CVE-2019-8765 + CVE-2019-8766 + CVE-2019-8768 + CVE-2019-8769 + CVE-2019-8771 + CVE-2019-8782 + CVE-2019-8783 + CVE-2019-8808 + CVE-2019-8811 + CVE-2019-8812 + CVE-2019-8813 + CVE-2019-8814 + CVE-2019-8815 + CVE-2019-8816 + CVE-2019-8819 + CVE-2019-8820 + CVE-2019-8821 + CVE-2019-8822 + CVE-2019-8823 + CVE-2019-8835 + CVE-2019-8844 + CVE-2019-8846 + CVE-2020-3862 + CVE-2020-3864 + CVE-2020-3865 + CVE-2020-3867 + CVE-2020-3868 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-23.xml new file mode 100644 index 0000000000..0a16d80df9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-23.xml @@ -0,0 +1,51 @@ + + + + libjpeg-turbo: User-assisted execution of arbitrary code + Several integer overflows in libjpeg-turbo might allow an attacker + to execute arbitrary code. + + libjpeg-turbo + 2020-03-15 + 2020-03-15 + 699830 + local, remote + + + 2.0.3 + 2.0.3 + + + +

libjpeg-turbo is a MMX, SSE, and SSE2 SIMD accelerated JPEG library.

+
+ +

It was discovered that libjpeg-turbo incorrectly handled certain JPEG + images. +

+
+ +

A remote attacker could entice a user to open a specially crafted JPEG + file in an application linked against libjpeg-turbo, possibly resulting + in execution of arbitrary code with the privileges of the process or a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All libjpeg-turbo users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libjpeg-turbo-2.0.3" + + +
+ + CVE-2019-2201 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-24.xml new file mode 100644 index 0000000000..dbb042e177 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-24.xml @@ -0,0 +1,50 @@ + + + + file: Heap-based buffer overflow + A heap-based buffer overflow in file might allow remote attackers + to execute arbitrary code. + + file + 2020-03-15 + 2020-03-15 + 698610 + local, remote + + + 5.37-r1 + 5.37-r1 + + + +

file is a utility that guesses a file format by scanning binary data for + patterns. +

+
+ +

It was discovered that file incorrectly handled certain malformed files.

+
+ +

A remote attacker could entice a user to process a specially crafted + file via libmagic or file, possibly resulting in execution of arbitrary + code with the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All file users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/file-5.37-r1" + + +
+ + CVE-2019-18218 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-25.xml new file mode 100644 index 0000000000..ed368e6fbb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-25.xml @@ -0,0 +1,58 @@ + + + + libTIFF: Multiple vulnerabilities + Multiple vulnerabilities have been found in LibTIFF, the worst of + which could result in a Denial of Service condition. + + tiff + 2020-03-15 + 2020-03-15 + 639700 + 690732 + 699868 + local, remote + + + 4.1.0 + 4.1.0 + + + +

The TIFF library contains encoding and decoding routines for the Tag + Image File Format. It is called by numerous programs, including GNOME and + KDE applications, to interpret TIFF images. +

+
+ +

Multiple vulnerabilities have been discovered in libTIFF. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by enticing the user to process a specially crafted + TIFF file, could possibly cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All libTIFF users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/tiff-4.1.0" + + +
+ + CVE-2017-17095 + CVE-2018-19210 + CVE-2019-17546 + CVE-2019-6128 + CVE-2019-7663 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-26.xml new file mode 100644 index 0000000000..570a067487 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-26.xml @@ -0,0 +1,87 @@ + + + + Python: Multiple vulnerabilities + Multiple vulnerabilities have been found in Python, the worst of + which could result in a Denial of Service condition. + + python + 2020-03-15 + 2020-03-15 + 676700 + 680246 + 680298 + 684838 + 689822 + local, remote + + + 2.7.17 + 3.5.7 + 3.6.9 + 3.7.4 + 2.7.17 + 3.5.7 + 3.6.9 + 3.7.4 + + + +

Python is an interpreted, interactive, object-oriented programming + language. +

+
+ +

Multiple vulnerabilities have been discovered in Python. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly perform a CRLF injection attack, obtain + sensitive information, trick Python into sending cookies to the wrong + domain or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Python 2.7.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/python-2.7.17:2.7" + + +

All Python 3.5.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/python-3.5.7:3.5/3.5m" + + +

All Python 3.6.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/python-3.6.9:3.6/3.6m" + + +

All Python 3.7x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/python-3.7.4:3.7/3.7m" + +
+ + CVE-2018-20852 + CVE-2019-5010 + CVE-2019-9636 + CVE-2019-9740 + CVE-2019-9947 + CVE-2019-9948 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-27.xml new file mode 100644 index 0000000000..d34f8ce9fe --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-27.xml @@ -0,0 +1,50 @@ + + + + libssh: Arbitrary command execution + A vulnerability in libssh could allow a remote attacker to execute + arbitrary commands. + + libssh + 2020-03-15 + 2020-03-15 + 701598 + remote + + + 0.9.3 + 0.9.3 + + + +

libssh is a multiplatform C library implementing the SSHv2 protocol on + client and server side. +

+
+ +

It was discovered that libssh incorrectly handled certain scp commands.

+
+ +

A remote attacker could trick a victim into using a specially crafted + scp command, possibly resulting in the execution of arbitrary commands on + the server. +

+
+ +

There is no known workaround at this time.

+
+ +

All libssh users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/libssh-0.9.3" + + +
+ + CVE-2019-14889 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-28.xml new file mode 100644 index 0000000000..19bc271b64 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-28.xml @@ -0,0 +1,55 @@ + + + + libarchive: Multiple vulnerabilities + Multiple vulnerabilities have been found in libarchive, the worst + of which may lead to arbitrary code execution. + + libarchive + 2020-03-15 + 2020-03-15 + 699222 + 710358 + local, remote + + + 3.4.2 + 3.4.2 + + + +

libarchive is a library for manipulating different streaming archive + formats, including certain tar variants, several cpio formats, and both + BSD and GNU ar variants. +

+
+ +

Multiple vulnerabilities have been discovered in libarchive. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted + archive file possibly resulting in the execution of arbitrary code with + the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All libarchive users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/libarchive-3.4.2" + + +
+ + CVE-2019-18408 + CVE-2020-9308 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-29.xml new file mode 100644 index 0000000000..e075f5d26a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-29.xml @@ -0,0 +1,53 @@ + + + + cURL: Multiple vulnerabilities + Multiple vulnerabilities have been found in cURL, the worst of + which may lead to arbitrary code execution. + + curl + 2020-03-15 + 2020-03-15 + 686050 + 694020 + remote + + + 7.66.0 + 7.66.0 + + + +

A command line tool and library for transferring data with URLs.

