From e5f61621a8e30e5520beb33d79eda06a99f15356 Mon Sep 17 00:00:00 2001 From: Flatcar Buildbot Date: Thu, 1 Aug 2024 07:16:34 +0000 Subject: [PATCH] portage-stable/metadata: Monthly GLSA metadata updates --- .../portage-stable/metadata/glsa/Manifest | 30 ++++---- .../metadata/glsa/Manifest.files.gz | Bin 576950 -> 580125 bytes .../metadata/glsa/glsa-202407-09.xml | 67 ++++++++++++++++ .../metadata/glsa/glsa-202407-10.xml | 41 ++++++++++ .../metadata/glsa/glsa-202407-11.xml | 46 +++++++++++ .../metadata/glsa/glsa-202407-12.xml | 56 ++++++++++++++ .../metadata/glsa/glsa-202407-13.xml | 64 ++++++++++++++++ .../metadata/glsa/glsa-202407-14.xml | 46 +++++++++++ .../metadata/glsa/glsa-202407-15.xml | 42 ++++++++++ .../metadata/glsa/glsa-202407-16.xml | 42 ++++++++++ .../metadata/glsa/glsa-202407-17.xml | 55 +++++++++++++ .../metadata/glsa/glsa-202407-18.xml | 42 ++++++++++ .../metadata/glsa/glsa-202407-19.xml | 59 ++++++++++++++ .../metadata/glsa/glsa-202407-20.xml | 48 ++++++++++++ .../metadata/glsa/glsa-202407-21.xml | 49 ++++++++++++ .../metadata/glsa/glsa-202407-22.xml | 72 ++++++++++++++++++ .../metadata/glsa/glsa-202407-23.xml | 48 ++++++++++++ .../metadata/glsa/glsa-202407-24.xml | 48 ++++++++++++ .../metadata/glsa/glsa-202407-25.xml | 48 ++++++++++++ .../metadata/glsa/glsa-202407-26.xml | 42 ++++++++++ .../metadata/glsa/glsa-202407-27.xml | 46 +++++++++++ .../metadata/glsa/glsa-202407-28.xml | 45 +++++++++++ .../metadata/glsa/timestamp.chk | 2 +- .../metadata/glsa/timestamp.commit | 2 +- 24 files changed, 1023 insertions(+), 17 deletions(-) create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-09.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-10.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-11.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-12.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-13.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-14.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-15.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-16.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-17.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-18.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-19.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-20.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-21.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-22.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-23.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-24.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-25.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-26.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-27.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-28.xml diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 89b0b932e1..c4cb2559cd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 576950 BLAKE2B 88011af22fa4be4dd32deb6beef67152498dbf9a935f1735cb732a1cff2286ecaac7ff10b0cd4cc26890af67573dfd9f41b1b3d976e69dc012ee35c219644c8d SHA512 c652e80fb194ffb2de3f33c3046f525f887396de843ab0761ad5fa21d9949f6b62a1a16747b833821d7307bc10a7d9679651980cd85f6673c854e9dc8e09f5af -TIMESTAMP 2024-07-01T06:40:32Z +MANIFEST Manifest.files.gz 580125 BLAKE2B 982b6b57cb4d4733e1bbfeb28e0a6a9ff1b1b559ff5cd5932caade1ea3218e0035c9f42e574b5131fdf3387eabb87c7cd6aed2cba373d576048c0a5e79ccec35 SHA512 8cb2188002bd17e3e7ba091831fe199c9ad02d776881b9e2e7325790c2a717534701fddb8aaca82004fd810de6f8b5b2c8146c80435e1d75e4d5c49960506eaf +TIMESTAMP 2024-08-01T06:40:34Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmaCT2BfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmarLeJfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klCqxxAAlJUoGJYKzxQA/H3JQnjWSmIGVKL5XLmsWRPghQ9J5hsLgQURe8wGtoIU -9oCNhRJesjAkA5l72Aa+HyEonUAiOqZD8R17ek9ipDLA9VFM9T9yNhk+nwnDu8Yi -nWRjh3GB3OlcZbJDZ0ORE3ze65a8AMHlnWyCCq1QSZYXAqYDhbBz+i0y2hOtsBLP -KiJKyh1uFON30dzDNbvY8taSw5ktaV5x4uuvmh7fmw2PpfoqK838me3YuQq8hVt4 -/haj/FoAfT8imrL8f52v01gUxz9EP5gRuzfML4v728TcQjDlmyuk/EuSm0PjFKxn -zto2xmY/6/4AL/VKGOmzw3zpjapWjyiydVsh+l0hec1aZTxdgheh/dN7TfMJgmTV -MUIyeLOX+qMvFph1ZITVNi3iQW5VO9Ho4exzvMgHVthli0Kqjqdx7rC966zHN3Ao -3QuNtof4D+0ChqOyJpfdIrrRQct7M/Jp+2ZSx0T3luZ2mxSvVH+aIBBo/w37i5hM -3612fcZWMDtzUvT0sbhuf9j1o7S7T24V66cs0BxpMC8t2Gh3pF4TL8CDDFH1rrv6 -8b9TU/3t/qk1haW42KmYXeUq6wEUWw1Z49wb80JEI6ZlTtm74CEdTYm27eisb+Wq -H7DiQc0WDdZm5i7wVEN/nyVEf04Qv5IhfYS3MDaPDnck2pVaPtc= -=IEvJ +klA/+w//b9GufyRShrKBPRMRF3zwZabqhzFcsN9C70FsaXlrAgQ5l1HqY9CSBkdk +2F1YS3Y0EYR1EI3zAbGpfrVwvp8CE/Mxq5NbIeehhoByIehYyPTu0x1DgpNbnFFo +EokuM5mG+qfF1Tv8qeGBBMkUvzrBRGQLG79z2khcvoYpaYJTON19MqeeFQffo60p +9eebwqSdEaaadCWaO9ncsDVzD/xb/JE9chbqApNAI6Qu+3gAqjxXsc8wLwbx5+GD +IxoiNzkX8d2AaXR0IMcen2bFOyRhSEAa0BrWLYP8aEZdQJkMSGPCL09FxGSFZRmo +hcUGgN8awJ7YMemPhug14V10fMQ/krgYsqknY2GojMJR/lmzYgRwHjAPAZq1uUue +A3v91z/tE6DCQgJBYuay3pytDIsmg1GZMXOUsTYlkvkHSFD6iD8L/agYAlOU+Q+u +6uSYpjINJqe0B49fDvuHF5nvSGUv7yFK4dMvLKOftqKWLegBg+WQIUqjnu8Bi/jJ +aXU7+tffKbgY5AIlpv5STWdbBwJ3/b72JTzeT1FQpurzgHnZZ2mr0dyektsiW9KI +sXNfB/MuGwtz7Rf8a5pxB0yf4EtTO94NATW2Nka5bWSmj01ZPDB+WlDGU3RakEqz +V5FeH7TW7oOg1WN0ewrTUCh+75N5P+nHFpa1PW1iGBek7RGPcak= +=y/aO -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index f940d60f9967a3e645989f24d2c23b62660db29a..035709be80186306120c71c7994ee35423360c37 100644 GIT binary patch delta 13474 zcmV;TG+oQKnU_-1WIX6_8|T)lKKU3VGwwR{K4(p;RDA`z+U!ort$l42 zvJ{&Pf2!cd;r1&3$rjV7oDYSct!I3}Tj>|e=Z`LiQ(($TsCaa010RNsPKSEp?gQ3- z1FMd+Y>6G6KA`?VIYw7U50&uim~J0BtaNBQrADXwP}Xs#dJHxkR3vybz;V3K_7QMk zg}2Mym9*Ijg1aZBj>f_1IZ#L+x)Kg2rf0#{_(FrKdAUR7VL>=yG(Ho8MND?J0 zNw2PH5K(Em>aB2ToMR0JLgm(r>z5(VaDR#NKf{4a5WH&;ci4Mit*WY=72bhHC|&Qs zkpph)Qq2sK8&$Cf6by^)SBL#OrVC^tR1jvP9Uq;~%fox;f&3Z$cw7PJ@~4!BQvp`T ze@`2_LARLK)3PCR1UC(dnA`6T*aQ=t&1orJQh6x+4T%}S(O%iyO1m~>uXE;;6x%he z<#QF+01t?TMJPH$c&?ib8Twe*=V7Y`=6qXKXx=T40M_kfIxp4k*fDZ1IOS zEJ(ObQowRalzl?QU#yy=GaO&G6YM5t@vyDsd%TG201kcUtLo2<3w)^x4yM+vN)e%{ zw`Km*q=bn)dxwAO!$S0gdMZJS&ycOBXol#SIj=%4q|=^NYAj zN|bDPq;pbt#W91s7XgunI^O)R7KPKNF4Dha zp0!GQ)7A4m$Qjx^N$LpTfA;dsijZR>ni_BGg-(~njO=dHIQ8UEzuRFXXu*^UhV93t zO^S=c4m1W^L<-$+Ak0-%%f9Gzee<0FJYZ(7B=p=Ow2hby5vukm&!KWkJ`@%80tw|LN1f?pLUTK zsJ8f5^|Mm%8*Hv2(&C?hhEBygQA{A$g_zXNGkyEES;XQnWscMAjzTu>zdFS+Tm`I5Cue9W^$6M_y=HyST=(uSoCY`uC{`JD?ciZ2ITPKQ zPH{(CU!K;ltMG?pe|lOuX~5@XxyDM-ZIkDKH$*L%M|DYp0HbOXVMV9ErqkbWI*M4+ z!AZpo4&w5+ZrGZ3gGYu%8kd;`=Z32}LN`y8Q=LKOdHf#o`3FLi4A#==j4mhfOD;N#rv2O#G{O-PPQKTqz8WK^Z zX`Dr?+ph~SDgt=?e3T^B~ zXiXw`YJ==M?4qaLF9Ej3MKt;HwDRx#)<^eMe;+x5vg(0wD;UnRpSM1jbr&B;Cep$? zK?Y*cpn%6^afZMT4_x{)RT+R&^ltBs`P_FZ`orI{dxRuCD$5e^B?PVayaNH5@_^(eZ|4zF}px-%B^++B^AsC%@gSAz%i1ys% zyI{4Rlhri~m9=X2LFBr-K$@&z3lQLMH30mnByi)5SC@@bQ8xMpqaD&CXpzH`!*u^hT>-Q#p@Wg3jkBheW9zAQPcAkoD zI#i$~QYm5E%M~DNztSFe(ztdnFLMG_Nm1%!m!N%A?y7=eyw|4=srDq`9P5I1e?E2> zvp>%z!Omm(bmvUErsO>lJz)s;)s&&gAaTW^$h$4sk>(04-Y2*%)I$LX(BZjBh$A!V zKZI@}XYqy|&~(k=h)#1g^)h0z8wBPnP84&atU4WEp4QJzOg(=XktqlWwO&h00A-or zZ;J9iDv|q1cJU@Vggf_qdf6iIf7)i>$w4fOU&>+g?=EXjT+ZOtn)&j{Yt=Dpe zb$e;hGu9FjN9$!;(P zhi^C1)elWH2*e`ASnn>OFqSe)UNhYG-mDx0#f-j0*}CDo%O9 z29guHPr;J0`bb=~k#8xSKCkHASLiIo>sh329LnfY9aw#ibR3<^>1&BF)G4 zEfDINOQ^aGP%cp)a>E-92y~+!2vkJ z%IvQ7F?<24{bX;D^AFgJypi-QxRtXSN@`UcP+fvgnxN>-uWqV~+ zwT_75S;$AgA4xSbmtl(~c{`zVE3mEGUdJ|#f4UTbdu+(O@s{$Y=V)~{J-a!GZb7YE zZ?|x|AUDXA-R%tZtmT`Qtkx4CFBZ?TPJeDOAG=gWsvr;X4sII;(Z3e=($FM7I+vnv zr4t72;-`O$@;|G>q?k8?a3M#HiqLFCUR%fs$|rACg*!#k`sotGsjrmXAYf?DHn8e0 zf2P#PhTVz4PT055J=e!ohY7e~|FO6eQ zF?7)**mBAkHp!mz)|N?W*7$6xuuiI$V#lkKvQy=(^aNM8x=#dCD&cKWGtOJtd_eoXxxJVqy>@C??b$x z`7^S@eQ?~3RB$)fsufap3w$W5M(|qOIn5cy@Q zee953{B(;ampv;L)CNpIbP36<-6)>{8U8*p8P2O3v7{g$gW_$=PYT9L^Nqim`gkHnEihIhDZHHwM7oSS|C78qBwO+yMU?v z1gz-55voJ64pJ9~_!OrAK0Yc$YyQ0>NU{s@1)cs*>4Kf!2trE^f3BJHTAIb3MH;J4 zqF-BuAfkTUaPhkA6C{(O!(GrEp%?FZlAg;_=CN4@bi0#}SKL8c95XJErlC+o0JKJD z+g0S!Ri}kFtLBBx7(seXv+l%?AAC|*DWK)cc|+o4fC4{716-Q{Md$FP$T9B(=6N~= zXvLR%s7s=Uj5i5%f7LwLSggl~)l|~f(8B(6%@)b<^-s8Y8Q% zb|};VzXvEgx9d9fIk-ToR0CKw#62|R<2@CNwpsb^ute$)-MzgkB{c^@MkQsLN5U+l_YMkm|CZygzf-#2_;)qXwT)7>ST&=P zzudEnws=)5c%r2ckSb}`_1xv>y0dV?Mvt}yfVILK=GxtB+a78vY{AT-`9G`T4z=>+ zP1=|1ztHZ%f4j9V`>F==Ki8rARZ%q2AS1Ma5YG;XxCMn|;d$|dy3-Vjbn1}^&S=W& zyEI$D>kClqjyZhDmCm6Z^iZ>TN%>6y8vi)WJ6)sEYzJ8WB`5w&>E_R^sKZqfr{;9S z2@bK6gLqyCq04omo4}(z0$7QgdW*hp6*d1zVe_&Hf4`h`X#IG?p5g?qMLx)B!