From 1d4078ae1b77cab12f08f77a8be55ef03328f6a4 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Mon, 28 Mar 2022 11:29:03 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- dependency/mongodb/0.0.1/CHANGELOG.md | 10 + dependency/mongodb/0.0.1/CONFIG.md | 7 + dependency/mongodb/0.0.1/Chart.lock | 6 + dependency/mongodb/0.0.1/Chart.yaml | 31 + dependency/mongodb/0.0.1/README.md | 39 + dependency/mongodb/0.0.1/app-readme.md | 3 + .../mongodb/0.0.1/charts/common-9.1.15.tgz | Bin 0 -> 43530 bytes dependency/mongodb/0.0.1/helm-values.md | 54 + dependency/mongodb/0.0.1/ix_values.yaml | 116 + dependency/mongodb/0.0.1/questions.yaml | 2247 +++++++++++++++++ dependency/mongodb/0.0.1/security.md | 334 +++ .../mongodb/0.0.1/templates/common.yaml | 1 + .../mongodb/0.0.1/templates/secret.yaml | 14 + dependency/mongodb/0.0.1/values.yaml | 0 dependency/mongodb/item.yaml | 4 + 15 files changed, 2866 insertions(+) create mode 100644 dependency/mongodb/0.0.1/CHANGELOG.md create mode 100644 dependency/mongodb/0.0.1/CONFIG.md create mode 100644 dependency/mongodb/0.0.1/Chart.lock create mode 100644 dependency/mongodb/0.0.1/Chart.yaml create mode 100644 dependency/mongodb/0.0.1/README.md create mode 100644 dependency/mongodb/0.0.1/app-readme.md create mode 100644 dependency/mongodb/0.0.1/charts/common-9.1.15.tgz create mode 100644 dependency/mongodb/0.0.1/helm-values.md create mode 100644 dependency/mongodb/0.0.1/ix_values.yaml create mode 100644 dependency/mongodb/0.0.1/questions.yaml create mode 100644 dependency/mongodb/0.0.1/security.md create mode 100644 dependency/mongodb/0.0.1/templates/common.yaml create mode 100644 dependency/mongodb/0.0.1/templates/secret.yaml create mode 100644 dependency/mongodb/0.0.1/values.yaml create mode 100644 dependency/mongodb/item.yaml diff --git a/dependency/mongodb/0.0.1/CHANGELOG.md b/dependency/mongodb/0.0.1/CHANGELOG.md new file mode 100644 index 00000000000..344849bc352 --- /dev/null +++ b/dependency/mongodb/0.0.1/CHANGELOG.md @@ -0,0 +1,10 @@ +# Changelog
+ + + +### mongodb-0.0.1 (2022-03-28) + +#### Feat + +* add-mongodb ([#2307](https://github.com/truecharts/apps/issues/2307)) + diff --git a/dependency/mongodb/0.0.1/CONFIG.md b/dependency/mongodb/0.0.1/CONFIG.md new file mode 100644 index 00000000000..c147b7c819c --- /dev/null +++ b/dependency/mongodb/0.0.1/CONFIG.md @@ -0,0 +1,7 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide. + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/dependency/mongodb/0.0.1/Chart.lock b/dependency/mongodb/0.0.1/Chart.lock new file mode 100644 index 00000000000..e8a5bf79b81 --- /dev/null +++ b/dependency/mongodb/0.0.1/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.1.15 +digest: sha256:8f13af42bdb9c005c8b99d3443c5b350c9d99c45f485e7bbcb233fd14b3ab4f4 +generated: "2022-03-28T11:24:18.602327477Z" diff --git a/dependency/mongodb/0.0.1/Chart.yaml b/dependency/mongodb/0.0.1/Chart.yaml new file mode 