+
+ +

Multiple vulnerabilities have been discovered in cURL. Please review the + CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All cURL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/curl-7.66.0" + + +
+ + CVE-2019-5435 + CVE-2019-5436 + CVE-2019-5481 + CVE-2019-5482 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-30.xml new file mode 100644 index 0000000000..894d97beb9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-30.xml @@ -0,0 +1,76 @@ + + + + Git: Multiple vulnerabilities + Multiple vulnerabilities have been found in Git, the worst of which + could result in the arbitrary execution of code. + + git + 2020-03-15 + 2020-03-20 + 702296 + local, remote + + + 2.21.1 + 2.23.1-r1 + 2.24.1 + 2.24.1 + + + +

Git is a free and open source distributed version control system + designed to handle everything from small to very large projects with + speed and efficiency. +

+
+ +

Multiple vulnerabilities have been discovered in Git. Please review the + CVE identifiers referenced below for details. +

+
+ +

An attacker could possibly overwrite arbitrary paths, execute arbitrary + code, and overwrite files in the .git directory. +

+
+ +

There is no known workaround at this time.

+
+ +

All Git 2.21.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-vcs/git-2.21.1" + + +

All Git 2.23.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-vcs/git-2.23.1-r1" + + +

All Git 2.24.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-vcs/git-2.24.1" + + +
+ + CVE-2019-1348 + CVE-2019-1349 + CVE-2019-1350 + CVE-2019-1351 + CVE-2019-1352 + CVE-2019-1353 + CVE-2019-1354 + CVE-2019-1387 + CVE-2019-19604 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-31.xml new file mode 100644 index 0000000000..4dae6769b5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-31.xml @@ -0,0 +1,55 @@ + + + + gdb: Buffer overflow + A buffer overflow in gdb might allow a remote attacker to cause a + Denial of Service condition. + + gdb + 2020-03-15 + 2020-03-15 + 690582 + local, remote + + + 9.1 + 9.1 + + + +

gdb is the GNU project’s debugger, facilitating the analysis and + debugging of applications. The BFD library provides a uniform method of + accessing a variety of object file formats. +

+
+ +

It was discovered that gdb didn’t properly validate the ELF section + sizes from input file. +

+
+ +

A remote attacker could entice a user to open a specially crafted ELF + binary using gdb, possibly resulting in information disclosure or a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All gdb users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-devel/gdb-9.1" + + +
+ + + CVE-2019-1010180 + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-32.xml new file mode 100644 index 0000000000..a4070273bd --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-32.xml @@ -0,0 +1,51 @@ + + + + Libgcrypt: Side-channel attack + A vulnerability in Libgcrypt could allow a local attacker to + recover sensitive information. + + libgcrypt + 2020-03-15 + 2020-03-15 + 693108 + local + + + 1.8.5 + 1.8.5 + + + +

Libgcrypt is a general purpose cryptographic library derived out of + GnuPG. +

+
+ +

A timing attack was found in the way ECCDSA was implemented in + Libgcrypt. +

+
+ +

A local man-in-the-middle attacker, during signature generation, could + possibly recover the private key. +

+
+ +

There is no known workaround at this time.

+
+ +

All Libgcrypt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libgcrypt-1.8.5" + + +
+ + CVE-2019-13627 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-33.xml new file mode 100644 index 0000000000..8d028e17b0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-33.xml @@ -0,0 +1,54 @@ + + + + GStreamer Base Plugins: Heap-based buffer overflow + A heap-based buffer overflow in GStreamer Base Plugins might allow + remote attackers to execute arbitrary code. + + gst-plugins-base + 2020-03-15 + 2020-03-15 + 701294 + remote + + + 1.14.5-r1 + 1.14.5-r1 + + + +

A well-groomed and well-maintained collection of GStreamer plug-ins and + elements, spanning the range of possible types of elements one would want + to write for GStreamer. +

+
+ +

It was discovered that GStreamer Base Plugins did not correctly handle + certain malformed RTSP streams. +

+
+ +

A remote attacker could entice a user to open a specially crafted RTSP + stream with a GStreamer application, possibly resulting in the execution + of arbitrary code or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All GStreamer Base Plugins users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=media-libs/gst-plugins-base-1.14.5-r1" + + +
+ + CVE-2019-9928 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-34.xml new file mode 100644 index 0000000000..940fc5edd5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-34.xml @@ -0,0 +1,61 @@ + + + + Squid: Multiple vulnerabilities + Multiple vulnerabilities have been found in Squid, the worst of + which could lead to arbitrary code execution. + + squid + 2020-03-16 + 2020-03-16 + 699854 + 708296 + remote + + + 4.10 + 4.10 + + + +

Squid is a full-featured Web proxy cache designed to run on Unix + systems. It supports proxying and caching of HTTP, FTP, and other URLs, + as well as SSL support, cache hierarchies, transparent caching, access + control lists and many other features. +

+
+ +

Multiple vulnerabilities have been discovered in Squid. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by sending a specially crafted request, could + possibly execute arbitrary code with the privileges of the process, + obtain sensitive information or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Squid users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-proxy/squid-4.10" + + +
+ + CVE-2019-12526 + CVE-2019-12528 + CVE-2019-18678 + CVE-2019-18679 + CVE-2020-8449 + CVE-2020-8450 + CVE-2020-8517 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-35.xml new file mode 100644 index 0000000000..fa72b90a87 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-35.xml @@ -0,0 +1,55 @@ + + + + ProFTPd: Multiple vulnerabilities + Multiple vulnerabilities have been found in ProFTPd, the worst of + which may lead to arbitrary code execution. + + proftpd + 2020-03-16 + 2020-03-16 + 699520 + 701814 + 710730 + remote + + + 1.3.6c + 1.3.6c + + + +

ProFTPD is an advanced and very configurable FTP server.