(wX) z7v<7aMap zmAOC|2?aX49*4>XL+^D(Jas9vlzu!aYc3Zp3#XDm3)&%_U*pb>-_7_f%Kys#93M4^ z?eYZUe^CC;y&>`z7hKV5aWaI;&FQM^vR>6o4|`=cIWR|_4vp78OFPjwy_Cg@8+Gv4 z#`DNtj;MzsTq(JM9M#YV#K5&vc-!Q<<*Bc`Moi>jQgn9M2udIgdN|&yj&al5ErYBZ zy_;Sx&8XaKaXJJ(!_QY7P;V7C#YsQGW+ERDf2hmTfqrMGMJZb?UpXB&IlkS*_KUaP z^YYzU*$dL;qV}Km0!h#^$T%Uy>(EzZz{~*o+>ytXN|G?}oF~8fX>4 ze?0d%&NPz>z8%`_FH>g7#)|el_8ZBM(X9^xp)*l{AHL_*_Kpve1&NxJjkG1#;`4W1 zzP`=S+lPc_(2h$jD+`+ON!C9|Ohm9d3Z753P!&!lJL}uq%VqiY0j6I|$)~4Rmn3^U zxMifr;(r4dCsoY3hn^j>)Pt@!C$#mAej$kk0=pGnm64sI-d4&1`4p3?u(b=S>~tplc$|jgt!#F24L7) ztx+&kw9acwR@GeC^U7B$S(J6HYk6vPMMe@Ins zy2|ssMvF5+K_8)Vi;jWMrgSWKVL(6O$a{uiJDdTG-U9PyDE?yu=G)5$ZA*MD)Ap{O zsS*Ih!E6K3@hb?anXY6HtjNK^Ah*NxJF$8)9Bo%1orj_%XmF9aamdLF3M%;?h=^HP z!t(djNd2AC&GAF1`8uy*KIKiSe>!|a*3_0x))xwK-BiR;vx=q^w0fgXKEYV0#^09M z9ddS4p72_P4y3c|Oq@!sEOG=q96A*)7nX>bng3pE+haR6y*7n+W3=iI;+`-OtvmG! z7mnmVn6XPzs`J^A6wYfUWZdfmh^TzXJV=Q8&@*&Ey@ z25$h}0Z(8&_cFC4Q5(ZafBwgArn;uOkCX4X1NRP{m)2W+)&)rgscjGT(Ytyjj@G1e z{}^RBIlz1P>D$x#mGI0T<^{w=^>_3fJ1vWx>KYw(ayU?rBIzV5M^Y7?fZ{3k)bBmx zs+nO{>UQc2z<+yhHFeR}O5EwI8(ut3`$5IW0UAF$or+4Yv(l2JJe-T{WIl4T63-x9GyuusGoz zynTEfRu5@iu`o;c%IGJxT<;rD?)u8x{wR|-PE|A9 zce44esYtMDQEWsJN1g8tRcSH%-FmEC{UEhQ9i^6H*N(Y4ozXYf)r}+i(8O4`YK6SJ zHMQT!4VXyUziUvH0qpzjY5huge(Y64XPV+Ik zxx~_5sEw*^gXw$~jbXVP9R7Zh)y<(pSx*c2s^svuZrN)lW~#%*ISR1z@vh6qi?_VO zF7~VL{Ya!ira5Vf1T}FUP}82EbBn94p5e&()O7aIn!+xo#Ve&JRYuB}qhmbc0rVjR z47YRc;Uts1e}FqY_+Y9H-hX#r>+h5!0IAc0n83%lO;ccLp zlJ-&8lhn=D{M<>atSm_bDz~C1R5I6H2KeBTZ}G2O*YO)|%+$f}Mv$dIN_ zLFto+6ZK3%wh{xbbE^|M)yjn0bWYC2e+N2to=f@iD519Gt31!``lsGCK=2GRB|VZk z-sS}xe+$89bah$EjaZ`%x*H88w@&4P*V!EnKlEzm8#T9%WQo_~ibOaXDS*pWRcxy2 zb&066!UGPuiyf0@=}o`RBlFcY%_fbs@#Sg#T5EmGL4c0N;nW%wpM!foRTVJHF|fMC z0SASWk%PW9pf7g}-A9hjVYIdd_@{A~7;beFe^y_f$@>_ZL&e31(`79?uDMDG3UJ>< zBLE0bIlblh`!?8^f5hx;3-I!w|23qCT-TnYgg_=(?Cpdw{K0PGp7y>ti!%VrI=AK` zmngxJc8y3C`_7H5(vRu1s3sFGhim)8fwPL_%)pnY^@HVGd*{Rsz;mqN&WaD;ob-do zf1;k|a-5h@9k!V`KzQ+nM&pIRhBYWZySWd{HA(n_M-?#Q)d_14xYe3v-mAv^r0rM% zKF^vUHZZWtc)-tBXFoQ#Ou%VjyIC4{NYbvEx{s)SyF!2~xKw57@rWAD>YH{pg|?2l zM!e114`{t=2CGU-;2s9|WVkYhK|%y+e**USr(V0o~0|CAoyg_?5B zAXD$rm$93z3Z?`4MC*2I92Fs?HMIo!Fc}7?yVVmcxmMMTT%jDSNxYIQh^|L+xH|<5=(b2#NLSFaH))WY2v|^{`+aYrgT5l%A6oL z_uQynRJ=Sm1B?v-2vUJUJxV(!gj~xp${zNlYf)WXNSgZ3b2jH zEBrd^OqX~XM|DK%a5m%WpdW3$iMWkCG+|8&7r}p$^+cykFZFhzM9H?|W9U-V^2lGX z{Lhpw==x(nk!0s_TGMG&e-c*FSNPnfO1vfFzk{(|w~Y#T4-P6rbf9dH-rWjb?cF>5 zgGIVq@C>-b*L@zhj_a9=t2a%Zc;Jo|E+UOn8(h&3MXAWAt_Q#Lm@Wu4^34Rfsbfrx zPRs>HgA=Y<-m;Dj znLdZbVFKE}KCRiUZpZQ&X0tugEg(3GC`sGEYD z0Lfvdk=%12XX=yzZG?DDnCz^|-IRN&F=#&EIxS86_=SWEf8fz8%JV0RwsBX6doCd; zHnKdRWY6kC(>?4oxn)n#DvF6KsRf$8R&!D%JlcaD4zamk`5d)8nvCfaZXhK^$#bBs zM0F6Hmf5;4WD@ChetBByZ`(G7b!-lXt$t2o;~T5u6CFjZ+g5)6Syky<^F+(f3-|!| zRzy;FZ&xkAe>)FYnzN%2m0UAtx6zt2ZXCQzooo;_gy?pcmJCcZzF#$n8eH7H95GMM zzrrlk&F0q=oBLhW4|Jj7;3;SmVPP+uUy>V?SKV^XO}FA^8A;*(WCbm$gi=Awx<KwL97n92Zwk!SH$1>>usG+o;$NS-G zQ0RIPe|XRF60VU2GnJGc>qy^jV)?agd*?)6DI8qY%ac3@j#F14X$VC6veK~#k(XLn z+`YOS+!YZkd*yU2+);y8tpVkQ-O)i}j@aosv-5>yQLr_4b=g5XgoU;MZ|%v632#$j z*RJi77*Cq(;&S~NA%k{OlVyo=?=5)#%nwbVe*)1o9ek#~A!MTr${r7QJwMJRlOM-& zM%Q-05&x9i$^nK~h7=O(0vI^*%Pz+8ns$qy)>=Frj*P;+9vAaQ=VKEQZ@;m7As!a; z+T*&POK)6Pa)z!>=gE)dJiw0J){Rcs==23OR$B|KeOdd2uua1cnN9n^Y`?}Op+1fm zf2#%{DUalm(;Xa7BKPu*f*TfFmDv49tEM2)WcN!i#YdL0qLSRhC3EMa+-u4F!&TLv z;3bp)NkRHpV7oUu%f1pF2Eut$9J9^Q=6A#-)AXHQ_cKFcL$mvk8 zFCuf z=;EW3e9FsghmzQV;zb3iNUDq0QlY6+>E3gwE$6tMmLsHu0qa)I9Yj63gi5D+EhXYt z-B~+p7}ehM@(wxLvKgwRIzPUB;)ms~Od3?UtPI`DZqA&|e(g-0%~x1|akOAxguX>S zd6XFDD|69&JBt4DjK=IqwA; z<@`>~5ebIfdf02mW>=}KI&!XfDE!+loFjDea7c2~BE6>Q018eaN4~nXe|C0A zERrSX#7B1_kUXk8f>T^PS%A-7RhU+ijdTL61_bjkFFk2TnO~mP?+)2V7sHNv?j5R< zi*nxJU|xBiUJ1}PmnC|_7fU}{~AkV#;1;)HLi^CZlo%KY@G zRRG=Ad)hPq#0o8lKmZ?Ff4a&)R96Wd*=m|!7RLiq;wS;fr(a;E$LiUmUJRUou&9Md zb>CH+b!8q2`b1Wj$O!OGcb$AZf*$Yq3U`lAx!Z*sx;yD;QaC7Xoql;*zs9d0I?c-W zT&Zs%Tg~b?OkHt3#fBoZ-by<_$&F3tEqE#*QBDWfqCA=h>N9Yth$?ENsCQ^+IhGd*xvKFZyA)DC2lMvI03XOzD;?kB)^AQM z@w1CTh#;MlTgVoMe?Y$*ENy75$mQs&&$%mVISnd14X|!IjQj5Ax@;GVDO8L-_05^R z5|XzcjmIqt=+h}4P1Jz{_bKNOVMSWx`vL~$?a&)^Wk*O+bqtc8C2Qmqa?C(*au-i~_tZD~e=!e+=e+O?M5RwpVb-=GN`L zJgr}Cw-2)@m}$9^3-S|Idh^CFdolXFwZMy}dtI?o7JJZw9nM25DgY-io@@wcQ@ztBF&iH`L*Tky zQ`{Ai)u?ggQYqMNRu}NBzVNil(iX>RpWO@6ik;fAU4)nOYaI2hx4sMXWIU1^$W9oc z@iweb@*T2_>mQivAlY|V$fKM_zKO2wNnT?ZQ!