100644 index 00000000000..79fda6717e8 --- /dev/null +++ b/dependency/mongodb/0.0.1/Chart.yaml @@ -0,0 +1,31 @@ +apiVersion: v2 +appVersion: "4.4.13" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.1.15 +deprecated: false +description: Fast, reliable, scalable, and easy to use open-source no-sql database system. +home: https://github.com/truecharts/apps/tree/master/stable/mongodb +icon: https://truecharts.org/_static/img/appicons/mongodb.png +keywords: + - mongodb + - database + - nosql +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: mongodb +sources: + - https://hub.docker.com/r/bitnami/mongodb + - https://github.com/bitnami/bitnami-docker-mongodb + - https://www.mongodb.com +type: application +version: 0.0.1 +annotations: + truecharts.org/catagories: | + - database + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/dependency/mongodb/0.0.1/README.md b/dependency/mongodb/0.0.1/README.md new file mode 100644 index 00000000000..e52c4a93140 --- /dev/null +++ b/dependency/mongodb/0.0.1/README.md @@ -0,0 +1,39 @@ +# Introduction + +Fast, reliable, scalable, and easy to use open-source no-sql database system. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 9.1.15 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/dependency/mongodb/0.0.1/app-readme.md b/dependency/mongodb/0.0.1/app-readme.md new file mode 100644 index 00000000000..7de3470b731 --- /dev/null +++ b/dependency/mongodb/0.0.1/app-readme.md @@ -0,0 +1,3 @@ +Fast, reliable, scalable, and easy to use open-source no-sql database system. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/dependency/mongodb/0.0.1/charts/common-9.1.15.tgz b/dependency/mongodb/0.0.1/charts/common-9.1.15.tgz new file mode 100644 index 0000000000000000000000000000000000000000..bc70ebf1d55c126644fb5be1a5c686c0ae1de960 GIT binary patch literal 43530 zcmV)uK$gEBiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYccjGpaC_aDdQ{bw5ZtPs^X<2q_r{}khyOa2&A3kk&XLo1k zxFHgfFs4Wb0Oi&={oQ{DPXZ)JQGO+vF?T0zkwBqPC{z^+g+h=lmr2|^SwO=)!EpGe{$Myd9Q+CN9{`uqlTilApZa%h ztJt|e$OBXS2@#5ucmh_#7EDv~GlC3J)(Q~~2u_)J_k9)z{4WsUDS>1SW(ffoBtwFM zXls!y(F80QOX;N7n`5@frrjV}_87@fAj7p)FZ&0J+uWV-sz zUtbQogK@Xt>3`E&LL4)QV?+cnw1haC036Sf|I7h*6EbfB5JTQyivR#*B+Ah*RFK6L z25g<8iAJxr(zv|n4!VPb)+3F-n*S>pWr#kI0H~e+gF*k`;IKIV4@do{`TrQtGtlXP z_bG}$oxKAzMFF1S00c=q!}E+lKG$2%z<-8l2D6Cq!siHqDTp$rN4iCnYX|N9u#?xUicyRzn(@}s9g7M*O+7E{P7qk7N{{Hx2I6%{Ie=rVbLwFdD zkEWyH!SqEiI-2hH8)J}WQ3TQ?!oj))#IG~)V**ZR?-F)K5ak_e31~lKf_}Ad&C zH701zD^}Azhux6m24(|jHlbI8ZofP14+s4hgOQ>4Aw;9uQGal>e{^t!!tws$i|KfF zG&>y6j?ip08%#%sqv>!soF4TL4pINbU<&)w5jvQShc8~dXoAC5q)th)WDrN&Qd-xm zCbWUvkj}dNW>^lDhuu+ksL4Ax9H9PD7=+;<90&au)7k9B=tZ!97@*N?ba*hHzCfry z*dNZ0!lTi6fAHdHJcDpJ+&>r(p`V=#ZEr>07%{p?61FXMb-ilp8psW)tIKbORV^$I z`Um0uXuprb!(b4O_Gc&@9EHb_gI@+J2X*lfnMB+8!09-6F&LoH?129{I%?MZ zR$L6D6vt>=O3PZ+R6dqa8xmMT+XTlU>wb4|kc)=l3l#2;j{2~V&}e^l2xsG?!3>25 z;b;~N2L}g(F`Ui@!DxVBh{iAWkEX+Mcoe({hQZ;%(f-D!w-dVwWpje)FWU=VQ?o|& z=Fpo8UsIzAJXg&*>^m5Z2jM=Pjt~2@AQ%l^4EKW>mwhhBK_ znuUWP7z_u)eHcy$!