+
+ +

Multiple vulnerabilities have been discovered in ProFTPd. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by interrupting the data transfer channel, could + possibly execute arbitrary code with the privileges of the process or + cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All ProFTPd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.6c" + + +
+ + CVE-2019-18217 + CVE-2019-19269 + CVE-2020-9272 + CVE-2020-9273 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-36.xml new file mode 100644 index 0000000000..77b24063e9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-36.xml @@ -0,0 +1,55 @@ + + + + libvorbis: Multiple vulnerabilities + Multiple vulnerabilities have been found in libvorbis, the worst of + which could result in a Denial of Service condition. + + libvorbis + 2020-03-16 + 2020-03-16 + 631646 + 699862 + local, remote + + + 1.3.6-r1 + 1.3.6-r1 + + + +

libvorbis is the reference implementation of the Xiph.org Ogg Vorbis + audio file format. It is used by many applications for playback of Ogg + Vorbis files. +

+
+ +

Multiple vulnerabilities have been discovered in libvorbis. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by enticing the user to process a specially crafted + audio file, could possibly cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All libvorbis users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libvorbis-1.3.6-r1" + + +
+ + CVE-2017-14160 + CVE-2018-10392 + CVE-2018-10393 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-37.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-37.xml new file mode 100644 index 0000000000..27963a656f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-37.xml @@ -0,0 +1,63 @@ + + + + Mozilla Network Security Service: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Network + Security Service (NSS), the worst of which may lead to arbitrary code + execution. + + nss + 2020-03-16 + 2020-03-16 + 627534 + 676868 + 701840 + local, remote + + + 3.49 + 3.49 + + + +

The Mozilla Network Security Service (NSS) is a library implementing + security features like SSL v.2/v.3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS + #12, S/MIME and X.509 certificates. +

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Network + Security Service (NSS). Please review the CVE identifiers referenced + below for details. +

+
+ +

An attacker could execute arbitrary code, cause a Denial of Service + condition or have other unspecified impact. +

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Network Security Service (NSS) users should upgrade to the + latest version: +

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/nss-3.49" + + +
+ + CVE-2017-11695 + CVE-2017-11696 + CVE-2017-11697 + CVE-2017-11698 + CVE-2018-18508 + CVE-2019-11745 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-38.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-38.xml new file mode 100644 index 0000000000..0fe1b36c64 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-38.xml @@ -0,0 +1,52 @@ + + + + PECL Imagick: Arbitrary code execution + A vulnerability in Imagick PHP extension might allow an attacker to + execute arbitrary code. + + pecl-imagick + 2020-03-19 + 2020-03-19 + 687030 + remote + + + 3.4.4 + 3.4.4 + + + +

Imagick is a PHP extension to create and modify images using the + ImageMagick library. +

+
+ +

An out-of-bounds write vulnerability was discovered in the Imagick PHP + extension. +

+
+ +

A remote attacker, able to upload specially crafted images which will + get processed by Imagick, could possibly execute arbitrary code with the + privileges of the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Imagick PHP extension users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-php/pecl-imagick-3.4.4" + + +
+ + CVE-2019-11037 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-39.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-39.xml new file mode 100644 index 0000000000..3da65eb92d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-39.xml @@ -0,0 +1,50 @@ + + + + phpMyAdmin: SQL injection + An SQL injection vulnerability in phpMyAdmin may allow attackers to + execute arbitrary SQL statements. + + phpmyadmin + 2020-03-19 + 2020-03-19 + 701830 + remote + + + 4.9.2 + 4.9.2 + + + +

phpMyAdmin is a web-based management tool for MySQL databases.

+
+ +

PhpMyAdmin was vulnerable to an SQL injection attack through the + designer feature. +

+
+ +

An authenticated remote attacker, by specifying a specially crafted + database/table name, could trigger an SQL injection attack. +

+
+ +

There is no known workaround at this time.

+
+ +

All phpMyAdmin users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-4.9.2" + + +
+ + CVE-2019-18622 + PMASA-2019-5 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-40.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-40.xml new file mode 100644 index 0000000000..75c8ef9418 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-40.xml @@ -0,0 +1,54 @@ + + + + Cacti: Multiple vulnerabilities + Multiple vulnerabilities have been found in Cacti, the worst of + which could lead to the remote execution of arbitrary code. + + cacti + 2020-03-19 + 2020-03-19 + 702312 + 708938 + remote + + + 1.2.9 + 1.2.9 + + + +

Cacti is a complete frontend to rrdtool.

+
+ +

Multiple vulnerabilities have been discovered in Cacti. Please review + the CVE identifiers referenced below for details. +

+
+ +

Remote attackers could execute arbitrary code or bypass intended access + restrictions. +

+
+ +

There is no known workaround at this time.

+
+ +

All Cacti users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-1.2.9" + + +
+ + CVE-2019-16723 + CVE-2019-17357 + CVE-2019-17358 + CVE-2020-7106 + CVE-2020-7237 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-41.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-41.xml new file mode 100644 index 0000000000..ac164d1577 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-41.xml @@ -0,0 +1,48 @@ + + + + GNU FriBidi: Heap-based buffer overflow + A heap-based buffer overflow in GNU FriBidi might allow remote + attackers to execute arbitrary code. + + fribidi + 2020-03-19 + 2020-03-19 + 699338 + local, remote + + + 1.0.8 + 1.0.8 + + + +

The Free Implementation of the Unicode Bidirectional Algorithm.

+
+ +

A heap-based buffer overflow vulnerability was found in GNU FriBidi.

+
+ +

A remote attacker could possibly cause a memory corruption, execute + arbitrary code with the privileges of the process or cause a Denial of + Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All FriBidi users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/fribidi-1.0.8" + + +
+ + CVE-2019-18397 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-42.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-42.xml new file mode 100644 index 0000000000..76a2944ee9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-42.xml @@ -0,0 +1,53 @@ + + + + libgit2: Multiple vulnerabilities + Multiple vulnerabilities have been found in libgit2, the worst of + which could result in the arbitrary execution of code. + + libgit2 + 2020-03-19 + 2020-03-19 + 702522 + local, remote + + + 0.28.4 + 0.28.4 + + + +

libgit2 is a portable, pure C implementation of the Git core methods + provided as a re-entrant linkable library with a solid API. +

+
+ +

Multiple vulnerabilities have been discovered in libgit2. Please review + the CVE identifiers referenced below for details. +

+
+ +

An attacker could possibly overwrite arbitrary paths, execute arbitrary + code, and overwrite files in the .git directory. +

+
+ +

There is no known workaround at this time.

+
+ +

All libgit2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libgit2-0.28.4" + + +
+ + CVE-2019-1348 + CVE-2019-1350 + CVE-2019-1387 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-43.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-43.xml new file mode 100644 index 0000000000..12f723cb96 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-43.xml @@ -0,0 +1,62 @@ + + + + Apache Tomcat: Multiple vulnerabilities + Multiple vulnerabilities have been found in Apache Tomcat, the + worst of which could lead to arbitrary code execution. + + tomcat + 2020-03-19 + 2020-03-20 + 692402 + 706208 + 710656 + remote + + + 8.5.51 + 7.0.100 + 8.5.51 + + + +

Apache Tomcat is a Servlet-3.0/JSP-2.2 Container.

+
+ +

Multiple vulnerabilities have been discovered in Apache Tomcat. Please + review the CVE identifiers referenced below for details. +

+
+ +

An attacker could possibly smuggle HTTP requests or execute arbitrary + code. +

+
+ +

There is no known workaround at this time.

