DELTA 533883 0 34951 SVNwfv*Z>T8Xx^N0E+݉CV*  $֙LҨmlMPx5s5gXix,3gbUŌ'-0s?80%'k_[{P1Z40QsJǤB!BۑPс:c1Gָ7^v߃ İ 0߅`!5^]4}lWI,`w 35#ʶ9h:XҬ#U`n7Q^ \aT)[z`|[ 4nt$MJ$|ՎuŸUH\䙄>1RkrN t=jz4rK2."}ų6 r\J8 .f`-WGUc4qUebkitgtk.org/security/WSA-2020-0002.html CVE-2020-3862 CVE-2020-3864 CVE-2020-3865 CVE-2020-3867 CVE-2020-3868 2020-02-14 2020-02-19 FreeBSD -- kernel stack data disclosur~w@{yx^͐r Ek+vڠ׌':  1HJ>HE$Eݻ].ŎZ| О&V<_%Gp7&>a rv;=LȻ6GO w@D+[qd9YJTz ^$Mź,UV9fX1H; ah뭤)[tQcjmtzw`W:Bd&G C F4сt61 hП_(w>8_Vj1os77%%Z^(_8x^QM@ =_aL~lvuH=e2O{,ā&l?<ȢmKuMuOMs z+nyhbp~"a(^n{x7ЎQ/19e:!({%0: If(WTGRq'0;P& ׎K2Lb3T;:JkcDs6l{ϲÅtVMRRǓ^YtiW༅WN[X!QZq8Yfn),=dPEjCON`@K`IX,C1mS$>|$ms/1]%\"y?=Cwݹ\w}?x:'~?y ]ppx^eRN@>'' TU};W^Z;Y;S;Lxp~Q,Lh  )'m}#΀#Q%l(Ō  &(L!($ 3+@q.%P/X()YiM:m)1hy˫r/$"]w R8NH4Ť3ݨ觾؄C'ݪm$"C>nnw7ݷpD3.V{ moP[QԄ.$KgOmVC6p(Ypb ..qZvǒsrZI0v҅Ҡ\s  YxyHy&Y5eTmwB)tEj44 տ(,{lp;h8A2t%Y@BBnUx^}n0 S+@n0ˮD'BdɐyNbV_G{&+FLP>hYT 5mjutoՋ׏5w"&cd@P$[l^@Gtg?bL3-7b1p>C2ieeXtcA&쥱ui۵=/Y-4+2ТYD5.J]B'’e+k?aT+@6AY4{ ϔ/EX0NOuj пn[p˷lv)g!˲M޾dL89WO*x JҊp6S C+o}_IW: Q>|_w=(CTw횜P   YE}v@:5x^Qn0=_1рd(tt ȡF"UjRඹ<[h2v pEp2z3k,> v#|^(r:b >h.ܸqr3~]܁nv~a?BYPWIYg\yeu/~r޹~@xZv(\ΫniX>;׃{YR:JX2rHƒ\_;nqFMp cg!OܸoJVQvH x^n )\\c,Uui4>GH6 7qV`AP~~(xdx-1FcϠa1D.t C"t8`D,S}70E!UvwGR11 zsMX"Wv? DXOzL4Lk~q39ɵ8y_3W*0pvo*cH?iI ߽HJkzu~P=k%ex^UN0qT-l$.RB'S6;IZrc;V(afUykѥ;>+S "am}uwp2gjXVMjTM%{~q^|= <.qxŘ( l]O(!F7K#l0`X\(w>bٚЂ$1F p O`I I,q=@Gf|e\(4;G-,/&h9n])QJdbY궭ۣ2]p7 Sa8xy\T5|3:h޴Pfyd|C^ 8s{W=owQy E|;|ǀ)_1(kq{!Lw臐 TqSE}@oA)K%['"`] )dSs(XK񭦖╹10Z,f8#8>kW5Hu^XOM>EQݕv7ap>י )n?~C/v>hzx^Oo1)F=!vBMp $굷ػ*!q=y| в=V_?' ;ZV^L&]ep$dnf\٧R3s Qʢm>\U[YX[G'Xf\l,QIjlىM >1{mUTrʼntMxip|g zQ{ѱ)4OǣdM:t Y^@#`"]vՠ(%80*> d +lcl2 \@E*>( ~4}yg9ЉEema'q ݚS^`˧ͯQ |4O}?pVrt`GCLҒ7EBeD]߿oˀ|C@{^&XOx^RMo0 =ǿBȩ;ز;P>0S%ϖ3O*aݱI|䣘:5z| 6y a~9ިlXq.&*b|Ǽ*E-k oק/'a1zMW`xe0Ro5&¶FirF [iY$vg.`;v&fƻev;$J M'WخF+ .v˥>OmͱD)%HiǪJjڣ2J K)-*MC5RI5 Vt O?v\X~p tL(>W)G-y-+CtAPevѠ! w[h `R@j~ drupal8 8.3.3">

CVE-2017-6920: PECL YAML parser unsafe object handling.