~U!vc*$I9ek)QhA;B=5ZcArXt(wRhZbJ&I;u|5kwC#5fyZf59 z3|$wt)H& zPQ;qHh(%r$@Wp6XeE$R^9D+nF_$h#dBbY|XdWmAT2SSLJNlXy~2?3NrhGtnr5!bnL zJ)0MHC>MsJhcE&#juQqY^duH|-Duc+uOJJ`ADL5E_=W#;#)WMX0)A;kLMQjlKh1LC> z#)X!a@C(RdxPmz1Q%}^ges2SYW@Ih_h`$O|t)VT{O(9`gpn&|Bkrp51h;kqVtuVz& z3>KJjxeg+{#7vC3{P3fE|AxPwfc;hrJK93Z)LbvPO2RFbOMUl!r9@WRP3R|Zjv^GW zga8;t$u$)M7(u!QDGsi1JO>bjcs4^MUyz45V0!>B(}XY>Gb6KwI0Zj^Je8f%kSCxm zez#kyVJ(CeuP>J{4tMCTfuofwp9aEV*iwbWRQAAtWKL^p^Uqe*<1mypaBM^jV2Os5 zi8%%M@K4toTDSEKoDs}bUbOaf7=2*`9=q*uJ~+`xfD61t|4d@ky7-?7_;_(*6_Wan z178C{)5!RL-yNUJR$B5yQ8Ud^jHET9Riy$TEtMrqZDl1Doq}K}cm~-5WR#Ef0!2%( z;(C1=Au39ykS!+Qo8C92dc3toLfM|=nJ;jeMrgu`CV@c^WRxXKaC#={^0E^!crok_ z#z)=pxI6ZOgjvFtkl_GE(HhJlTOckqam?*FD*7ktsTXGnVG}SOk1c}MtHm@4TWJy= zdsLrCNqAL6>zUP9lNN+V@FM7{7*+F)tG$||RVDstk^WSS(Ee2FV<;31_5SS17AsiQ^AOIfG|HKQG}I_g%klpq!k2 z{K#;G|0%}$43PlEj7xJ~@F*|$7A+I9t}QBieIj)?Uv}dF!5~Pom{l$}RIy`Otgzs~ z)?h#l5h##=E|M$?!4v^$E`%+h{xZX$pjo`kWhD$lEiwx*Jtm!oaj{UQxe`@HY*+#^ zs?3tp8Hf`mq%gNSlr@8?Fu3;slz=eR5)g$->e$N#z|b;{AVX$Lsoi!-48cj1QHIEe zB$D=x_4_*B5}r(9V95Pia2VzGyW&DBaA^R)#GbZ2cw81Q76?9G`7e8dS6Z=^ zwM*ivF&4TbE>!eM!xkSl4086!e0@&Q+J-8!dkUUMVMIi)MOOR8r4PgNyN zLSqPOo8AzHTLp5T7f@BGBZp5~2zlL!AutyZ2>}ExIlWYu`BIj4!TVH=pi<#`0I7e~ zi;n!wtyWR-LM(y#-1S07+A@f6fQ8v2-$+}mVHMT1Wxsu-a`^&6Oi;k0HGqu4V4>6) zmx9Uy#4$r;1_LpIXAy#w4;+Bkke~^;;4r4^6jF*PxH_VmZ74Sz5s6`RssT`IwaV=! z^I-zoD5m>uwP?jDTu#*A%0ti&7eU&ts5>S7x~hE5g9BXx$e*WYC$_tbno0n4KwH~! z{qA7c?+r(V${&)9A-771D8n(75fANtSNvbk;3b|pWat{MCk}kGa4;jn5|Aco7D*9K z`C^wzlY;ZBTDq>2OnL6sd|bX$0|M9r3Y(iEdy&hv4T=M@PWi;nE&n~Ke}tYCrs#|> zYxyFMuR@;*Hi*~LBwR}bU=VQ5Qd7qY001)_p>9heYdi#J$LHrizyI)R0+#CzXOZiK zgsQu5p|Fltm?W`S${NeO3oevq%dMwp;Cvl3_(l7eCaq`Sco*p9#xwBUu59hq1blOI z1G*oO;MDFrt|`BM{igK{oR}glH6$oreNU35`3*p~+ijtEr6k-l@JS;j`>#mK759uJ zOQVAMESF0JUg>8+DnKL(+A5fU5G|8E>B^IZIRX+UxW-Wgrbrg*z;KCUj>ttC8ERg< zetY)j_~P~Dr{gytUr#{W(@$BmU4y&8d&gST>`*9V;tGT4EsFd+Hp^sHg+=wa=kFKI$iCr!c*j%Nv3%Cfwd zpEzn_By?Zjy?^!k^4;;<*Lsr8Fp9ztXqHbp@#ah{;P^!7#z}}c637;4fxYfuAK;My`j4On=6#Rs<& z!g!8IlF?3%NELMSg%2oZLfi@-rid|ayyzF&*YfiM#d?jMQ1(u0Xt0D=2vBYt2w{a7 z2xF?1Wdc4cljM6$DC1M+M_KoC%K}ndgXOxrZC7stJagK{R8|!7tzFTQuNJq!yDfvL zpq^b_duUR%!hQAbT+@Z_nJpA;tH)u&sFGP=3D8oAdGcKP1MX6Y3MQg6X zGCnOig?XU~I2a$b0QmU!`242{==X=(@`W)sgEESQwZz$5*F8yMhQ6?F08=={5oUay znq-XP&@2ys_;|_(-F1V>>3m{U<7k8=N!9Sd&~_8%#<%d-sn&sN-q_%0(m`_WVkdmn zS$s@6O>{5CiyugmrTWdx{YkSljSy!A7>N&>u~fN}1(z^-?!1pbBnf+q=@PPFu^rY+ zZXe`sPFlu3C3uA+G`Bq;1i|oq9Ibh~-{S~Ld1`jDgd6xw*LzI^7%7v@0N@mOmk7j7 zwV*H}&Y0AXN`z-9SO*cR>X<2Dt*S1B{bsqBly$(d+XIjS7y}$*W=iaFLlMVwK7a8N z0muN3DT7f2k~ms-Tk4nb*wTA$4e_M|3bEMY%jAxN;&idL>bBHgj~4^I@e1R$Xelow zmW~{U5Q`XMNY(%|w4`0|nm6f`)*hb)Tp@tD;JuE)6%q#W#R3&!@K3U@q4w>`I6V>~ z(gi=F$TILikk5BcP8-RJo>+d+pmB$MmFoIchh+}Si|ZLlrl_>*-{~|F<kh0;vaYUd9gv0F8sS74|yc z`i>m1Ex9ak_rIMDOu0b&%s+kR_5-(Vt}$H*C7?!son%A|k_LWeU`r97%NqroB1Uyo z-4uzHE4b!n6<@g(b{uj<-9EQ3PR`n`eBpa>a+Wu6Is*{=cyV#2TEJAQF6|Ey;)#Fn z@&B9~)xImcoI?cOwhS6=J-7}l}K;H+G7nyme-amULJ>N?N zV+t?