+
+ +

All Apache Tomcat 7.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/tomcat-7.0.100:7" + + +

All Apache Tomcat 8.5.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/tomcat-8.5.51:8.5" + + +
+ + CVE-2019-0221 + CVE-2019-12418 + CVE-2019-17563 + CVE-2020-1938 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-44.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-44.xml new file mode 100644 index 0000000000..91ebcf2f6a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-44.xml @@ -0,0 +1,52 @@ + + + + Binary diff: Heap-based buffer overflow + A heap-based buffer overflow in Binary diff might allow remote + attackers to execute arbitrary code. + + bsdiff + 2020-03-19 + 2020-03-19 + 701848 + local, remote + + + 4.3-r4 + 4.3-r4 + + + +

bsdiff and bspatch are tools for building and applying patches to binary + files. +

+
+ +

It was discovered that the implementation of bspatch did not check for a + negative value on numbers of bytes read from the diff and extra streams. +

+
+ +

A remote attacker could entice a user to apply a specially crafted patch + using bspatch, possibly resulting in execution of arbitrary code with the + privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Binary diff users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-util/bsdiff-4.3-r4" + + +
+ + CVE-2014-9862 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-45.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-45.xml new file mode 100644 index 0000000000..e436236d68 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-45.xml @@ -0,0 +1,49 @@ + + + + PyYAML: Arbitrary code execution + A flaw in PyYAML might allow attackers to execute arbitrary code. + pyyaml + 2020-03-19 + 2020-03-19 + 659348 + local, remote + + + 5.1 + 5.1 + + + +

PyYAML is a YAML parser and emitter for Python.

+
+ +

It was found that using yaml.load() API on untrusted input could lead to + arbitrary code execution. +

+
+ +

A remote attacker could entice a user to process specially crafted input + in an application using yaml.load() from PyYAML, possibly resulting in + execution of arbitrary code with the privileges of the process or a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All PyYAML users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/pyyaml-5.1" + + +
+ + CVE-2017-18342 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-46.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-46.xml new file mode 100644 index 0000000000..ae2d48c320 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-46.xml @@ -0,0 +1,51 @@ + + + + ClamAV: Multiple vulnerabilities + Multiple vulnerabilities have been found in ClamAV, the worst of + which could result in a Denial of Service condition. + + clamav + 2020-03-19 + 2020-03-19 + 702010 + 708424 + local, remote + + + 0.102.2 + 0.102.2 + + + +

ClamAV is a GPL virus scanner.

+
+ +

Multiple vulnerabilities have been discovered in ClamAV. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could cause ClamAV to scan a specially crafted file, + possibly resulting in a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All ClamAV users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.102.2" + + +
+ + CVE-2019-15961 + CVE-2020-3123 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-47.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-47.xml new file mode 100644 index 0000000000..e127121e07 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-47.xml @@ -0,0 +1,52 @@ + + + + Exim: Heap-based buffer overflow + A vulnerability in Exim could allow a remote attacker to execute + arbitrary code. + + + 2020-03-20 + 2020-03-20 + 701282 + remote + + + 4.92.3 + 4.92.3 + + + +

Exim is a message transfer agent (MTA) designed to be a a highly + configurable, drop-in replacement for sendmail. +

+
+ +

It was discovered that Exim incorrectly handled certain string + operations. +

+
+ +

A remote attacker, able to connect to a vulnerable Exim instance, could + possibly execute arbitrary code with the privileges of the process or + cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Exim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-mta/exim-4.92.3" + + +
+ + CVE-2019-16928 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-48.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-48.xml new file mode 100644 index 0000000000..94ecb6b4e6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-48.xml @@ -0,0 +1,78 @@ + + + + Node.js: Multiple vulnerabilities + Multiple vulnerabilities have been found in Node.js, worst of which + could allow remote attackers to write arbitrary files. + + nodejs + 2020-03-20 + 2020-03-20 + 658074 + 665656 + 672136 + 679132 + 702988 + 708458 + local, remote + + + 10.19.0 + 12.15.0 + 12.15.0 + + + +

Node.js is a JavaScript runtime built on Chrome’s V8 JavaScript + engine. +

+
+ +

Multiple vulnerabilities have been discovered in Node.js. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly write arbitrary files, cause a Denial + of Service condition or can conduct HTTP request splitting attacks. +

+
+ +

There is no known workaround at this time.

+
+ +

All Node.js <12.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/nodejs-10.19.0" + + +

All Node.js 12.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/nodejs-12.15.0" + + +
+ + CVE-2018-12115 + CVE-2018-12116 + CVE-2018-12121 + CVE-2018-12122 + CVE-2018-12123 + CVE-2018-7161 + CVE-2018-7162 + CVE-2018-7164 + CVE-2018-7167 + CVE-2019-15604 + CVE-2019-15605 + CVE-2019-15606 + CVE-2019-16777 + CVE-2019-5737 + CVE-2019-5739 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-49.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-49.xml new file mode 100644 index 0000000000..682453c993 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-49.xml @@ -0,0 +1,50 @@ + + + + BlueZ: Security bypass + A vulnerability in BlueZ might allow remote attackers to bypass + security restrictions. + + bluez + 2020-03-25 + 2020-03-25 + 712292 + remote + + + 5.54 + 5.54 + + + +

Set of tools to manage Bluetooth devices for Linux.

+
+ +

It was discovered that the HID and HOGP profiles implementations in + BlueZ did not specifically require bonding between the device and the + host. +

+
+ +

A remote attacker with adjacent access could impersonate an existing HID + device, cause a Denial of Service condition or escalate privileges. +

+
+ +

There is no known workaround at this time.

+
+ +

All BlueZ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-wireless/bluez-5.54" + + +
+ + CVE-2020-0556 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-50.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-50.xml new file mode 100644 index 0000000000..36ab084c78 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-50.xml @@ -0,0 +1,58 @@ + + + + Tor: Multiple vulnerabilities + Multiple vulnerabilities were found in Tor, the worst of which + could allow remote attackers to cause a Denial of Service condition. + + tor + 2020-03-25 + 2020-03-25 + 713238 + remote + + + 0.4.1.9 + 0.4.2.7 + 0.4.2.7 + + + +

Tor is an implementation of second generation Onion Routing, a + connection-oriented anonymizing communication service. +

+
+ +

Multiple vulnerabilities have been discovered in Tor, and tor. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly cause a Denial of Service condition.

+
+ +

There is no known workaround at this time.