*|m?Z`DOhx+5>)Z zxGCsl*dl*~2_krG6D44yb=O+eeon=|cq#`$mWa&)g8dpts;>U!Y5nLl$B(+a`6ck4 ziRP{Z#HX*SFPzm7LK(?x>9n~!*(78ji>|jS7pmd|iGC zLqdN%`62AOI;UC=n5G6bJm2wRJ|wK^KEt(72fxEF59Y0U0Uo!OB`0AOBz>sv8Qq+5 zcB=QT!f5INh?gY4pSDK+hnRt>_ROgMUk$)5Yzud&%3Gnj+ z%aam;S~?D>QZ*eg;8a_};rL$9Q0p~_J0E{-m;=0U=;ff)PSIQ{+q@cmsErWzEIL@m zy3QWRxYu*XR+JDdioKm#sb>OzsK;Kld|`R@*sc6>FRUB!f?SCv`W2pj1*+%nbgf1( zt(hes9~(U3RJ4t-RoAwXb*6J$Y(0(*@t*DglI(gHY=`+Ob($7nb$51_$}OS46%K#e zYXUrcSjY3FJ82D?JGVIR743bW3ZH`yUG*EsaNgCUjUiga~27m=W+7=Gw zsGVAJby)3rJ3wSO@Ec6m+J*zqkVS1gdvG@SRcR)OsT~Y?+Y9Y(sUBol`zjMuMa;Ra zz9uakxYWd>-MZ8-$oH&bc(mK3-l2aEiZ=LKfoGUrA&Y)8jeAePCBOD^mrb+Vp;9lz z^UKrv^<4Q-&xp#ss}xYRyZ}YJmgDG^J>0z_Rh2muP6lD&bSg5BP5JaIo3rpp9>u0l zTW5jCC(re9x-UT>PLGFIArNwy+Isvn!W?kudfVjk1RuA1v_U)7i_|rvHn4x2#;?9U zr{7l@rCI<;0R*NGm1fKlWKd?D2PtvcnzpO2soKGn;b3p!S-bGnZ=sNjj)v}mt2qTC z=LdaxT0dq{pA+EZXcG`@2KZZwnkiM+H)Zdejm$xqw}ad=U%=5_83YH2__$m)BVs_y zw5DjfR;xI6=%Xu`CHJc(q{4q6{K}zx>nmJxvI3XLnUq)UG*tbqNyKe$ODL^0o}f%= zQ`tK&Z3YgPJ4aCFk;e{Ba5T4RJ4t$KeAv)#*ARfXoYnRuZB*OkkXHmQS^$zsMk22w zLM&-vdI(gj!K(p{<^UCMvAuEnRiz^pEh zo&auM`D4dTxZ%>9dNNJld9B`UXs9VNmLt3syrmcXUI*gV4Xb|dYM>LR>QFxYQE8g* z6aYs`{1rEF3$H-Bc|Lo>ngh1?YtF3@<33c$n{+HCVmYMe&2?(DoY^h%m#7lpt`D2n&EsL9@s15~uNjn^uHr=U>EUus}?U#&RB zd6jwW`}%O^TUNy-=DlRn_`sDbCp~m=S!oC$C>hYcn|mCC@Zx_4aq7W+x(pvMLGXgQ zzPOzFZlRaIp3i%44ITN*)A}+s!a*qRk0sJ=bsEccB6TbXj_xB(ppSb5ARHoRvQl#D zV8rVwF3Z}migSyZ!k+-MK~MSC%HF1*%09GdrcftJe=uo}O41MKG{0w>1$dhFRL#`6 zS*NO$q&H$$NXmadIh0Juewq(TNiWiZ~}KGD0EkWobq)|Uy z9FS0R^f=b3iA~H^qt?H*-P&scynkSMb>{%)+?lDy9*KB}lhmcs^OG3la`$m?yDe(z zU#A+@z6eAW*u0L1?s4_gp&ahveP!j|FU4^=KBZf2iY|X17lqMuOxF=z5z2QLW9k+j zx0H806hqfdQQ1PJ9NaSR&+UaIS(mO_NCU|6MH?i8qy%dO#AN-DEu*ORscJkSb*RR; zR049XJ`Gjb74F>qOYKEhDqk!C+wTN8=;IybIYB}92GSSEIBwT*Bcd)M&IGk%@!E)G zW-Ox6b!dM}aKj+=nu9hd8b2LQkcBA9<<269U?kqR%LXd^lG)>m4oP+=;W-BmajQ=C zszEqUV|#So2j}eA3JWeVxmI$3FJTVaP#03N4$Fr{nAT^Q+h2rd#ffW<*w3yQiG$V( z;M;GT5ge$OFAsWTZOboySO=5*v)BK??uOp|neIQX6>Opo+7Y94e z-Eo5E=IW)7Jh2=in{PENi6@taby|{x(XQvIS`*%S8uH0q!caO^>rff5qw3v-^xz^1 z__6GTcUa$B^@mfC9q>LJrU%b$J7o6kj2AxSZ>cQX+>e0_V~}k-3hCKR!eUko~K%&Edk8| zD9&8C8&aJ!PIDfb!+~tB?V>65AOQ`V)$kc*D!HCPb>Xy7laQ}VZuzi$!SYn z_dR}|L4$>t;8KC}Ar_d4owtoE#iD<8U9Pz)H9qztYJZ$n1n9UEG1c=|&|4Wes1B#k zzLKMj9iS4^)V7GgJTkQlmmg02tesiKO;B0j__o<~zze zC3F>8cdZn{8MbH8{RMCRPJr_v z-dKLAPTw4Z=0o0xoSiJ!P9P|u=HX4+?W)_;gf#AgBv+vJt+l!O-UE{xBa;mibf+y@7K~e4R5CpjOq1VHcfGwdRXG ztp4q3{nX|8?>;tH9P-buqCn-zfF(NKd4QmtaWBDD0mVimkI;XOV!omB-VZ5CwW;Q+ zt4ijBn>SNk7Kjx|$|U<@S-|e_j$6tJ-RZI2Y@f+0(|YAZ@bUIw;=sAb>SkJW3j}U3 z93fH`HXpWH?Ssfs>52j9t-`gsqBxFoDfS~!Jm zZ|tfzBEO*1^y`1Q65mhjavg`rxt)ouGFzyR`i4M4=5V6o?pxF9CWdmRNq_*Sy-<1U ztF|^yoiZf|o}%qr+W!!KJlwwJs<31Id@1)Dtk~Umfp}{B_Ns4PE-59M&Pj$-VWP+< z4@*Wh2avhR*1EM0q2z?_Ix-2ynwS*<{*cE}(%$TZNArI@0Lji$Lvq?-_lL&=kvw!R z)!$cfx9I9ze9kZZ#GeW9cz$l7XGa6K>^rwct3k)kcmcpmAcJyk(RXoZP$AfkQ5_ql zv#%zmk*CEyx(u8gs-!9!4KZ+F;>pyXPJgrW z1T$$Eo}F$;?IY@jRh?^6LT$zB%7NoskIoC#DKuEAg5R9L5pU&;vXYe?&NSL)rfM$~ zwece{VuCM;K-|S1ul#TS?Z5u_|M5Tn%YXXkzyIU@fBzi+_`m=8`d|P1%OC!qfBfU$ Q|M_qK9|y%w19;640Ja!)vxJGs1muv;8pRk~=unR0El98uW%mrDj?1z33ys zYj+SP1yvuwZ8^hCx*zI#%*}d?n>4hjqpekB`Zm< z<}iq;G+p#om>TC;gMm=F_2T+vNF&@|qWtgSKqUy?HHbUxJ+N9-RZa@;KqHi{ci_kY zw>4EWgXA8n*aHf>#rD}?|BmSbSqK$`*~5;H&gc2zz4JhRjeb0?fOGj{jNPdKtK*jq zf8C&4%+J%ZA#(;d4T+fB?+(}m6CBlPDP2-|DEx%PjNoXmY;2`n8?y5n=_188O>6mF z*)_n^VIml_CY2mWeIX`4eX2K6-L5*jO-i^vC-h4VBEBTk;~SmYwR2f8Z|gX3CgVkaoiIzSF3=cTNQ=qpauvlf7^a(e9oitJW7TwdO@;oJUXB#hq1*UYPTTa zHc1A{MN#$z75`z?9G&j?vYlWzF|&tlE#KoLt^+vqoiD0CS1#~W6&y^hTa_Y0LvPFU zt4RqHdG-$f(1(TS3H4Nha1D)jo;~NulY34l+uLXZGV%q>{~iv!&i^+E;jGc+e~cTv zlu%J0r@lQGTink^RC7Fp$7&yE*$xl(OF(#TEvln&EiPT)q-Qr!;3}65^u}MrRZ^m4 z!y}!Onk$Y8+`R~hJk#MG;SkgsDbLT_XKd7BEy0C8bueS5i0JV2znSCe-=eeT78BCpmrRiU5rOS|#JjDYfBpyy)sze|feH;ZOk9 zDc*5t|ETFuAmq9o57OH<>X+`#Zd!LGBKZG3hVJwqeJC8J-S9Z7IrZlJKVP0!eK{z8 zRBTQ~@NQSn;1ADS?oh%!m&Ra0y}C@+BUW@>#g56_YMMoBV65N*#85p$V$~%5JLXx6 zv^UO{?oQ6o=1EdV0JoQCe^!JX6VcRoTR-S@SEWQfaTY|VhH@+66SnVaD8bUTzUzm^^dp?