>3vMTaCH#Vy*^*;*@a=y8<=~*tSB1Q;U?Ywt$Wkzsj#kXXtf2lGRXuUW{Z>m_ ztk8+kahD!qY#{^J3miz_@eK2+kyvls#mF}lSYW{tQ3~hAHwmr@W(>t$-JG-&>&!%g zgd;3K*2fM^agVS1qXdQ>f@qSF0MQ;dAy9eMVrM#vu;)B4d$U zH}6QkBdi_lVO9L%XTEy;EZj$*zlTvYg~8QD@+O(n_wj2&67u;sB7=@{QjNb-ViMpu z=QO$J1!9CG-)UMPFeflTvn-0%kA%IzU9@^u(ig?`vbFZnVrr|6M5_HjDze149^U}? z*n@&vQ^7EldnX)C6*^{?aC|9A@e)Un=-rWTI7@z`!ED5OBH}P`T+(IbEl^d%qtf!a zZ{d~RPO<{9bWp;M&=EM6N`vlkbtE=1SkUcucP-&8c7?cxSjvD$7=wWZvuC+@#lBM# zN9+8vs0GOt3i*0hp&&u4A0@1vSSjgq&So?GMS|D5O%5HV4k6qCXb(uEh17Pg)C4As zPwt-=VpVldxZ+h`&HnB=UZxS+d6U3!3L_W?i0tkG{_{Kab5DDYPtW$iyCg(sGQ3MG za`RPsk-X8$6|udQ(Y>kzXCztiPFDnrNd>TkYvJZWzhsz5QRt0t@dO;-60KW>9ancr zfvV|EE>6FPOB}7Wm(>E%a_uvmf*CK0h2Vg8NR;pp%*#dVM)8{JSy~}qH^^8)iwy$Sf^$n5 zD=A(nU@L^I!yN)dEF$>xItgKuLRl`gct2PYBvIG;cAljIh81Y=nXfWF@5z79`5zZ2 zXUdHF`0DJlU0p6n_$ReAN#S)2AYb3)(Q|PK=7{BTUqqvDR{Hqijrc0GM808V^Ok~b1^_G&uy(A(m##aypL5Wk`G~3WRwz`98*3Ph zhQqNrDj_|<)`|zmlpz>`WM;L)OMgy96Jj*Fe1ugv2d7Y|rk)N4p>pVKWhxd~Iqo^u zMSgIOsVc3eq8PMMWotn(N?Q9l8kO3Vy6gU-*(&6a#RfX>U_R3{rjwFcsDh)o@ZM|{ z3SWJ-1e2dF!KHu~tiQkgy=AppX{@R;O{~?t=-td!1*h6v)uCj~%~eeTN1U2yy;@nS z=-faCR`d|}`O^6s+;xLS^Awl*CeviMP@Gbv>#HSKv#B54tvbHRvr5Ym; z&G41|! z&JXvM~mg-PBFvbA6;7;qPF&Wr5Q1>bRnEkj8~#4Z<)lC$^- zq$*4ex}zh~d* z=_=R*XqmG0D@^v3uG`CJ+n&%A?~6tHpK%lk zt4A!E;Rl=4EFo}?z==7UlM8AGfN&jABu;66?tI<@ z;W~y(9B_+FrZnNi6sIMrC77LR!usg^&-dq__nfE~0|F6`|3LMt43E!gwh#w#B8nu) zIbNX{P}wWlsdD`+7S3W6f*lKuUBQ|Xbeu)e9*7eMk}yX_K#$m1<#T6|7*B<-H?mC| zhFnH$=!fJ24h|DH3m83W; zZKe(%$_~w@V)>xZl9P)hDV(bl2##1h7Ux~wCU(*=Eg)Heb>HSr%|w~>!cLZFHJ3?< z%oNJq{!FVb=)707mvffR;t&ZHR0rE7}V& z*{zR|pvz^dWK7$#8 zj8Buf%C@2Cu_q){0AsB?^UXp0PdWdV0vu4iQA3dPm`Zd7o`Henv_AxEtRRV!IlU!s ztRU&}>QCJ9$lM`?9$Kb}xJ*IOrgo%x>01snTc*Fm0al~?uQ#}lH}y#tPpTHe4W>TH z;wQdn&KE6fTR<3S#$`?O&aTp`loYtuxf zyt@m_EEG=lEb|Opynpo`sAQR936=dh&^s9=ohdFdoRL9sB9@&c zsic?e_R1Lt3mMt2+#0-0dDYo9J2Q%B6*X(u;L6%>xB@o^9XPXo)=hmb&X#tMf70!@ zZ^H@yDqQf}a=>pn`p(F|R>@zI8GyN0YN?WJJ;o@C(FoCMg95lm;)iHuEpBy)fpAEq zh%7Os!oMd^LT}^KZt?>g;9C!v6a~W5dk24{mMzlnD1Y$|ID4sPhiGD60qyOUPRh}+Z+((G zam#f_XML*RE4_8ygtc^89Wk+qznq=sa!j`6M$gfZ8*!XN@?jG7<%f5wTX{ybKQRA3 zH2Zo-T!q(c9&VLMuGv`2!kY(Lwcc=)i%_3NxJp2UxqvbO(Sk-xdvC^~rz1KJ4-dVv zPK}m~z$g!vc%MfUUZM2_WE2sz0S!!C-g4cUlO#)f%XP;TX>Hi{vaWkkT$Tp}e72&k za2(k-5_MCy2aDl)*Sa-Ik=V*g(^1JE_XNDB@N`5=Gm4#NUdS_C`?K*$HZk z?{fD>xKExv1MdkCTZbURlvzpRr!ct6(o!qdYqJ%{7U*35y+!-OAF%x8>~jVS1k;Xs z*Aaofit6t;U&viJPVgX!DI*Yz6z5whF`1wd$MX(a$xxggq!iC%k!&eWLezT}i(A{| z5!T%n|8?#hXtnr`0yqHC_Xrd#X4IPAcf;f{W@+tPn|kYq`kM9F-8 zp7JSqaz{+{33YKWU7k+Y4Rokzp_3DX8wyp;QI4aT>zaa|yflYaqy_A@OiqPK3p@iqBaqQdTpB`9kSv!d4n_Qtm7FHe zC!}i1!xssN5L_u|oybzcSw6r?MmgkQkzgxYkn51H%xwZAngASgT_DbtEx5p^GMGPj~h>MFo0K7!**nLIg&9 zYIOJ_Sf^r?;VveNUMOOERNPZ-yd?}nlgqreWfSH3>Fk|qz6(xSgQkJHR!f|(!