+
+ +

All Tor 0.4.1.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-vpn/tor-0.4.1.9" + + +

All Tor 0.4.2.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-vpn/tor-0.4.2.7" + + +
+ + CVE-2020-10592 + CVE-2020-10593 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-51.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-51.xml new file mode 100644 index 0000000000..f8176070b4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-51.xml @@ -0,0 +1,54 @@ + + + + WeeChat: Multiple vulnerabilities + Multiple vulnerabilities have been found in WeeChat, the worst of + which could allow remote attackers to cause a Denial of Service condition. + + weechat + 2020-03-25 + 2020-03-25 + 709452 + 714086 + remote + + + 2.7.1 + 2.7.1 + + + +

Wee Enhanced Environment for Chat (WeeChat) is a light and extensible + console IRC client. +

+
+ +

Multiple vulnerabilities have been discovered in WeeChat. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by sending a specially crafted IRC message, could + possibly cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All WeeChat users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-irc/weechat-2.7.1" + + +
+ + CVE-2020-8955 + CVE-2020-9759 + CVE-2020-9760 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-52.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-52.xml new file mode 100644 index 0000000000..aafebaff00 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-52.xml @@ -0,0 +1,88 @@ + + + + Samba: Multiple vulnerabilities + Multiple vulnerabilities have been found in Samba, the worst of + which could lead to remote code execution. + + samba + 2020-03-25 + 2020-03-25 + 664316 + 672140 + 686036 + 693558 + 702928 + 706144 + remote + + + 4.9.18 + 4.10.13 + 4.11.6 + 4.11.6 + + + +

Samba is a suite of SMB and CIFS client/server programs.

+
+ +

Multiple vulnerabilities have been discovered in Samba. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code, cause a Denial + of Service condition, conduct a man-in-the-middle attack, or obtain + sensitive information. +

+
+ +

There is no known workaround at this time.

+
+ +

All Samba 4.9.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-fs/samba-4.9.18" + + +

All Samba 4.10.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-fs/samba-4.10.13" + + +

All Samba 4.11.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-fs/samba-4.11.6" + + +
+ + CVE-2018-10858 + CVE-2018-10918 + CVE-2018-10919 + CVE-2018-1139 + CVE-2018-1140 + CVE-2018-14629 + CVE-2018-16841 + CVE-2018-16851 + CVE-2018-16852 + CVE-2018-16853 + CVE-2018-16857 + CVE-2018-16860 + CVE-2019-10197 + CVE-2019-14861 + CVE-2019-14870 + CVE-2019-14902 + CVE-2019-14907 + CVE-2019-19344 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-53.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-53.xml new file mode 100644 index 0000000000..2f1a217d45 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-53.xml @@ -0,0 +1,78 @@ + + + + Chromium, Google Chrome: Multiple vulnerabilities + Multiple vulnerabilities have been found in Chromium and Google + Chrome, the worst of which could allow remote attackers to execute + arbitrary code. + + chromium,google-chrome + 2020-03-25 + 2020-03-25 + 713282 + remote + + + 80.0.3987.149 + 80.0.3987.149 + + + 80.0.3987.149 + 80.0.3987.149 + + + +

Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +

+ +

Google Chrome is one fast, simple, and secure browser for all your + devices. +

+
+ +

Multiple vulnerabilities have been discovered in Chromium and Google + Chrome. Please review the referenced CVE identifiers for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted HTML + or multimedia file using Chromium or Google Chrome, possibly resulting in + execution of arbitrary code with the privileges of the process or a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-80.0.3987.149" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/google-chrome-80.0.3987.149" + + +
+ + CVE-2020-6422 + CVE-2020-6424 + CVE-2020-6425 + CVE-2020-6426 + CVE-2020-6427 + CVE-2020-6428 + CVE-2020-6429 + CVE-2020-6449 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-54.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-54.xml new file mode 100644 index 0000000000..0e12b029b9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-54.xml @@ -0,0 +1,52 @@ + + + + Pure-FTPd: Multiple vulnerabilities + Multiple vulnerabilities have been found in Pure-FTPd, the worst of + which could allow remote attackers to cause a Denial of Service condition. + + pure-ftpd + 2020-03-25 + 2020-03-25 + 711124 + remote + + + 1.0.49-r2 + 1.0.49-r2 + + + +

Pure-FTPd is a fast, production-quality and standards-compliant FTP + server. +

+
+ +

Multiple vulnerabilities have been discovered in Pure-FTPd. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly cause a Denial of Service condition or + cause an information disclosure. +

+
+ +

There is no known workaround at this time.

+
+ +

All Pure-FTPd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-ftp/pure-ftpd-1.0.49-r2" + + +
+ + CVE-2020-9274 + CVE-2020-9365 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-55.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-55.xml new file mode 100644 index 0000000000..681f038158 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-55.xml @@ -0,0 +1,49 @@ + + + + Zsh: Privilege escalation + A vulnerability in Zsh might allow an attacker to escalate + privileges. + + zsh + 2020-03-25 + 2020-03-25 + 711136 + local, remote + + + 5.8 + 5.8 + + + +

A shell designed for interactive use, although it is also a powerful + scripting language. +

+
+ +

It was discovered that Zsh was insecure dropping privileges when + unsetting PRIVILEGED option. +

+
+ +

An attacker could escalate privileges.

+
+ +

There is no known workaround at this time.

+
+ +

All Zsh users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-shells/zsh-5.8" + + +
+ + CVE-2019-20044 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-56.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-56.xml new file mode 100644 index 0000000000..8f25345155 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-56.xml @@ -0,0 +1,73 @@ + + + + Xen: Multiple vulnerabilities + Multiple vulnerabilities have been found in Xen, the worst of which + could allow for privilege escalation. + + xen + 2020-03-25 + 2020-03-25 + 686024 + 699048 + 699996 + 702644 + local + + + 4.12.0-r1 + 4.12.0-r1 + + + 4.12.0-r1 + 4.12.0-r1 + + + +

Xen is a bare-metal hypervisor.

+
+ +

Multiple vulnerabilities have been discovered in Xen. Please review the + referenced CVE identifiers for details. +

+
+ +

A local attacker could potentially gain privileges on the host system or + cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Xen users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.12.0-r1" + + +
+ + CVE-2018-12126 + CVE-2018-12127 + CVE-2018-12130 + CVE-2018-12207 + CVE-2018-12207 + CVE-2019-11091 + CVE-2019-11135 + CVE-2019-18420 + CVE-2019-18421 + CVE-2019-18423 + CVE-2019-18424 + CVE-2019-18425 + CVE-2019-19577 + CVE-2019-19578 + CVE-2019-19580 + CVE-2019-19581 + CVE-2019-19582 + CVE-2019-19583 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-57.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-57.xml new file mode 100644 index 0000000000..507ece2ce6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-57.xml @@ -0,0 +1,78 @@ + + + + PHP: Multiple vulnerabilities + Multiple vulnerabilities have been found in PHP, the worst of which + could result in the execution of arbitrary shell commands. + + PHP + 2020-03-26 + 2020-03-26 + 671872 + 706168 + 710304 + 713484 + local, remote + + + 7.2.29 + 7.3.16 + 7.4.4 + 7.4.4 + + + +

PHP is an open source general-purpose scripting language that is + especially suited for web development. +

+
+ +

Multiple vulnerabilities have been discovered in PHP. Please review the + CVE identifiers referenced below for details. +

+
+ +

An attacker could possibly execute arbitrary shell commands, cause a + Denial of Service condition or obtain sensitive information. +

+
+ +

There is no known workaround at this time.