(P#o48r==WMe{~_3QTb21$O}}P z{Zaj_)cXdTYlyV?C!nEIu}%~d$aNtmwew8hzHJt}n+vA_4g!i*MqN92*hxx6x2jXz z8P}Jm^>P*dkW7y&e?<-WoGjN^>2TZRIpGb57R(dPM|wK1U|64OGal^ zSH`MDCvJT~5b3q(^T89V!s4p}Z_FMssocl?AtZ7yh$FeyZ6b8KY`}9QfVHl=4ngYF zVAyQ}l@Rg)ZOYCI!dz_FbWRh<`-VcMBiT9NsPe5~G?2%(4Or5<`?^Ju4xv+*h$>Cv zEL!2#lgKW;f8lH<5ihvEoEHvfby2dbD9V2cq~SCZ#2}QX!dLulT+5|RTUPUn= zWFbJVfAMnQtK?Mz?w3mQ@8LkJ{vQ)bfaD@#do;i01Gwc8wW}gPa*bSmSE#byigT~5 zjt=45Vw#Gi(GwC>sdWpCKniOmFC2$^J>a)J)*%YJe}O>HF*QTT+a8?g23>z+d3Si1 zl4$TjC7i>>9SIyRxdWd=wJ-h8Z=yLV?`mNTL%v<-&?H^%&~R@Y&+ZycM_}xwA>J05 z%E^;xhd`fJXIJ$&RE>Z)|0O4;A1wbdV`JjWZH-$4%=6|f7*a`JsA(>Va@87|yeww?3C;7aw~f(!x7I z24c~mfXB2rL*R!8F8!H`48SRRxA*#ZZpAkg{;q1soCnE2U$=WdcIF@T$1WF4-u6dC zbOHjb_*4_2=#3B#cPE~`n!s;)+}E^QO;qQokYyvxQSnl{+!wj}=_<@Ca|;QBHSsUX zfAKVR5)O^Utwc^8Qzh!Qmw_PNaYwl0-#@MNns$>wzjLDMkvxt}FuLppYpY}t?YYT! z!D>Axt7#T0Yt`(7$aOb?G+DtGAi&>h0Qgf$;K~^n48i#9?EPi?;Y4EorBAU5afw zRG=kN&SBfjWgu&tagRG`T)UT-If1IADD|;R&^{`6RlzXc>r01JdlGPtHKCo4f8E98 z?{i78@mN0HIis#AX-`BC7=nE@WhfFzTyZG!ZjE-NxdMy#32qDJQ~&~Wcx@8m$c*|A zp;^dTykQ44U2`}Or@5+n8Ar4m1m??56mz4jI-Osh*6*7bTlz2}QxFhpy_S{$$}+*< z6y<+ZBKMQ*;!Sc0ckKD}yhY%(f6cz5gIE^7l*8uVO>0hE({M!XIHUVPhtBG-YLEm` zx$%APrT77v>V9|jn}ZfNR|CYNi!q?fb*e&!-jw0A^r03&uuOTWmr6QV3nZ(wUQGqo zIewQEh{L)x65!g1T!yBw85s2u-YYS$P*pw$M{907gH*pft=}tm<%3lpf9@cq1{Mix zJ2e1>w7Ga}x{`1sVR4T~xmZwkpQq*v4#bJ7gww;J)NAS+njJu?x7(CFipmAxYpH4W z6tzFn7L<(cb^t<20zHM}ElMe5OtwXB>??pW8t1h<(%yNvajgNtW%6%L;W*+6k7xij zH1E+w&dn=@5pqvDshOE=e+Z@RxGLpr&aT!K3BTGpDZnvQ$1dxSYG8TAE&ktkP6XCy zuG_W)jD{$Ov+vQ`4KGF-k<%GYLV54Y=hj&)p{=ru)jPUpXsm{2v6 zP{iScF{uZqxvBNnCzdT1LgM?$iOu~S$qmK; zF)x==_?!)%ao5*D-ZNo-Iw&gd!8t0>MW@&+ESzt&dH|2{YxE>?lM=pve0y5)w|vH@ z{ZV$)3yhs%qI?!ta4Zu$6AoC74@tmglsh>5oP5JcPcwMrrRY4bh%YJ{WvhbP*Fdz?J9zFoJZb|U9-n@MTQxS&v>;*=9M z5S`G?S0HH;{iaAn(QyIVZ>P=Nv@& zn9}{2cH;sl-3>xI{O)|=OYlqJ0xyhoc3bnrwN%t#iOTwFf8OOd?6d|B64oTS%hVF7 z95Se`bvrG6T9yU8A2_-H(2E2+p_!lTY**J+9L zyMi(3Rw5lB0|xUbCH2onv1F))m%LThL1dulCCxY9X6IV82@pDPt9nNrf(6^bwy z@$b|a#${(7W~@thOm4%{tx!L3H(!csibTnLzH1Nz(xNZ`q0I$~sTG3e1t<9;j>q;b z5b7CAsJaYLE>WN4H&X6&X!>%B`5~OeXi=U&jQi16f0HEeSi>uITES-yjgZXX032au zcGvpyw0_I}d@d*s*wQw#a1PV%8pQ94njhqlr{>ki@TQ)elrA;ELyabw%@mM96W{H}TU)(?r&;jxB5- zo(mT4e;dZ3a{}*esN!cOgFodqO=tDhBkNAc4)@)67?{WM&8-KBba71;hX}5oXmqNO zqjL9Op4MwhH+?MnXe_-r@s<-Emsj$Ks~Ih*Wap|?0)&)2p}Fj~)btCk9G-dEURg!0 zBcgZ`@)7WRRE^AK*lbDOPUzSQZ0okyu}!0K&8%9x)ttqphMB6;G_i!h?Ge7RP?%T$K2__lh4cr+^qY^ zUYrV9DFp7-x2N@z@C@&YjUD#Vlr@g(f4y3_COU14EJ#?b=hFO~*P>YMsdwYlIQ9}l zXFY-~r}S=VKDES!}V;p$fRiC{`4ye(?_bt{_>q2UEK zBAYX+gdF}r2~K!6Amh|+Ap6S*RDEeBMnsDb&)@`VX7{?CVHpP9wh=`p0fS|Ue|9%v zq~=(-KU&RnULxr0vf2ObX}x5BJ_P2Qjv!-MiPMJ}1f$^>576e_<05U++pH;r)Cts{ zrJ!|31JgIvn8w{jk<&I%fjooWZwO-GkDlBV;C?hH=amp>r(2&y>0v#CC;r}C*^U;g z`BpmD>)F=QvO%3`NX?Ds523R2f0+r9(sYIRb#`&8Dg<&i@3M)BL5!f7blZ0iGr3qp z)VTE0i1xC!jhd?o+?S$=+VdqR9zU`_@291guMsja4Vn zudPB5QUBO*aZdXL(WK~b7c@uc#k(G)=e(48td;@Y?&RZTchDBcj0>b`C=?L@t$hMCDB91n*_RQe;#Zs*5ku!Dru{0VSn2nfX#fniRn+f$?A}FNv_+vY4|9Ok&Re>T^-y%<@n2MO4l3zt_Hfck&70qW>oT* zdv=E{UeyYo!%_%Hl{D*m?(%cpNjPDnN819xTILON?e4X04>c9GVCK;LuT^n}T6yv& z?dke2w7c_ef33^@R0H{+dFp2oXUbd|)ZIo)uA zL#*T=p4Um}a-HZV@Mw=mzox?Z1l*KwW>fp!v z^T=M#Lk~r`Qgj3PP(vRO1J{n>ZIkPkr@rnQF_D8w(aB*WD1kKS;drY$#!auc46*2J-YRa2lYWBDL_Q!;f0w5N{Z3GeoVQxOayo8ue7lMDg}2`G z^37S<3F&fC`&WB`Bxo6=Ul8JT>MPP=W`KO|$m2>SNf>y}lWK=uv^cd-x?zRYsg}zR z1xr)*LNjZQ6_jaNrCNzs+e>X)dN#!oetJGzb_F*6I7f9(fS98i3oNdg6B&uRE3kt&ieMYJT2co!1TG4e0o}ONwOU$ zw~X|d{cqsnq>3^2(6d99deF7%gtor%f24{-1K0STq%4=JFnTj^BCaY&S44VfA7aZCReV`eyfzsBZ|b4>P>fyj;FnxfdcHsd-75|%lx)>@wB6g5L3}>0EVqa zzTUU9^&{c=aT9q&C98?1I#06Ja%WzYd*?hMuFV8A1H_1IhlaU&=c->GgZKa(f2qn% zQ+b}(XmKVe=p$6FhhyNQDjmyR=+I9%@}6PX4rc(Px4`@rvj13t`S$Wb+Y(>Pw5_RU zsssRWFxfzK{0c&9rpw6#D{^o!$n7xwPOP4EN81%h=bG%+8p4aT=Q{JSif5SIqO>OCDeIXOqO+_3vt7u9=t2gT86O46e{B4Qd zA!j$`39nh`KsuXO9kq*GasZ-%{VTqWT`0us0J-1`i&!+Hhj28Vt+!H3EHK$(T z!Uy>eX6)8a*4oXRlh?=L3?MLmvVo~9IE(?!DOo9by!)-&CL7UESvmDn@gP=|47G0R?7AL%e zw~w#E$_{m)FYW3axnExp#7n}nee|k_Dh1p0$%_q<2UM04dne`~Y~flKZtMU4%1iWGh*7G?=w8U3i1>wN>tU0-?IA0_g}rD}%z zPBz~)6$w@?vW+O>sPny{C@p5cTaT65PEzZkqtsID+A%k$Gur05x^WynG%?n#S|RUl z4ed8l1tyaA?