|^QH zQyzgNW8iN|M))G1%E>(GiP_t|I-(uOI*Vi}W=Ai{NGH#`uWxbh=v&tnIeO2`6~moX z8v7kXRu1wO0ISqKkZ9Y=yr1H}I^SJ&DyVDET+y5mU|(-+?x|A+?Gu3Y*I>(X)o0XI zgZbK1ZXSjxW*EvSN|hK_`*nC@=S~_AG3z>T*TCS0tnxwWr0a5TE6L{i{DQU>jhh9S zvU#xL6^^3wYs`X$<(Nlb#ElW5N}5bBPtR5(6Rhg{Ixgl!P*Rb1#Y%FiDOgDLT0uj1 z;6brgF`g=ltlY)s2)4||sq-7j7-;Q3OJhKBhyrL`^kaFo#EQUiXQ`DK@0GktY$h)r zGXaMJW3}8{IZg<3ZPxD?VJ9XTfM<44GKyEZi==#W6DUO%=T~%u0`YS2w^|kn4xgGi zELUr?^!GS2hkD98O5RP3TX}(e8q-2>uG;eM|ef#6%`>S@*uqx zE*d2&a|cU6N@OF>U}!*r$ZReQ;; zv9?ofULn3pze1GrQNT?&outTWUA9)l;k6ESSAIb?A^97BZ)84mY15-GskrD1YqxJI zZ=*Ic7=h0?yd)HU*0R_^>0I5}qm918L0nrL<|!!hvlK-I(cP$#-Lz*y;8@&l4jL3v zN@*k2PU=(^-g%)37!3D^1M961Bj98T(wS8iws{5|s~xMrvu6*I3r7GZXf~<4faeyu zaGVD0A9-#Zus4ZQr?fAyBtH_Fj4LU7zUQ&L&GqvSbiPmO+-=WKlAgZXde9DbOiKqT~v1VW`#H zOS=6!Ysui))Kmh^EhPinYbM>&Dl$NCWfPg&k7p5C6!zIextU^}B9#pG@xvS5>o>_2 z79TisxWN_|CbNX#ow+$eDlGt2%Z06a5hePBph+B|j2vE}_idLK@UGWY$E_=A`rFNm z7%{p?tzM zGs_syjrs!iK36&sU_#@aJqfBRK;c;Q-vR^Yk&H^ zJyI0+%&kMc%lr=Wvn0%KFz>Q7x@8;ve!o8+jl{qGe!uwdaDRO8r@?4AI6N4S4u-=& z^@si8=DAW)S7%H!tz(!i_<7WDZ#N!bhF5> zw@(w9UQRNH3Q1B4z4($^U(=r7b?z$tZtL6L*RQRc8xxk(mIbQW~+j-=<`Ji#nJc4OMMr%fhsqs^?mDY&~|gVq&}!wIOEQLQCnP{!5hP{f;?yb}UFwJ7BQ3GIYz&N7;`bnz=&7X z*J6mKE=2FtjjI4SSf?rNtp;j~h+}(mQ_=rC(ul8r6cqrlaQ6+Aq%8Q=I0I~23jj+T ze?TJbF0F)Om9an#6ae^TGl0B|1z=wRK#btPCbOUEB<3e)A3ri2;eQG>bcRU4&7?Wf zrq26#DL)jv8)(&)c`YoYr)ddm7AM$sK~z3v8Lt=K(V@x{jA&#Dkn*(7ul8SA4ZX_ z{(IkoA7ny!?IVYAXs-!W!uoG}w#`t`U*h^@rLa7330f)-y*6WNq4Cw=xef7;ELzI* z-yAczHz}}T{tt$O{lfe|*dGs{=Ko_nV*Y;+Gr5p)(M$%N8%~FAs7rvWCa~e3s%b3m zFtAcjLaPmD<`Edr5qQok?1AU``IpH{Vp;qJR9Ieeym;d!eA{-#wxp8NMFOEVJwnC_4Wop0fNmNhBXj{tt)a zqWyO;>JOge|6@G0{vR&XTn~`&XbJ{7Hz(9QULUm~vyI!wuwC2hTv2Wc>7p_9OSl3cS`W%+Zn(D|(mi#wdM%A#4Y_xaND-2MpNLQbV@uFFWq@B;!!lN2b z3rp=>B1q5_$&l$w+vx$D{vEZt43n05<6V{n6n;QU8wz`%n7+F`nD#f5Ra6YXBIq zO)LOY_{jwL7cc>cZ~MlnskUwm8qX;skfHgSuV?k5y!`=525kF)m>TxpB8)?@6C(>= z4rI6VC5a*&&p)Q2{A>|z25|&-#6+2a_Pc}u2v*{BnyJp#sSKI1CeY5G>25o3Vz)$R zVCqXQmAfuCHx^nA*pb+XgQ8nP&;b2X*VCPZfG*9*9D!~Y!xh94oJPoyz-eIOF)6G{ zdHYNFI!yci_5e59fBPl> zPycZAWdA+JBb?i||Nm4S2B`J^gDN9VF;BhgKfm9$q32&8P_X>|`c=W}ubH>P=dV6n z9)AtT=kE`7N~E$UUz!aGD}Z#I`O16{e)*lEn9+!;+i2V1`R;C=_us{Qqwl|SJLkU{ zKDWK5j{m$ma9dWx$;IfGJ@A}G)({j)$jTxf&p_AQS!aJ#{c^TYCNIGb(1zHbSDinv z+MvxM*{KkH0WO_Oyt8Rr#@A-4NzrN@#Elpg?4HsH<}~y%LmlRuw}22~KZ+d1ZL1wG z*@}#S2wp9=q(`q39a*rZB4@6 zymxvq3cXVZy)4M9jXlvjr>edaxM^Tsp*8h%;a7F^wG7+^@b4NTR<{4t*_yK?!om7p ztiXEvZ_pnPMg{wCJUl#jvi~0A5&pmLNCJ>hn$_TT!)hPcc<0 z;I++cv!YO4w$t)aIRd5A&q2y@4(8`&yH`izu<2^xI0o+FqP=l_U2Dz;Y+{j#}yZmf!$`4>6? ze`_lZ(EhvK-KLOH4dB-r?ri`olsk0|Xw3IO-c~auSuvHYg%UEyz;jDrbFB_wNzNCl z7E5g2dmc+0LY%X5KHzj(`jBIc)9<1rxT^fn4RA<6VG);3!Ap7Pn+Zl&#jRulI3&^) zSPjW;2Ym@p>Z~o~8`rC)`d(eB)7<;$U#^wkcov>O%AOPkCPygP1v}D8;^f&abu=N~ zYF%sU3lLRBUVlkBLkMqSaXBakzc?Z#IEIp%^!3QtYYmSZ)(E|NC?1J87+SE)q~C;| zO^6bX*2kuZ+VHl=_7<#TYmY`uV^t`#OX;J_C`E{ZRm{tRk~HXBqM}n-$XOrjL94>G zDK}NszXKoDQfMmUF@3 zB+HU!<1e3d+mmj4(rt|;)01v{(rtfa-S()e&G9q-);`Cw|IZw6d#w2X{qcU$|93Fj zA3yp39^(=IzjG8MaR|xUJ_O1|s&?c@2@DY_o(mOQ!IdsQ>zJgo87w!O1swE+Ariyr zG-im*L^gM87r1hpv0SYUy1<%|ec&AQRB4+$32^bOV*lAb9xw8+ck`@)wsR6xh3E)( zXkN!e9D2k~j$xj_y%sZ0WSzdeUBq*h#^NFvck{-J-YSio;Z;miw*}dB)#gOgHJYJT z%oMf-YPxE3)O3vvsC}2=D9ld;E@4{F*7(4=+RMw`r8(=er8cN< z(J5NnrURxru(XJbj3uo=b+@?DE*Pi8za^~66b4m%St=}2_cSc4xUX?