CVE-2017-6921: File REST resource does not properly validate

CVE-2017-6922: Files uploaded by anonymous users into a private file system can be accessed by other anonymous user6920 CVE-2017-6921 CVE-2017-69226-21 2017-07-06 ad8R`+db}bd-͐Z!\n$7VXn/ivȳB8ݜaSU~ qUGeȳXf]U@luI0@cvi?>7FőRI?*w@1m-X:sebA2o]k$ˋgip?QNx2x^Ao0 zMP k zhnvdd6f#KD;u$;|O0TBE<=0~jQPJ6dFBF%L nˇIweMsp~68}xhEpԑ4/߫CkpPw_O?~13~_gyח& Qn,t; kS3:#DY;cMqGEb33E5j4yC;kOh&Y;c"Gr_f]O @KqX!_nh1TA$-Zc -&Ƅ׫P/TEe*oV[뫗G?_~ YôŀAWS!zW&nmr#kO@n.m Ӳнo]I ym !WMZ&̥k&9kp"|Y*fD%SB;@{];b]ivpq}x}>d轤(BqZ?_.fY^!alppm=W?x^Rr0>XrƖSg_83鐁ʩckGT$ɭR^OdLEOϮdYׄ菱/UG1 lG>i*sݎi*zʋÂ ̹ 9ٴ ǁrJW5ef^yu'^DiDY\r2g\7Mz[v]@ RuLKx^n0 S9W ^ZzNE ,,ӎE$^~ SF1:KW%)Dk;tߣZlGmzMuk7ia)?N|:ЅxAO@/0DQɸ.1OQ̏R)mCdJ_^?^b7Yl`;j~9Bd y{h|~aD 9pa sa˅2kdP0aJgGn[Z1G2 8,H]Y)i&\;w\߯VrI[&4zN~,^(kQDY׶ QV%B ?UkF[?=ۙ7?GCg#L"O~xAR;$x>\x^PN@WRAq~:Dv؇;s@Hlu73;INπ'חȸc${^#Zkb49- iQFeIv0x^Ao0 ݯ |eI-XT@ѫ,ѱ6YR%});2`@O%{Q ަU릲bU=bjr/% uS\'$GR("_Wёb9KkaT^Yݯn IZo7o@) $|n~zW{Oo `VmPHg{},M|m7] ?x3E%- `\LsV_)t@I.LT81;3c$'rM!/b<N؁h9 k҅lh}wxI>򱦂nCGa쁛@,#gnj"ʠ=PHNX7t6rwT6Jm7:v = 3bf5"> qemu -- denial of service vulnerability in Rocker switch56021312/28/6">

Qemu emulator built with the Rocker switch emulation support is vulnerable to an off-by-one error. It happens while processing transmit(tx) descriptors in 'tx_consume' routine, if a descriptor was to have more than allowed (ROCKER_TX_FRAGS_MAX=16) fragments.