-EpH0Q-J>S}zIDkG*Q>Om+MS=2BrTV)kK8e+!JN*4X3x?kxb54U*+G zmsr{h)n2r1FrBZgF)Vk3!`~)Z-5lDL^|XMmN)A7D%U%;PQynhOQGlKIcU}INyyX>k zv0ruXMpTU>SZ3?H0NO=lmiDePieyi$5nWu!D69pe#qpbsIS zyPb1)Cz<30f862D2UBhE{a~8)s5|T7NV_I4(8m zow9^RpNh<=5>$ykkhTG7(=EeUu`f^S$DH$H&*zj##XV2ya9Ze9GRLV%s*YF4kfu*T z>63>O^$bC_5(BPts}niY%7of9PR``N106fhrF{7zp|<3!JkRa=r`|O{@B}j@J(4-z z<^>xIf5B&Tby>=dSfdTP8+9eOF6DyP)f^2!^=jrDRkx00iSuzqBAk^Jz~w3`HWl@{ zMAS*)0f*ehj#0Dps$b`s`0AQwlSXR)^0Z#oS|4)|prd{|wFbrK;9gHr1U)5Wi2_bxpD{!aNk5D z00>VxzUBDaHrN=y#O!Pf@baMlCB%nZSD&baKq6S|?S#<%#ctwW_P#iaBLK@9w`P({ zl;DWFMx=^;<3<+g$8cIylL?o@wf*71Sw(VY;LFqcjpb{7=fnoUbFAP_iVxqM^pnS; zf1c)YoS0A@wwX9Uc=3jM<%Ph8H7LKDxev@WNce(B6)=w32x||x)tY76tH%7M?N|Xm zPnsZBFtEyaz|Wt~{!!gB0jGuSW@+3ZNxNq1KBD^V3IVR*QkA90^U!Ek-?XbLv~`Zv zkK3&MfYysJnBg=Jk>zq(J z6)?sTxf<6#6yW`fU;48typ(Sy_7T*$UfJejTMF;$+D#haS-PF2Jg+864sikGe;g43 zR3z<>qXDfyMZdk<75}A)R3M1m_B~0I#L`_0u{WYPT+Dq;O+2{Le?G0BDcujXGA9VG zJvXWs6)z9Y0Am9Hf>fYTkJ64&IhyLmC^xn`CDfJafH`*eey^>?cPjn~SQRJEQ}sv} zdo^90%L5c;oPu+oe(Hf9X%$O52;wjd4Khtr636DnG42>ZSb{PtchXVF-W5 ziD`N(fy#+eu903&&vFk*EN-_+^slJktOc&1Y9jYmwLpHjUrFTYgXJ-USc}^>o7U)CU&w$-jx$vqR%H1=vR9 z1%91$ri(m{vp6DkI-4;Y=to;`B5oxQ4Oo-HMev_!J<%!CsopM>DB4zh3|*>Pp6Lsg z|2?G(y8hTtB-weK)^J*te}t9w6~4Bq5^st4?_g}xZKD9*gM-Qt9VpwQcejF9d-qQN zV3FP=NA9=KzLi%8?t23Pb$QR?7Rmy^Hr94-h|^34Fbsbfrx zPv*R{k6rj>0XId28wBo2(`e}|EO=&)B@hZzvK z;9$eIr}e7Kf7pBHEy5gkb;E`71p>bh9f(fL@s44|=WKm~G9KOGv-h;Snw$9F(?K(* zfYPZw2d60lS5?Q<1WXI8Qe2BB1C{EUkjGG?pl7=Jv)Wr=UI8T)jzKLBDyodh6L4dW z^s+=IpLb+E$i5j z>8o2DCZPTO(>mXV)gS0oZFudCw}!OUCFOyY7$Iz_uD^KE7M{W08pB=yP3dVnbW?B> zAUe#{qk9hIOr0{IjS#N^lO095n|v=d2F(Xtr=@8he<9%le|Yp0<@pmu+qf&;J(my^ z8(AJuvS)Fj>F#!#+_EQVWyQpm)B;V}vLu~F>K4-~~CS&@98%Rk}@*HR@ zQ5^)QWwx#hi9|ZDFHbA}Y1^i-j?KZa)z3+6d}CF74o6YTww2$1R#f`dJkj#=0zLq~ z6_M24+f@tjf6fDz=Ikg$CD%;JZM5o)8wYQylMSMV5Z&(5l7WfF_fHL?1Q&OwBj(Zh zSD1ym+5Gjy=5`nL16^o1c?#M@SlCPEm*@uNEL+aG>Q-DWBPrY;t)NAfPzs1y*C@ED zYb--8^)o*1 zR8%dRECypyQh2%6No4joX8~JqdQ;aNj#trMox?VDF_{*yUFqLGmO=kV4W;!w-VaxU zLf3=9e|wIXaE&aOsigE+NBVXX^UJpFofCPbaBx*GFY+8XPF;bhArR@yO2;BZPPMSO zdu2JeD6HdYnrpKlbH} zuI+&H_*HJpCm3ECQb?=|VBp9vyBO!swA=A%t;N&f$SBH0H<7l zv@7p}vq%|hR51!r-*ggz^jIdHd@`bfe-3%Ji00Al=p7cGc-S@qp`wbh!-s}OPN#Z} zVUj4{<^_(J1lRO7MCXW(r&|LpV5~MhJ@r)L#fBRYytsSY)NuoKxFcjE=O`}VuHvt5 zDnF@-b!znv4}o42K;yA_bX181PIW37?~3i;Kdt)ST!|m*8CKO7@kCc4_mC8&e}N|) zEkm%U$=fn=@y#Upo_L^A*-#94*)vp>L5- z9wmnP%3L%bITzJ^T6;Ife6hI$fB!W=KF8cAqLuaKX}vaA!kZ`RTVVOjVM(=qnj;Wy zO!5!EI6V3%|5^VfXeZe9f^s`L%B$i_QPr6`*2lzkZ!0Iwr5z=s3pyccMc z^E)(0Bp5d9VLvlAyGmu%k#ogE;omml9HE5}<7^OKKW7@mK1!Mg)gx^T~LzkNsnVsdX_zCV|C?6TYd=lQ4@S^V6eN z0d!mManJk{E3_a20eoobe=7e_TqSg5t7?9k9S@9=qXZluet{7mt7ngTF>nIHq81{> zeOGPPm3buS6Iop%BfvY|b@A~Cdc5Nq?shokZWpfW?xdqh=AgKB`sHc8j9))=nw9UF zv27t+&FVNzO>sTNh7M@Gm3DxV8=KBs@KiveoDQxvT1+zUSpT(Ew1A6!WvotAbs1GQ|!gSDSG= zROSkjR1V&TyTP3EYU3<9HV~h?cz%mpubh~V z&n^Zbf^<%9AzK&%fBkN-w63)xm!qjZ=dP&bG^p$_z`E_w@4H=V+AbDTs2F?cn=@J= zByT?&k7v~3mat~`hX0$a-MG08TzY1EcQMYT=(0{-UB~R`b~NYtbh>76f-l_#-GhM# zKX*BsA{LInWw6)0n|_$hVZX;Ekp}2=z}5w$0B=i*B3T}Tf4R@$uEA6H3J%%ay4{zj z_0o3xFpGkj<{4d(AF$G!H$Lsf=<{CB;2kh3J=%S{yw6S1^Ecf9GLk$eMd1kI^EJ74 zRdbD0w9j;&5v+LHc65_kK}~>S;u|){nN$qY!1%otb;r5g9^k8yQ=>Q3>4cHZa>vIc zh4-!3D%a4ve|kQh-&zVsRy|`L?X6azgJ&1u@4g+@bM|uS3uK_Rf&^?efbvhu!n?pV zb6nS#r&VA5#P)f%fCE~_WOqemHEJBWR0?(*#RWX8FFdWhw8gR7XZM1%VyCum7vbgn z8b^KWt?vRo8IR-!vJ*yVybUYV`0KLnb^V@+CceI&f0h+xr4$YebhhS0+Mft052fNw zn685jisafy)BLjh8tnnUINTI;GOP!L2_krI6D44yb=OkVeva86yp)3=OB~e#g8dpt zs%HE0w0`R}A0Ksj^Go186U|)-IG(nOzHnAU2xTO%rPJo_WRsAAEV|yRT&Ri|+gU~V(=p(xq&{g;Yc97S9ZsO8uKoOT#z1_oAh0=$v zS(}H0;fD(J+O3y*bVX=f7YN%H{#3%R+lHCiIe>Uf=&tyYdq52-m>6}l2>Vt@|1)o{ zE#;2RUdliG>%aWlzyHTS|Ks2O^4I%+|JMKd8$bUv|MS1T{NaE9^{;>V+dupt%2W-! H;I$9{JXt(4 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-09.xml new file mode 100644 index 0000000000..874e12f86e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-09.xml @@ -0,0 +1,67 @@ + + + + OpenSSH: Remote Code Execution + A vulnerability has been discovered in OpenSSH, which can lead to remote code execution with root privileges. + openssh + 2024-07-01 + 2024-07-01 + 935271 + remote + + + 9.7_p1-r6 + 9.7_p1-r6 + + + +