}S~)A@fc^9%BSfB#AT zKgzRJ{zn)^mVWq@-xhkW2LYwY=?M`MoLPtrvZH{+cbGAerc#`2v7&)w2$8z4;6oCj z-_gNAfw+5Q@a7H&2CG`w`n+FBT9;vpt33H<@rT}ms}4m{0J(j9x8eH^$03gAPoub9 zGbD+SN(2g1`~yj{w1)C6ofOobH(Q6qWl}gy#FndsckcKe1d((6r)%RRAJ^!gM*Rni7`jzYb z(Iu3a52 zzXC~ryQ6-l2Tv#cZu3;?e<&AP_hANXvi}cD`#MSiJcB?Rn?|#>c$C*%Qq~x>l`g$5A-n!=nh-d!iaSHde z2G}tFNBhG;(f&UiKb`-5l;;-t|IQVI+;;|GCqPCOdA>5Hx|&+%3z1GfeP@&7^z#W8 zH-VtliQkb6`Mxp;)&agpS@b(i0_fzfyGtg(_wg$fp$E(aXiudEsQ@$4-1!y>0h?v_ z+mtb|n?k~{xQJ81_U8LDr7B0T9_Y;@CgM{H`rVe(y*__mY1&n#+4Cg&tDJUEnfLNh zTjg8M7usSep5HSuL#u$9pH;e;se>9N68dMZScGl$@;J2 zivLZXlKn4(<9pU&iQc7k_Te@wf=%}Sa8StqI2;T|Pv?Ig<&pNkHvL(mZ*?mimPz84 zzV=N|;U2)TN(+Q?FMh@KZ*#mt@#eeVN~dN#Q9#w_akQ_m_boV1Q!WqW@+0p_eoeb_ z;lnT#CJ2m9^e2<<@kZSerD}NYg)QRSHKnEYnvrBFRHSnZ#e(VhH;q5o>S-CdwrI3t z6R8BSOwsv~2c1W9ay#O=6VK?`N7h>{r_~oEc zUk|J?RrRDw*JCMvxx=SQY}El7*LH65DOZf50$o3ZcA&C440DCnW-~=`ZX2{2$xs`# zmq`}0GsqTg(C+Zp;-=kpkWrQ_+n~L&a8nrU){!hM&jIbtx5!jGyQ+3E{2OW;;ZzW; ze)FnblnEXHx81L5xLZ|jHH*FNZZ{e_Aw|>Cs7fGt<4te75l$5`Ytzk^Mngg9eG6V8 zhRBl3ba7Hm-u>+Clm1_EraIp)m29*Mv>(SxqiQ$P#KYSufIQ<3HQ`Bl=G*=taJ1p6 zwZ-Kgc)my|vvUV4==?RU+~eDkD+*D$n?kmrpucNzr{Y%G7ekLW$D?gJvs{iKN0ZUoj@#C)2oEAP$s7G4TxLfdf|>aVB#W0#;bp_nCP4ZePz)D&cJ4!(YE zOPFU_6v?Dd1#hHVCpE={LmLGd!EDX#ZS+MXNFrH$Og~aYCZMl>s<7#P3&pER%Tf<0 zUcJF|gVNE3iq2a&DcV+K&X!X$~s1vV>4Ft6x`kj$ygC)J>NNwIk)b8Y#%)B){I zM_2~@&pV;oRxMQmP-%5vVPgCEdTr-KNXa;}T)A?Q@|Le_l-HRNycAA6`;&~jwPJ0% zo^h0Eo2rqWW0o)DnwI+xQZyblEq!ichI5uQ>pHn9pqFqH&?8C0dR>UUQ;%tLqM3tL`8tpGres7`uOHQHABh2L69!4+$5OsTi9ec9h-?@a^HNQ)Y z(s2bTMmFdy7e-O9C~F|RHAF@FjVkzQ$@e>Z8p(gDs2@)L?-$p9{n7C0{Kum_M*b^z z_6|WaL{J>ycn;>6<;Kl!VG#&$%o1w@MY_$m*xm7a+#f?jY;EgFMd-Q6VGCD%Lz_Umi^l#L=!MP7;`1S&{FBP4!A;VW3Nj0X6iFxpS*g1w5Lk` z>r{7lcK$Vx|Km}~{y!K##s5FbW8}X{qeh!rHpu_};Xz6M zkNQvNKOW_&ivP0n>ON-hSDs?GI`pfQxYr-}WxDVnQC~ha_rNhBQR)_sHZaI=;KCR842poU!U2aU31GBHC^K)1$6f$$%-0ToE-zEa z7MGW5t-*hY1w+LVf`2m?MkD$Eu^@b(xYf*305Sda@z z$0}%-0$X%vbTI{~6fRN?(+wOce6EOcMSe% z;Q!wrmezm$;nVq#M|o=Fewi~w_tR5&>g2zg2E9wkrVqCM z9~_Q~_TTW}>He=rd8*{UJ`N;@9%v;1O$v*`k~+eafn?@gTDM>viki@Kx`<0s>3^Q# z&6^8GGW(bOi9W>i5G#Jw_9HI%O>ehe@6$Ub_R)Q%_npk=N!R?oo<{QjVe>!iAC8Oh zKZC)+Q~dX%Jf-uWcisN=NXdNnSAFzt{;E$K_I{mGO}2iW3U^EPutngveslic=a+Ba zzxw#*^%lFvoO*xE4P(wf_qA87sPORH#1)$iy!|U2Md#O;1q-*e?@vFx{`vUL8@sjk z`*&@t$cOhIFJ4~`oDze>VRta@_PhPwVA%FwbS;Tl!4zL)Fy1?PhdjMJJzI@j%w)4S zH^SUfS!{O9g84^E1d>D-L>d*Ceb;~_njpdazri6DVena1?VZQ`m$4VIXAAer8 zz2&-Kx7f#fA^zAy{BeQ$gWFKQnoAP`c6{h*v71pu#B|@SFPB0}uM-kV%Ak1lJxP`_ zRzccv>XJ~f`DV_7Pgcu#3;A+9gcbE*$LZt_jV@h4g2JvTsL3dikzZ>#)pB?