A privilegeZ~Tn,v|&x^Qk0_!}1V[-0`/cjVM$Ok] c<%79H ׾ m(. @n ˲|(A$FdFIWawaXgvN-qW[hA`oG:;PlT ) Q0~Hw K'e(HPQby<ۿ[&0B} %k$Fœ`dK܂&6.'y7uը3qvK%yS<.<.+.jm帟_ww_|rT}U}]jx^MO0 WX' | PU lquSwHeq$''y~|xNv@yj[`5hC-@5p:l8lFr^kp4zj1ylb &v5<ͤԚBrvfw}qd0\L'Rq䡗^SXl|uukld:X(|.EÚm 2AcR4l.ϥfA:E5cО]܃HsÂ[KE9K'IW9( F4&y# =Ȫd52C6U/GПBS^Wy<:ݟp}ĝK RoJyv@dEc-Fx^MRn0<'_Hm"EYV@QC[@&WSdHl-}p3eU)F4,J-%ROGF #w1$_U d%[Ga/pb5f[Ͷג !h]R9VUfq>}a2igc@RHivߡ*.Ȯd/ɤFc )9H7Ls$@ /svD'v[7| df+ }eex^nA %N (DJɽ3cݛޝk]_;}>`iUN($k 5#J҄CW&y"l*c?s}Nha$ȳٓ8ծJnj;.J5xJT:y%zqd-9}M~cauc 'B}ƨmT(75 s͔}5(Y*ĥf^r v|H|C 7]<%m7}i m۪s6DXz(9K<no[wM YGWv8-MϩJ[x%&|5f?ժ [}uj&z[{MCJR/q{S9rpba+snܭA+Qg8|Hnc@WEx^OO1 8̰ CVDȓN,2I8EHE=[l_ɗ,d,\~ bH/:޾iZՑv CVE-2015-0248 CVE-2015-0251 http://subversion.apache.org/security/CVE-2015-0202-advisory.txt http://subversion.apache.org/security/CVE-2015-0248-advisory.txt http://subversion.apache.org/security/CVE-2015-0251-advisory.txtd0c97697-df2c-4b8b-bff2-cec24dc35af87.067.0aFb:b:g,x^OO1)& 1$!bvvN-{K^ d./@ 2hg8MOI'bۭzoAYUʃ#_;8+^+cs? eْYNw(;{3LVhx5 ]9yEvH3:E`BWk9Œ6 R!Bc+Ag9FtQIUDtQ-a>CV,_$=%vքƂakt=[b bфM,չ5HCU?N_}TuFhNr!S[JA/'hcWKO|Z)ѷKU~x^]R]k0 }^|u(%Jб2[IL;XM￟ܬ#sdi*`ICNs/t Čq ~H.2vUe6V [h-`Ğq$W _PS8P5‰Vu> Hs)ǑPo7]/1蕷Wlc{ڔ!ZРǍNᩗ v ) FkK1z1b냒0h?.#-Ąi_lmdy5V8ԧΡ96Ѹ+`eĻN̸4Կ~n#(չt*Qm)n[GxQ=` %lSi\MKaS\>s7Y6semC99cRd~Ok,) SaXշIqyS\E- PީW?߁V X]KEXx^mAo0 ۯ z.(P =&h^ZmtSV`|1$P#ߨo`$zx`?BDeTX1ڽ9vBn nkY_WR.v%p RpU1 gK 1򂫏 #wn;wq?\qr)j v_U\b&T\tcԓ,ʒr83ofzcsͥƌ'XrMd:S^l !xY<"F=XFrE4R,a%JȀ#'"L@>XoK7fv%perspective, different filesystems. The user may thereby gain write access to files which are nominally on a read-only filesystem. SA-13:13.nullfs4d87d357-202c-11e3-be06-000c29ee3065"> FreeBSD -- Insufficient credential checks in network ioctl(2)19.1_7 8.48.4_4 8.38.3_11Problem DescriptioΠSxUO?PNx^EQn0 =_A=%n*IKw})}o^E~6QMц1V>&7ry֛mu4[R~? HHÔW 2OAbNV∑L8K_ϰ1;Ӏ\:)2H K71 N^M;:A=!:p vn{`'U(car04FWJ[HI WzǾk}kc9N3.!SdJ&/VՄ<63WQ-\vSݵsPH"GeϦjchN2J<v@ ox^RR0 =ӯL&-`LN\80PlrB~cZ=g4#=0ݭp+<ϵV~)#^LflvXw ?٨l1#DaDg‚.BDNO؃\qH~\VDx0ԇѼ ^8@s ː?px5+)/6E{V<l?v?) GF_+EEr_yLR~xM6MH-i'n=Dsͳ)A9OLEA6$fKT߰B>l<ZuלJ؍ Z,c ͓Thj&kXPp=N/)aū~L̹W^X4W, ƌ_aİ8V9#FpןǗp|~s-U_~r=z!Gm,<x^M0  . *!MI3Ա{q .xnڈG:l7zIZ\j<ך(7ekԺz{ڸ6~섣#8SŽ SnM\i t?!,a7~T.76LqS'6?fM1Yʌx:V5AFUY(8k [귛 Xz|/!SgI@nD3e)  Xc@b:WdNUEQzfO7+V2#Ŋ=ZK9ӷ^}27gN?}3kuՁ"mwؕ֞>:.W'vt Y^ih/% V{2^5H6 82C1IwIwIwIwIwkT2.v<Acurity/announce/2012/mfsa2012-141516171819.html 2012-03-13 2012-03-146d329b64-6bbb-11e1-9166-001e4f0fb9b1"> portaudit -- auditfile remote code execution portaudit 0.6.0FrcL} 2x^R <|*V*۩+jU/ 8(\]maqyY}?h%#'{ؑs3 rXqvd Oֈ&` 㼄(u@i ԋTW9{^ZFҗ pdS''4|>iq/ R0^VATFyR,XY:wti9U7T<Φ sq 尾al'?]c>'}qڏoQjHi Zڴu#`D2g&nc]Q~F9ytD|_wӵ` .?\uR`gl_14 3A? tdi,\?C?lXf,GIVE-2011-17205-09 2011-05-09 M7,1 3.5.*,13.5.19,1 4.0.*,14.0.177,1-devel 3.5.194:cJ  x^]N0 ~6$q4 lk-ҤsxzfUO/6O 8@}&QA8PRoo3 hdژ(F5&]I-~!~Aء.*]!-*TO;B"Q酃o."F\_BXÄ pJܶ0k(LN0 UQQ+n}y7p!82}WarvoOoדrsP;Kh(>LrT oɆ˱4T6qy ?ԂqYx^uM@ +|)6*V HENdd<8]qVqFxiEā6oԂMmg],d~dPAwt9CJ<}a]HfprKrT:ز= P]?|Y{z&`!3$l2+hٍyv'YaUjle9 d% pkV3%|b:ㅤ lyvXfp3/ Nc"w'VUH['EnC?ƒ5çN[IacVJؚʼ5 䥬rf=Y+-V0@ߐI0r"c3T(wJm)rGN@Nx>].Mx^eQAO0 =oY mzAp nK5KJvߓɱ{[\S.T|HMN,,-y^. =dFA`Ra 5m LĮC@o ?$a8:GPdII'o(ܚӨR"Z3BIw%uvI/G"%$zXK<\gFůr7:^pi &WB:3.?:Ɨ1mePɍm-IH#|.:kqh)"+H;;0 n֦>Гfs:OUpVre`1` WT7Iӡ2w! L?7v@Z.x^uRn Cq >Xm`s8y*sPr%3%v@azx^͎0=wp讲xH\L6:'3iRB\Z]|sT=Wx .}E1'Vyi|~iC%)'ׇA5<+ƺx<M>T L:q]=O%tM%*kt )4AF ئ@1Pt9@gE x(p' _=z\uJ)V[ _j_Vwc*qX][y#kD; hU&6y 7Í(%jhŘٍ#y=. Z6E h_SﰟO 9PZ 2Dμ7tGGr"k)E ܽ +AJߓ'Vupv\gw~%G *d``74S=T`|q^$@Axݞb>tĘOY#`0\4yo?26LԑBdH `MIkm/.H#vWzx^Rn0 =_AdN8vZtAXli4?+L|||ԓzQia^9}#6ȹ'z%4q*::";:w/?Xƶ`;jQ䯙Z9ʣɝԾ#;3&X띩Ue)KWߒW-т˻FUE]o7ymS#f4!dk\^ K4 NL CThstɩc{+ q7JzbBxС̒U^GָWi? y|YDBZa6joV_ت D[m&5T'V Xg: x)Z`_xz v25579/">