+
+ +

All PHP 7.2.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-7.2.29" + + +

All PHP 7.3.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-7.3.16" + + +

All PHP 7.4.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-7.4.4" + + +
+ + CVE-2018-19518 + CVE-2020-7059 + CVE-2020-7060 + CVE-2020-7061 + CVE-2020-7062 + CVE-2020-7063 + CVE-2020-7064 + CVE-2020-7065 + CVE-2020-7066 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-58.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-58.xml new file mode 100644 index 0000000000..7c15220be4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-58.xml @@ -0,0 +1,56 @@ + + + + UnZip: User-assisted execution of arbitrary code + Multiple vulnerabilities have been found in UnZip, the worst of + which could result in the execution of arbitrary code. + + unzip + 2020-03-26 + 2020-03-26 + 647008 + 691566 + local, remote + + + 6.0_p25 + 6.0_p25 + + + +

Info-ZIP’s UnZip is a tool to list and extract files inside PKZIP + compressed files. +

+
+ +

Multiple vulnerabilities have been discovered in UnZip. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted ZIP + archive using UnZip, possibly resulting in execution of arbitrary code + with the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All UnZip users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/unzip-6.0_p25" + + +
+ + + CVE-2018-1000035 + + CVE-2019-13232 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-59.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-59.xml new file mode 100644 index 0000000000..b0f7f3f831 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-59.xml @@ -0,0 +1,63 @@ + + + + libvpx: User-assisted execution of arbitrary code + Multiple vulnerabilities have been found in libvpx, the worst of + which could result in the execution of arbitrary code. + + libvpx + 2020-03-26 + 2020-03-26 + 701834 + local, remote + + + 1.7.0-r1 + 1.8.1 + 1.8.1 + + + +

libvpx is the VP8 codec SDK used to encode and decode video streams, + typically within a WebM format media file. +

+
+ +

Multiple vulnerabilities have been discovered in libvpx. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted media + file, possibly resulting in the execution of arbitrary code with the + privileges of the user running the application, or a Denial of Service. +

+
+ +

There is no known workaround at this time.

+
+ +

All libvpx 1.7.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libvpx-1.7.0-r1" + + +

All libvpx 1.8.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libvpx-1.8.1" + + +
+ + CVE-2019-9232 + CVE-2019-9325 + CVE-2019-9371 + CVE-2019-9433 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-60.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-60.xml new file mode 100644 index 0000000000..28bde54884 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-60.xml @@ -0,0 +1,60 @@ + + + + QtCore: Multiple vulnerabilities + Multiple vulnerabilities have been found in QtCore, the worst of + which could result in the execution of arbitrary code. + + qtcore + 2020-03-26 + 2020-03-26 + 699226 + 707354 + local, remote + + + 5.12.3-r2 + 5.13.2-r2 + 5.13.2-r2 + + + +

The Qt toolkit is a comprehensive C++ application development framework.

+
+ +

Multiple vulnerabilities have been discovered in QtCore. Please review + the CVE identifiers referenced below for details. +

+
+ +

An attacker could possibly execute arbitrary code with the privileges of + the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All QtCore 5.12.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-qt/qtcore-5.12.3-r2" + + +

All QtCore 5.13.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-qt/qtcore-5.13.2-r2" + + +
+ + CVE-2019-18281 + CVE-2020-0569 + CVE-2020-0570 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-61.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-61.xml new file mode 100644 index 0000000000..be2b54a87d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-61.xml @@ -0,0 +1,52 @@ + + + + Adobe Flash Player: Remote execution of arbitrary code + A vulnerability in Adobe Flash Player might allow remote attackers + to execute arbitrary code. + + adobe-flash + 2020-03-26 + 2020-03-26 + 709728 + remote + + + 32.0.0.330 + 32.0.0.330 + + + +

The Adobe Flash Player is a renderer for the SWF file format, which is + commonly used to provide interactive websites. +

+
+ +

A critical type confusion vulnerability was discovered in Adobe Flash + Player. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Adobe Flash users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-plugins/adobe-flash-32.0.0.330" + + +
+ + CVE-2020-3757 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-62.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-62.xml new file mode 100644 index 0000000000..659c68b6d6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-62.xml @@ -0,0 +1,52 @@ + + + + GNU Screen: Buffer overflow + A buffer overflow in GNU Screen might allow remote attackers to + corrupt memory. + + screen + 2020-03-30 + 2020-03-30 + 708460 + remote + + + 4.8.0 + 4.8.0 + + + +

GNU Screen is a full-screen window manager that multiplexes a physical + terminal between several processes, typically interactive shells. +

+
+ +

A buffer overflow was found in the way GNU Screen treated the special + escape OSC 49. +

+
+ +

A remote attacker, by writing a specially crafted string of characters + to a GNU Screen window, could possibly corrupt memory or have other + unspecified impact. +

+
+ +

There is no known workaround at this time.

+
+ +

All GNU Screen users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-misc/screen-4.8.0" + + +
+ + CVE-2020-9366 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-63.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-63.xml new file mode 100644 index 0000000000..475b97bc28 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-63.xml @@ -0,0 +1,53 @@ + + + + GNU IDN Library 2: Multiple vulnerabilities + Multiple vulnerabilities have been found in GNU IDN Library 2, the + worst of which could result in the remote execution of arbitrary code. + + libidn2 + 2020-03-30 + 2020-03-30 + 697752 + local, remote + + + 2.2.0 + 2.2.0 + + + +

GNU IDN Library 2 is an implementation of the IDNA2008 + TR46 + specifications (RFC 5890, RFC 5891, RFC 5892, RFC 5893, TR 46). +