^V`SVU zrQi#0>FAnGf*p9-2(M6#C_N*|R5awgXd3U(+0e>EMpHDh{~k8~M}IsRmg2vk^8Y^0 z^8oojifhNtL){Mg+!i-YBfFnhMRtEWdv|&K@#4pc%&1;aD@{ahGjaPXn2tv%4t^hD zPIdF&_@(dY0o*wM$L09nr}&@8d8+(>KkKo-7Z0Ek8TE3*+6M7^_i~)>=-)FgyHa>$ z0Taj9xBCDdKC91-&vf1E_&1#Yck%#j^8bwYi~4^sI(Ulzf0W1Q|9o=Y)dS?6J-H9a zeD-;P%*PFWphCGOo}faNZG1rocCJ%c$%! z`a}ARemZ^g=KSZ=i<2Ln5f)*9mF|;~aG$t-qX+S&j2ik&5?x7*QVaZbUY4a1*wNs29Vcd$4r!)Bs^vfW!VrmJbQ&{6W-vhX!Tf)t zQvBcH;3@w5QJ$^j|7*n(!0<%1638fy=kmVrljAq9!4Dr#H;ex=&*c%}g}quVnzv*& z{_?t1TZ)~Gh=~b&5~_W5M7u$ZyFnbxx;W{r25lv?lo@@@7z`GCarz30{BJmkJyHyR z>2N_-yoOx7G`Gp>D_y0yn}Bb`SJ9KNU%&Y+EWzseuWuT=`vH*p`9By8$HU_JkAwZE z_^(HKwzmIH)x~iSVf~pa#_q%RQ^2;g{Oo)2?rirJFWLJYSba8C$~K?it5F(M~r5uUgy$dfn3y%AGgC}ha1jyJE=yeI(O-Ms}b z@Ax^;{-C)76z+a3a*dy9HcuAs7&()qrnn%oqHzHsMdYS4%t$nP&fqliib8uU!dw!n zE2wj28qP8duL(z=rpktDE7aS-J@@X2u@lY$`TDE^RPG4HUpjy0yif&Yx3m;8G9Q0I z;aePr5xRy%3h1^UH+i7``(gzxMhiw`0kFKZUjiz%>Bwx}qOs!iYY(C?9Y^pU5EJ=7 z#au3xEfTMUUHdAV0H#1$zakPNhG;;-HrRD>$~RjYqGM3GYs2}n*j*wQhH+Ung2iE3 zdPiir@HlIUXn&B(c=bW4PqLw5X z6SpifvQ85mGupNyk*W2;zUA*4O~t;r-i&S9j5W@x8GGbQo5uBywJkhpdUb7YejA-x zugr>X9qLr;KS%mmT8ZhQWl<@6s*!puvTo`wR|TL0#GTT4o>L2msjTju&KU`aJa#PQ z)Ozkx+apeFnVQ3-0gTWI(zjUxP`YlWAl~f%FRUZlERr`)bAjE)UjihqwDvWYdrv-~ z73LGxD|PVO7%@2}A`97W+ft82+a>Vl1#Z}>+L0B-B=EEwk z1Glr;T07M8s&H%c%wbEjAo7{1opOy-8T}qJ)xGZAVT#hV{a!3y8lhocnUz9Z#>d9U zsw#dvD+~`#4(Cdmr+TAW&|D<=^)kNA>qagVzVq4_;;n_Lo}5j4YJ+7dYb>;qfE z41g&Nu239KoR^!C0Q$=OVntg)X+oFk0&&BBxhep0wwxj&tLJysmipmXHU*5{ZEm0D zjJ2_;BFU|aJx^D`cCPCCaqTK7al*h3 z`o&+e-Dww`WE$DB*HM3|ZL&y&yf?<9k`TulDYWV@mP6yKJ-JZxvRpCFz`u&q&DnHH zh-sT3264RQuD;bpRbQ`;7ARVF>7u7YzdET1Fm6x46+)@+qJ_J!f9lNETi$iCak;wn ziVOw;qV#PNB6FjpSVNdzoA37e^86aR;o+dD|DX1MAM4p#|LZ-KhtT+n40mIO)U4#h5L|9Ek6c5Xbh z^$uE1c6nhHrNIJmIxQGWX@yHuVxsw?*!Y_ShTp*m#sMM*2R;x{H0@?F=B=PEoAqE6 zCD$E!E}(5scgyEEY{G6l;_ z66jB|y!q*9`$D0c8#_sf_IWy}=~%aSf>IVLg6CB!@fukrU8leGp}d#lZSC}|y`iLs zAu8}HPA03Ori1&=LEcxq&LgiodqLoAhJ*a%Urr$Blb2GS%5`npIGzhz^#hFOdRMIK z>!eDWR6(m`@s2xGn+Bt*8x&D4agS&6_FGw|@X|H2eHH3~%0NvoX!)s%Dte>A$(lv1b=@t@7yDj$TD?XlAe!Vz3v!Vm^`w6%>Icxb`_<4!E z^B!c2`(R!OP8)fJ+}iTcXGfU2j*@tngkpPut5xZ>lDbtO7psrEyQY)+mDL6P%F_9M zABb;4$askuRqE5-s?S^j?kXu2p@1c1;*)LiQ^hQCKPzcceZHegs@Nk`ZO59{-qf45 zRhupwEP+a+{B<14K!f`>%S)u8*_0xEa1|PnY0lg$W3w#X4SQ=@v!%4DlQ*(ypUlaH z$x+|l`>LKp{vGOj+8o>H|GAV)w7YnLHl6?6FW&z-I6NF3KKXwh;}QO!4~S(XR+lY_ zC8uCr>GM%{IJkbF#=e~53g2>Hs0ni>X4K@R^s46H{qwNv%)?IIL@Y$zo4h=3!*aS+ zN8(r9{LlwG5sF<{yY@5{$uD-aQ|4VF#fcX-P3U!PT`Jt6wx9WH)U&j$HFIy@|%|2piCpZx!i^7tgUN&Fzk zzn#0htz;hZ8z`q~QA}f*LpS$)KB&(9{CKBXZuD^~>H81Sm(n4!9U;YvZV=SHJ_tKVw*#;XY5tyLbfg?Qh~->HTRpv-o?=!3I<=5LDj?2R43 zIw!@jQ_TeY^+g)lmMynwMGs$sojfd(7kXY9-YLraVHCa?|_Qqd%*Rz0lu67RO^j##$6^9rl z$yJtu_G-`uZIi^IZMWObYqaxzSrO&DV{RyUfzM1y+cq>WUwX?G30W3Es@Fm~Sdi_> z@UpIsZbYALDAUKDGdoHIl#9ts4t9?mJF$S!E#TC!ms-7xxlo)5*7t(YWUiCO!B(N^ zY)!eon2Jp#e*=X>FezMglFw zGHtVGTMFSKNfaqp3xRQX9Hk5RE?a^FJJ3cWQE;9*ep3_bFX`-r>A0Ss!Z#hRF3IS8 z%Sco@UNPzQ{=Ay}c_m}>Gzzj&30?x)-JI&Jyeul&{}G<{0z_EvlK=PoZkgZZvnl>} zFdP)^|Kac{|LdbXKKmaL<|J>|(JtmBP2*q}BTd|NSctG6lPGjD9b0icRfXO77~kb% zDip?hIH~Ovs%oSVHLH&+RTj?=FYS8wTbrTh;&!`Moj4^|W#z7~Vu+Ml>ExhIru$tt z(r7#CwgrN+6M1h+=e>5laaAhlq_k$^YzbEoNAgHJS25}q^^Q@Q8nge6|4jckZi9BG z(-E3>>&pk8J15LKH#eYsIL+R;*h($QU3fP(hegz=9Tw4Upfre|5MmcN_zA5gA$|oc zIcEgN^Zb4RN3n2-S7==ak>C|%s42*s$H-3p^gQ&lLI2-J`lpTg-v8iTd5)qH~#1_6ni& zBuUqn*DTj+I(}AS!C}2mg~jhExS!Bk?