The vulnerability is caused due to predictable DNS "Transaction ID" field in DNS queries and can be exploited to poison the DNS cache of an application using the library if a valid ID is guessed3152 CVE-2007-3153 http://secunia.com/advisories/25579/ http://cool.haxx.se/cvs.cgi/curl/ares/CHANGES?rev=HEAD&content-type=text/vnd.viewcvs-markup 2007-06-08L\T0~TVJhttp://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000246.html http://secunia.com/advisories/23245/ 2006-12-04 2006-12-07a8674c14-83d7-11db-88d55The official ruby site reports:

;2mEx$mftO=;0ζa0ŨH!@!46}֏ ^(`pp-1E$<~ĔF<>cİa^Ќ qa_m-$)ղ H&xapg}>IDUf&^Ͳ({XLEcVl˲ʒ:TeK|E& swGC_gYNVYB*ڷAisUV/E 6)+J% h8ͨq;MïNJ0y{FÇWBŔy_Kї10zb{@OQcJ Hq*1(t.6A9ҤIL%[Og!c&j:cj۹wm#+vQ)/`wBmX*6's"#˘ T|RF6j|F$& ԍOZVh@*jɟa6DV L+s|U)dEns=&g!:Xi0.OTx<%ᇇG m *Sp1!ݻט@>!(0M-b/*jGTD>|BeOZyK+-~Wωpqt}VNR NZF2[d^0`:D=B%<,bSGas6[y.c$.('媖ODt$Zڛv;Ue\OjC tN @YfSNH >eXBNNGRm˲\WwTbWiy5I\Z^͋u-Љkr~I]v@zx^mRˎ0<~Ekő<V٠p#iI8c8R}R݇R$yyu˻⫼6,j3ynfIh[ =KVBUߏG8b˒=cþ'ݞܠpR8դ*;aQEh5HߤEŨ.wi e*KF[lb'ngٲ,鋲TF=gGv.Csl2&Etf[~8Nhhp :GPAcӬ70:xvg^O&y^=E)6ЍhVϖDZ;M%eWNt[tϴ$p@V*;g{O8e3 kҨ}׀Qs|}Wfm[, eR