+
+ +

Multiple vulnerabilities have been discovered in GNU IDN Library 2. + Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could send specially crafted input, possibly resulting + in execution of arbitrary code with the privileges of the process, + impersonation of domains or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All GNU IDN Library 2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dns/libidn2-2.2.0" + + +
+ + CVE-2019-12290 + CVE-2019-18224 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-64.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-64.xml new file mode 100644 index 0000000000..1b7c239fd3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-64.xml @@ -0,0 +1,59 @@ + + + + libxls: Multiple vulnerabilities + Multiple vulnerabilities have been found in libxls, the worst of + which could result in the arbitrary execution of code. + + libxls + 2020-03-30 + 2020-03-30 + 638336 + 674006 + local, remote + + + 1.5.2 + 1.5.2 + + + +

libxls is a C library for reading Excel files in the nasty old binary + OLE format, plus a command-line tool for converting XLS to CSV. +

+
+ +

Multiple vulnerabilities have been discovered in libxls. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to process a specially crafted + Excel file using libxls, possibly resulting in execution of arbitrary + code with the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All libxls users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libxls-1.5.2" + + +
+ + CVE-2017-12110 + CVE-2017-12111 + CVE-2017-2896 + CVE-2017-2897 + CVE-2017-2919 + CVE-2018-20450 + CVE-2018-20452 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-65.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-65.xml new file mode 100644 index 0000000000..2ca8be1853 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-65.xml @@ -0,0 +1,63 @@ + + + + FFmpeg: Multiple vulnerabilities + Multiple vulnerabilities have been found in FFmpeg, the worst of + which allows remote attackers to execute arbitrary code. + + ffmpeg + 2020-03-30 + 2020-03-30 + 660924 + 692418 + 711144 + local, remote + + + 4.2.0 + 4 + + + +

FFmpeg is a complete, cross-platform solution to record, convert and + stream audio and video. +

+
+ +

Multiple vulnerabilities have been discovered in FFmpeg. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user or automated system using FFmpeg + to process a specially crafted file, resulting in the execution of + arbitrary code or a Denial of Service. +

+
+ +

There is no known workaround at this time.

+
+ +

All FFmpeg 4.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-video/ffmpeg-4.2.0" + + +
+ + CVE-2018-10001 + CVE-2018-6912 + CVE-2018-7557 + CVE-2018-7751 + CVE-2018-9841 + CVE-2019-12730 + CVE-2019-13312 + CVE-2019-13390 + CVE-2019-17539 + CVE-2019-17542 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-66.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-66.xml new file mode 100644 index 0000000000..d1f66e5042 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-66.xml @@ -0,0 +1,51 @@ + + + + QEMU: Multiple vulnerabilities + Multiple vulnerabilities have been found in QEMU, the worst of + which could result in the arbitrary execution of code. + + qemu + 2020-03-30 + 2020-03-30 + 709490 + 711334 + local + + + 4.2.0-r2 + 4.2.0-r2 + + + +

QEMU is a generic and open source machine emulator and virtualizer.

+
+ +

Multiple vulnerabilities have been discovered in QEMU. Please review the + CVE identifiers referenced below for details. +

+
+ +

An attacker could possibly execute arbitrary code with the privileges of + the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All QEMU users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/qemu-4.2.0-r2" + + +
+ + CVE-2019-13164 + CVE-2020-8608 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-01.xml new file mode 100644 index 0000000000..a88cde25a8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-01.xml @@ -0,0 +1,66 @@ + + + + HAProxy: Remote execution of arbitrary code + A vulnerability in HAProxy might lead to remote execution of + arbitrary code. + + haproxy + 2020-04-01 + 2020-04-01 + 701842 + remote + + + 1.8.23 + 1.9.13 + 2.0.10 + 2.0.10 + + + +

HAProxy is a TCP/HTTP reverse proxy for high availability environments.

+
+ +

It was discovered that HAProxy incorrectly handled certain HTTP/2 + headers. +

+
+ +

A remote attacker could send a specially crafted HTTP/2 header, possibly + resulting in execution of arbitrary code with the privileges of the + process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All HAProxy 1.8.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-proxy/haproxy-1.8.23" + + +

All HAProxy 1.9.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-proxy/haproxy-1.9.13" + + +

All HAProxy 2.0.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-proxy/haproxy-2.0.10" + + +
+ + CVE-2019-19330 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-02.xml new file mode 100644 index 0000000000..33129dd64c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-02.xml @@ -0,0 +1,122 @@ + + + + VirtualBox: Multiple vulnerabilities + Multiple vulnerabilities have been found in VirtualBox, the worst + of which could allow an attacker to take control of VirtualBox. + + virtualbox + 2020-04-01 + 2020-04-01 + 714064 + local, remote + + + 5.2.36 + 6.0.16 + 6.1.2 + 6.1.2 + + + 5.2.36 + 6.0.16 + 6.1.2 + 6.1.2 + + + +

VirtualBox is a powerful virtualization product from Oracle.

+
+ +

Multiple vulnerabilities have been discovered in VirtualBox. Please + review the CVE identifiers referenced below for details. +

+
+ +

An attacker could take control of VirtualBox resulting in the execution + of arbitrary code with the privileges of the process, a Denial of Service + condition, or other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All VirtualBox 5.2.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-5.2.36" + + +

All VirtualBox 6.0.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-6.0.16" + + +

All VirtualBox 6.1.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-6.1.2" + + +

All VirtualBox binary 5.2.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=app-emulation/virtualbox-bin-5.2.36" + + +

All VirtualBox binary 6.0.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=app-emulation/virtualbox-bin-6.0.16" + + +

All VirtualBox binary 6.1.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=app-emulation/virtualbox-bin-6.1.2" + + +
+ + CVE-2019-2926 + CVE-2019-2944 + CVE-2019-2984 + CVE-2019-3002 + CVE-2019-3005 + CVE-2019-3017 + CVE-2019-3021 + CVE-2019-3026 + CVE-2019-3028 + CVE-2019-3031 + CVE-2020-2674 + CVE-2020-2678 + CVE-2020-2681 + CVE-2020-2682 + CVE-2020-2689 + CVE-2020-2690 + CVE-2020-2691 + CVE-2020-2692 + CVE-2020-2693 + CVE-2020-2698 + CVE-2020-2702 + CVE-2020-2703 + CVE-2020-2704 + CVE-2020-2705 + CVE-2020-2725 + CVE-2020-2726 + CVE-2020-2727 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-03.xml new file mode 100644 index 0000000000..66862b17b0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-03.xml @@ -0,0 +1,60 @@ + + + + GPL Ghostscript: Multiple vulnerabilities + Multiple vulnerabilities have been found in GPL Ghostscript, the + worst of which could result in the execution of arbitrary code. + + ghostscript + 2020-04-01 + 2020-04-01 + 676264 + 692106 + 693002 + local, remote + + + 9.28_rc4 + 9.28_rc4 + + + +

Ghostscript is an interpreter for the PostScript language and for PDF.