OpenSSH is a free application suite consisting of server and clients that replace tools like telnet, rlogin, rcp and ftp with more secure versions offering additional functionality.

+
+ +

A vulnerability has been discovered in OpenSSH. Please review the CVE identifier referenced below for details.

+
+ +

A critical vulnerability in sshd(8) was present in Portable OpenSSH +versions that may allow arbitrary code execution with root privileges. + +Successful exploitation has been demonstrated on 32-bit Linux/glibc +systems with ASLR. Under lab conditions, the attack requires on +average 6-8 hours of continuous connections up to the maximum the +server will accept. Exploitation on 64-bit systems is believed to be +possible but has not been demonstrated at this time. It's likely that +these attacks will be improved upon.

+
+ +

There is no known workaround at this time. + +Note that Gentoo has backported the fix to the following versions: + +net-misc/openssh-9.6_p1-r5 +net-misc/openssh-9.7_p1-r6

+
+ +

All OpenSSH users should upgrade to the latest version and restart the sshd server (to ensure access for new sessions and no vulnerable code keeps running).

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/openssh-9.7_p1-r6" + + +

With OpenRC:

+ + + # rc-service sshd restart + + +

With systemd:

+ + + # systemctl try-restart sshd.service + +
+ + CVE-2024-6387 + + graaff + graaff +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-10.xml new file mode 100644 index 0000000000..980308027f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-10.xml @@ -0,0 +1,41 @@ + + + + Sofia-SIP: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Sofia-SIP, the worst of which can lead to remote code execution. + sofia-sip + 2024-07-05 + 2024-07-05 + 891791 + remote + + + 1.13.16 + + + +

Sofia-SIP is an RFC3261 compliant SIP User-Agent library.

+
+ +

Multiple vulnerabilities have been discovered in Sofia-SIP. Please review the CVE identifiers referenced below for details.

+
+ +

Multiple vulnerabilities have been discovered in Sofia-SIP. Please review the CVE identifiers referenced below for details.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for the Sofia-SIP package. We recommend that users unmerge it:

+ + + # emerge --ask --depclean "net-libs/sofia-sip" + +
+ + CVE-2023-22741 + CVE-2023-32307 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-11.xml new file mode 100644 index 0000000000..247f229724 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-11.xml @@ -0,0 +1,46 @@ + + + + PuTTY: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in PuTTY, the worst of which could lead to compromised keys. + putty + 2024-07-05 + 2024-07-05 + 920304 + 930082 + remote + + + 0.81 + 0.81 + + + +

PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, along with an xterm terminal emulator.

+
+ +

Multiple vulnerabilities have been discovered in PuTTY. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All PuTTY users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/putty-0.81" + + +

In addition, any keys generated with PuTTY versions 0.68 to 0.80 should be considered breached and should be regenerated.

+
+ + CVE-2023-48795 + CVE-2024-31497 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-12.xml new file mode 100644 index 0000000000..4834b8028c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-12.xml @@ -0,0 +1,56 @@ + + + + podman: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Podman, the worst of which could lead to privilege escalation. + podman + 2024-07-05 + 2024-07-05 + 829896 + 870931 + 896372 + 921290 + 923751 + 927500 + 927501 + local + + + 4.9.4 + 4.9.4 + + + +

Podman is a tool for managing OCI containers and pods with a Docker-compatible CLI.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Podman users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-containers/podman-4.9.4" + +
+ + CVE-2021-4024 + CVE-2022-2989 + CVE-2023-0778 + CVE-2023-48795 + CVE-2024-1753 + CVE-2024-23651 + CVE-2024-23652 + CVE-2024-23653 + CVE-2024-24786 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-13.xml new file mode 100644 index 0000000000..d988629f65 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-13.xml @@ -0,0 +1,64 @@ + + + + WebKitGTK+: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution + webkit-gtk + 2024-07-05 + 2024-07-05 + 923851 + 930116 + local and remote + + + 2.44.0 + 2.44.0 + 2.44.0 + 2.44.0 + 2.44.0 + 2.44.0 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All WebKitGTK+ users should upgrade to the latest version (depending on the installed slots):

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.44.0:4" + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.44.0:4.1" + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.44.0:6" + +
+ + CVE-2014-1745 + CVE-2023-40414 + CVE-2023-42833 + CVE-2023-42843 + CVE-2023-42950 + CVE-2023-42956 + CVE-2024-23206 + CVE-2024-23213 + CVE-2024-23222 + CVE-2024-23252 + CVE-2024-23254 + CVE-2024-23263 + CVE-2024-23280 + CVE-2024-23284 + WSA-2024-0001 + WSA-2024-0002 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-14.xml new file mode 100644 index 0000000000..4037c006b5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-14.xml @@ -0,0 +1,46 @@ + + + + TigerVNC: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution. + tigervnc + 2024-07-05 + 2024-07-05 + 700464 + remote + + + 1.12.0-r2 + 1.12.0-r2 + + + +

TigerVNC is a high-performance VNC server/client.

+
+ +

Multiple vulnerabilities have been discovered in TigerVNC. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All TigerVNC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/tigervnc-1.12.0-r2" + +
+ + CVE-2019-15691 + CVE-2019-15692 + CVE-2019-15694 + CVE-2019-15695 + CVE-2020-26117 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-15.xml new file mode 100644 index 0000000000..fc4f96ecc7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-15.xml @@ -0,0 +1,42 @@ + + + + GraphicsMagick: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in GraphicsMagick, the worst of which could lead to arbitrary code execution. + graphicsmagick + 2024-07-05 + 2024-07-05 + 888545 + 890851 + local + + + 1.3.40 + 1.3.40 + + + +

GraphicsMagick is a collection of tools and libraries which support reading, writing, and manipulating images in many major formats.

+
+ +

Multiple vulnerabilities have been discovered in GraphicsMagick. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All GraphicsMagick users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/graphicsmagick-1.3.40" + +
+ + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-16.xml new file mode 100644 index 0000000000..e586167715 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-16.xml @@ -0,0 +1,42 @@ + + + + GNU Coreutils: Buffer Overflow Vulnerability + A vulnerability has been discovered in Coreutils, which can lead to a heap buffer overflow and possibly aribitrary code execution. + coreutils + 2024-07-05 + 2024-07-05 + 922474 + local + + + 9.4-r1 + 9.4-r1 + + + +

The GNU Core Utilities are the basic file, shell and text manipulation utilities of the GNU operating system.

+
+ +

A vulnerability has been discovered in the Coreutils "split" program that can lead to a heap buffer overflow and possibly arbitrary code execution.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Coreutils users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/coreutils-9.4-r1" + +
+ + CVE-2024-0684 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-17.xml new file mode 100644 index 0000000000..ce7d5704e6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-17.xml @@ -0,0 +1,55 @@ + + + + BusyBox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. + busybox + 2024-07-05 + 2024-07-05 + 824222 + local + + + 1.34.0 + 1.34.0 + + + +

BusyBox is set of tools for embedded systems and is a replacement for GNU Coreutils.

+
+ +

Multiple vulnerabilities have been discovered in BusyBox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All BusyBox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/busybox-1.34.0" + +
+ + CVE-2021-42373 + CVE-2021-42374 + CVE-2021-42375 + CVE-2021-42376 + CVE-2021-42377 + CVE-2021-42378 + CVE-2021-42379 + CVE-2021-42380 + CVE-2021-42381 + CVE-2021-42382 + CVE-2021-42383 + CVE-2021-42384 + CVE-2021-42385 + CVE-2021-42386 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-18.xml new file mode 100644 index 0000000000..ea2c242f8a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-18.xml @@ -0,0 +1,42 @@ + + + + Stellarium: Arbitrary File Write + A vulnerability has been discovered in Stellarium, which can lead to arbitrary file writes. + stellarium + 2024-07-05 + 2024-07-05 + 905300 + local and remote + + + 23.1 + 23.1 + + + +

Stellarium is a free open source planetarium for your computer. It shows a realistic sky in 3D, just like what you see with the naked eye, binoculars or a telescope.

+
+ +

A vulnerability has been discovered in Stellarium. Please review the CVE identifier referenced below for details.

+
+ +

Attackers can write to files that are typically unintended, such as ones with absolute pathnames or .. directory traversal.

+
+ +

There is no known workaround at this time.

+
+ +

All Stellarium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sci-astronomy/stellarium-23.1" + +
+ + CVE-2023-28371 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-19.xml new file mode 100644 index 0000000000..2c2a729489 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-19.xml @@ -0,0 +1,59 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. + thunderbird,thunderbird-bin + 2024-07-06 + 2024-07-06 + 932375 + remote + + + 115.11.0 + 115.11.0 + + + 115.11.0 + 115.11.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-115.11.0" + + +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-115.11.0" + +
+ + CVE-2024-2609 + CVE-2024-3302 + CVE-2024-3854 + CVE-2024-3857 + CVE-2024-3859 + CVE-2024-3861 + CVE-2024-3864 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-20.xml new file mode 100644 index 0000000000..84856ba834 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-20.xml @@ -0,0 +1,48 @@ + + + + KDE Plasma Workspaces: Privilege Escalation + A vulnerability has been discovered in KDE Plasma Workspaces, which can lead to privilege escalation. + plasma-workspace + 2024-07-06 + 2024-07-06 + 933342 + remote + + + 5.27.11.1 + 5.27.11.1 + + + +

KDE Plasma workspace is a widget based desktop environment designed to be fast and efficient.

+
+ +

Multiple vulnerabilities have been discovered in KDE Plasma Workspaces. Please review the CVE identifiers referenced below for details.

+
+ +

KSmserver, KDE's XSMP manager, incorrectly allows connections via ICE +based purely on the host, allowing all local connections. This allows +another user on the same machine to gain access to the session +manager. + +A well crafted client could use the session restore feature to execute +arbitrary code as the user on the next boot.

+
+ +

There is no known workaround at this time.

+
+ +

All KDE Plasma Workspaces users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=kde-plasma/plasma-workspace-5.27.11.1" + +
+ + CVE-2024-36041 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-21.xml new file mode 100644 index 0000000000..12c0a2e5a2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-21.xml @@ -0,0 +1,49 @@ + + + + X.Org X11 library: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service. + libX11 + 2024-07-06 + 2024-07-06 + 877461 + 908549 + 915129 + remote + + + 1.8.7 + 1.8.7 + + + +

X.Org is an implementation of the X Window System. The X.Org X11 library provides the X11 protocol library files.

+
+ +

Multiple vulnerabilities have been discovered in X.Org X11 library. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All X.Org X11 library users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/libX11-1.8.7" + +
+ + CVE-2022-3554 + CVE-2022-3555 + CVE-2023-3138 + CVE-2023-43785 + CVE-2023-43786 + CVE-2023-43787 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-22.xml new file mode 100644 index 0000000000..10eb68b467 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-22.xml @@ -0,0 +1,72 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could arbitrary code execution. + firefox,firefox-bin + 2024-07-06 + 2024-07-06 + 927559 + remote + + + 124.0.1 + 115.9.1 + 124.0.1 + 115.9.1 + + + 124.0.1 + 115.9.1 + 124.0.1 + 115.9.1 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-124.0.1" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-124.0.1:rapid" + + +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-115.9.1:esr" + + +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-115.9.1:esr" + +
+ + CVE-2024-29943 + CVE-2024-29944 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-23.xml new file mode 100644 index 0000000000..3015033820 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-23.xml @@ -0,0 +1,48 @@ + + + + LIVE555 Media Server: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in LIVE555 Media Server, the worst of which could lead to a denial of service. + live + 2024-07-09 + 2024-07-09 + 732598 + 807622 + local and remote + + + 2021.08.24 + 2021.08.24 + + + +

LIVE555 Media Server is a set of libraries for multimedia streaming.

+
+ +

Multiple vulnerabilities have been discovered in LIVE555 Media Server. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All LIVE555 Media Server users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-plugins/live-2021.08.24" + +
+ + CVE-2020-24027 + CVE-2021-38380 + CVE-2021-38381 + CVE-2021-38382 + CVE-2021-39282 + CVE-2021-39283 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-24.xml new file mode 100644 index 0000000000..118703bb07 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-24.xml @@ -0,0 +1,48 @@ + + + + HarfBuzz: Denial of Service + A vulnerability has been discovered in HarfBuzz, which can lead to a denial of service. + harfbuzz + 2024-07-10 + 2024-07-10 + 905310 + local + + + 7.1.0 + 7.1.0 + + + +

HarfBuzz is an OpenType text shaping engine.

+
+ +

Multiple vulnerabilities have been discovered in HarfBuzz. Please review the CVE identifiers referenced below for details.

+
+ +

hb-ot-layout-gsubgpos.hh in HarfBuzz allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.

+
+ +

There is no known workaround at this time.

+
+ +

All HarfBuzz users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/harfbuzz-7.1.0" + +
+ + CVE-2023-22006 + CVE-2023-22036 + CVE-2023-22041 + CVE-2023-22044 + CVE-2023-22045 + CVE-2023-22049 + CVE-2023-25193 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-25.xml new file mode 100644 index 0000000000..4b13514271 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-25.xml @@ -0,0 +1,48 @@ + + + + Buildah: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Buildah, the worst of which could lead to privilege escalation. + buildah + 2024-07-10 + 2024-07-10 + 923650 + 927499 + 927502 + local + + + 1.35.3 + 1.35.3 + + + +

Buildah is a tool that facilitates building Open Container Initiative (OCI) container images

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Buildah users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-containers/buildah-1.35.3" + +
+ + CVE-2024-1753 + CVE-2024-23651 + CVE-2024-23652 + CVE-2024-23653 + CVE-2024-24786 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-26.xml new file mode 100644 index 0000000000..8c4b0b7ae7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-26.xml @@ -0,0 +1,42 @@ + + + + Dmidecode: Privilege Escalation + A vulnerability has been discovered in Dmidecode, which can lead to privilege escalation. + dmidecode + 2024-07-24 + 2024-07-24 + 905093 + local + + + 3.5 + 3.5 + + + +

Dmidecode reports information about your system's hardware as described in your system BIOS according to the SMBIOS/DMI standard (see a sample output). This information typically includes system manufacturer, model name, serial number, BIOS version, asset tag as well as a lot of other details of varying level of interest and reliability depending on the manufacturer. This will often include usage status for the CPU sockets, expansion slots (e.g. AGP, PCI, ISA) and memory module slots, and the list of I/O ports (e.g. serial, parallel, USB).

+
+ +

Dmidecode -dump-bin can overwrite a local file. This has security relevance because, for example, execution of Dmidecode via sudo is plausible.

+
+ +

Please review the referenced CVE identifier for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Dmidecode users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/dmidecode-3.5" + +
+ + CVE-2023-30630 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-27.xml new file mode 100644 index 0000000000..8848a48c54 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-27.xml @@ -0,0 +1,46 @@ + + + + ExifTool: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in ExifTool, the worst of which could lead to arbitrary code execution. + exiftool + 2024-07-24 + 2024-07-24 + 785667 + 791397 + 803317 + 832033 + local + + + 12.42 + 12.42 + + + +

ExifTool is a platform-independent Perl library plus a command-line application for reading, writing and editing meta information in a wide variety of files.

+
+ +

Multiple vulnerabilities have been discovered in ExifTool. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All ExifTool users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/exiftool-12.42" + +
+ + CVE-2021-22204 + CVE-2022-23935 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-28.xml new file mode 100644 index 0000000000..67adc3da09 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-28.xml @@ -0,0 +1,45 @@ + + + + Freenet: Deanonymization Vulnerability + A vulnerability has been discovered in Freenet, which can lead to deanonymization due to path folding. + freenet + 2024-07-24 + 2024-07-24 + 904441 + remote + + + 0.7.5_p1497 + 0.7.5_p1497 + + + +

Freenet is an encrypted network without censorship.

+
+ +

This release fixes a severe vulnerability in path folding that allowed +to distinguish between downloaders and forwarders with an adapted +node that is directly connected via opennet.

+
+ +

This release fixes a severe vulnerability in path folding that allowed +to distinguish between downloaders and forwarders with an adapted +node that is directly connected via opennet.

+
+ +

There is no known workaround at this time.

+
+ +

All Freenet users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-p2p/freenet-0.7.5_p1497" + +
+ + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 2c44b89231..5b4c0e1b03 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 01 Jul 2024 06:40:29 +0000 +Thu, 01 Aug 2024 06:40:30 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 21aaf410fe..0cb2bdefb8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -7c19ce25facd6aa54d2b0f9a8fecd6020509009e 1719814176 2024-07-01T06:09:36Z +13a66c5def0d04b908b4e9faf4975aebf3c111a0 1721801457 2024-07-24T06:10:57Z