+
+ +

Multiple vulnerabilities have been discovered in GPL Ghostscript. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to process a specially crafted + file using GPL Ghostscript, possibly resulting in execution of arbitrary + code with the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All GPL Ghostscript users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=app-text/ghostscript-gpl-9.28_rc4" + + +
+ + CVE-2019-10216 + CVE-2019-14811 + CVE-2019-14812 + CVE-2019-14813 + CVE-2019-14817 + CVE-2019-3835 + CVE-2019-3838 + CVE-2019-6116 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-04.xml new file mode 100644 index 0000000000..aae687ae7b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-04.xml @@ -0,0 +1,53 @@ + + + + Qt WebEngine: Arbitrary code execution + A heap use-after-free flaw in Qt WebEngine at worst might allow an + attacker to execute arbitrary code. + + qtwebengine + 2020-04-01 + 2020-04-01 + 699328 + local, remote + + + 5.14.1 + 5.14.1 + + + +

Library for rendering dynamic web content in Qt5 C++ and QML + applications. +

+
+ +

A use-after-free vulnerability has been found in the audio component of + Qt WebEngine. +

+
+ +

A remote attacker could entice a user to open a specially crafted media + file in an application linked against Qt WebEngine, possibly resulting in + execution of arbitrary code with the privileges of the process or a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Qt WebEngine users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-qt/qtwebengine-5.14.1" + + +
+ + CVE-2019-13720 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-05.xml new file mode 100644 index 0000000000..7b9d4af2f9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-05.xml @@ -0,0 +1,55 @@ + + + + ledger: Multiple vulnerabilities + Multiple vulnerabilities have been found in ledger, the worst of + which could result in the arbitrary execution of code. + + ledger + 2020-04-01 + 2020-04-01 + 627060 + remote + + + 3.1.2 + 3.1.2 + + + +

Ledger is a powerful, double-entry accounting system that is accessed + from the UNIX command-line. +

+
+ +

Multiple vulnerabilities have been discovered in ledger. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to process a specially crafted + file using ledger, possibly resulting in execution of arbitrary code with + the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All ledger users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-office/ledger-3.1.2" + + +
+ + CVE-2017-12481 + CVE-2017-12482 + CVE-2017-2807 + CVE-2017-2808 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-06.xml new file mode 100644 index 0000000000..5e8ca1511c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-06.xml @@ -0,0 +1,49 @@ + + + + GnuTLS: DTLS protocol regression + A regression in GnuTLS breaks the security guarantees of the DTLS + protocol. + + gnutls + 2020-04-02 + 2020-04-02 + 715602 + local, remote + + + 3.6.13 + 3.6.13 + + + +

GnuTLS is an Open Source implementation of the TLS and SSL protocols.

+
+ +

It was discovered that DTLS client did not contribute any randomness to + the DTLS negotiation. +

+
+ +

Please review the referenced advisory for details.

+
+ +

There is no known workaround at this time.

+
+ +

All GnuTLS users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/gnutls-3.6.13" + + +
+ + + GNUTLS-SA-2020-03-31 + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-07.xml new file mode 100644 index 0000000000..cf8709bebe --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-07.xml @@ -0,0 +1,64 @@ + + + + Mozilla Firefox: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the + worst of which could result in the arbitrary execution of code. + + firefox + 2020-04-04 + 2020-04-04 + 716098 + remote + + + 68.6.1 + 74.0.1 + 74.0.1 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla + Project. +

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to view a specially crafted web + page, possibly resulting in the execution of arbitrary code with the + privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-68.6.1" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-74.0.1" + + +
+ + CVE-2020-6819 + CVE-2020-6820 + + MFSA-2020-11 + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-08.xml new file mode 100644 index 0000000000..2bccb96214 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-08.xml @@ -0,0 +1,53 @@ + + + + libssh: Denial of Service + A vulnerability in libssh could allow a remote attacker to cause a + Denial of Service condition. + + libssh + 2020-04-10 + 2020-04-10 + 716788 + remote + + + 0.9.4 + 0.9.4 + + + +

libssh is a multiplatform C library implementing the SSHv2 protocol on + client and server side. +

+
+ +

It was discovered that libssh could crash when AES-CTR ciphers are used.

+
+ +

A remote attacker running a malicious client or server could possibly + crash the counterpart implemented with libssh and cause a Denial of + Service condition. +

+
+ +

Disable AES-CTR ciphers. If you implement a server using libssh it is + recommended to use a prefork model so each session runs in an own + process. +

+
+ +

All libssh users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/libssh-0.9.4" + + +
+ + CVE-2020-1730 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-09.xml new file mode 100644 index 0000000000..90297ed5e8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202004-09.xml @@ -0,0 +1,97 @@ + + + + Chromium, Google Chrome: Multiple vulnerabilities + Multiple vulnerabilities have been found in Chromium and Google + Chrome, the worst of which could allow remote attackers to execute + arbitrary code. + + chrome,chromium + 2020-04-10 + 2020-04-10 + 715720 + 716612 + remote + + + 81.0.4044.92 + 81.0.4044.92 + + + 81.0.4044.92 + 81.0.4044.92 + + + +

Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +

+ +

Google Chrome is one fast, simple, and secure browser for all your + devices. +

+
+ +

Multiple vulnerabilities have been discovered in Chromium and Google + Chrome. Please review the referenced CVE identifiers for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted HTML + or multimedia file using Chromium or Google Chrome, possibly resulting in + execution of arbitrary code with the privileges of the process or a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-81.0.4044.92" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/google-chrome-81.0.4044.92" + + +
+ + CVE-2020-6423 + CVE-2020-6430 + CVE-2020-6431 + CVE-2020-6432 + CVE-2020-6433 + CVE-2020-6434 + CVE-2020-6435 + CVE-2020-6436 + CVE-2020-6437 + CVE-2020-6438 + CVE-2020-6439 + CVE-2020-6440 + CVE-2020-6441 + CVE-2020-6442 + CVE-2020-6443 + CVE-2020-6444 + CVE-2020-6445 + CVE-2020-6446 + CVE-2020-6447 + CVE-2020-6448 + CVE-2020-6450 + CVE-2020-6451 + CVE-2020-6452 + CVE-2020-6454 + CVE-2020-6455 + CVE-2020-6456 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index ad596e5625..e81ed68e74 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 25 Nov 2019 18:08:44 +0000 +Thu, 16 Apr 2020 05:38:59 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 14ac9c2950..e60cae01f3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -751af6f91da06f53265195cff434eb66a145af73 1574641117 2019-11-25T00:18:37+00:00 +f2cb9b0eb0e16fd065838568dbe36727be807027 1586556154 2020-04-10T22:02:34+00:00