(XZo+>IFJjhWzRyQh~aK@`O-kN)r2OGf=e z(z7ThosE%}I}B2|gDbQKi8BoKgtv6U?~at9ZDGgR%;Z4T?b(JNJy$3R=D0oL`68#DHl{hJ{bG!L!@71batUKID>cuF>Rp?XWtpZ5 zsY%4=UX5^jG7f*wkKg`VKyCn9uCs@X|LKp1rTp*X{ipoDkMf8+woc?ZE&C{iJgEU- zKoTq2XXV8|7N=Y%WFq%11E{EzH>t~`Huw0 zpuGp$w}4&YJ8epXExZ34h{?M7?0(OTp@CjEK`y2?=OSy;6>Zx zjoV1kuA9n1VK7AuI!$_)no{5|P;h04L78lCy&XC7?4q5*UT?E5IcfQJ>nW(BU0jVwWc^oOoVY$wJFjs#0r|;VfYc=P2w<)uobpFX%ka zf>su@=lZ129VlBOL&uBXhD)=p1J&iaIHnB70djk0hnYP|*MHTgPX0^QdGP!%qr=0Z z{XZV{pW;6rk~^_LW?JGRA9j$|g&w{SM76i>Ebu|fr8{-bwx6h-lriWTbdsgO0v ziRtiwdI@&SSzOO&y=;)5oLG+C%5x+6szj&x;%Qp!my;|Gz<6K$iI?Zu zY=*ypcBk#P!doXIV-A1@gIN|uYw$}3BRs=gQKYFDkZ$W|B%zD)jJLrDhk_{zU`7$3 z$r6bLoRsQv7-twop*(UF;U#7$l-H$W3U;PzF~qOlo%6Cdo{I~5ce}0A86Z*vNFeGC zXR5eCyu<1)_$dMz<#E3PTJ9#`@S1;D9Y|lYEmLWMsZru`?hIh# zB`A$VeEt7xgZ5>6d-RbiY5(t0 z9uLckVYec`d*6b$h|J|Yh>`$CN(HJw3B7bs*&gLLC3z|MwwDJY6!=`9uj~S=spE_# za}*=OXI`36HYbSw5`h#_dYzDviu2IcvI?HB`C!7 zP7MkOjoMm5f?+tlQ)>!FvAsr)o4Wb06F@$!|980G-yfCyzlTrppO5kg>*h|=+pqUl zr5vo5k*Gj9D;WhbzY!-?p?9^lGKz?&%1*MxEMM`-n#Ba@OWx}+uf5DD6O`bqqicd0 zDq>|f=YTRXfnCtfk5*`GoR)l+M@zuzeG5cEkS5`A9!&5CQzjEgx$hj^_jvmm`aF&B?Rmx9fYMfvkCxW)3WB!)CE%-1oUcm!D*R_rDluZYiMXy25r5C8EaoX+CH3VE4`qOhFEh?Hr1$vei0vky(WLOSSu3O@tVWum26{6Q#g?hawN`Ahq6@A*5w+`Z@Zv0JTB#`tjTz&& zjJruXQON`)v#I#$(T2W(YLZ|!T4G+9w-{^Z7JwqUj=Cz1@&?tU2H0nwIW068T4!KY z0A4SyVNEpys7?f{!pw`I2DQcQEoU0UYZ|~vOotLIi`NCkC|n^xvowv+62%Ng zKaeC#DPRc@dshpY*+rkzbXAbJ5?)o9yaZfbfP?Xo)o;OEbGJnPHAJf)s=m$Bto%)5 zoo0*=8|k2!A;O2*>Vaww$KD=PjC7iW=Y_%cP{rS|m$!vd;NIgjm z+c9!p&_{hebYRd2!#)_6)6U->MR92QhqI5HW|}VM;{b)!VH%-J$;fOZ+Vwv9)pWEraPh+G@#ysVBJ zBO%PAG8(8T8@#hI;8Rn-Q>!uW{bsw-H6kflm5oSEU<+=Y8EJ0Fvoskct6k4n3V^n! zn=rbCKgGQtuX>!eVTqw?XUK~wU^$xQmWH=wiD3ht7;a*U;a$06Sj7pB(Nnm;MuI9W z8tb@289Aa%!HX}l(wEe8^$){CFk{IQG917tT8marj?XUNy}r2o?)2TO%k$SCKAoPt zF01Pkm>!3rN8tt;Wy!Mgvygq2U&D0_mpG{WuA6>ElC-YvitoDdiqCoL{sJ`?opbOF zhG9jIU)};hF~@2n2qEu4MaLT=;ex2b!jQbG`wl<6Y+P@P_6mJE*^1r6W;5o6om)4yQt2 zsixd+Y}pbF!?uA^UbgzCamih+B@ZiJWr=L(Gz%L^Ud_Lu|M7}1iR*npd))ds{oiPalnc=L4H^WW<6$A6l*hu$S$2&B0LxJ@+Z zhWPLO{lh~3@8MuPe7gVVQJ&iS|Jee8X_O&(Mq`!`@n)H1v8@!qKawe63n-j~B#T>9 zG)ss+CnXM-N77wfb8DOxNaZq|m6%Vs#+;qxvOjc2g>x&fq&3W2jioazIgC;qqf`FAOHi6n%o4H&U%yT&3NdKzZ+3=6-MWy)$MhpbWCHr)MZO_1k;^FY zwrZonE@NAC`kGH}LF&H&=z!xlZ(0BlM8!qf<|bj`3Dd}%ueML8;r+y%ZDAbBCOe?r zo8q`f7j6B!6PQ0yut>l+$BsWGNC-gz<0Ed%)^7Kk|G2p+-}?c>kbhpK`f{%CafA%t ziOXseChr6BR8a@JFcrnyK-{YvERyRObUuKC@zLa9d<1%{H16pZ{sRPyWfJo5^Z$44 zegnV$3S^&TnHj|TGQ(9Gt1Q8L;?(gv$@sv>yr1vBKVOZ&@yQ$d|A|gYQp%KQd9Q*&lDtfV>Wm(RK2&2}hVu1mJ^mXSHofCKAk9$O zlZowweDEPw3@E4kDvc#vHAxKS6L)m0e4VbGtQ;t(&EjRYPOCnux18&^#AljK-H+-; z4xm)RgZ-0nTlH+T|I`_9L~ef$sNVh?3=YPH{7=LF{^%+H-=jP?@=V$Vx9cE|ff;Un zPK%H5;sm1NR>Oe%~v(=?ZSyfsJiI9C(i+|(Etn^x#DUqr4l&=*GFF_}}L z9*kCyFGMZ=x7YL$h1@-{TlVQrJ#ui$yYt&4W_~c{au8#RX($VE?0gb$D*9FosHwJ- zx3ED=tweZ+f_0$%Xy)hLAv12I#&Qj}M3nL=W^}Ig@ooNXVvWxBz^&=&0dLK0pNkE} ztBGTXoP9ifrDmY;YP;j6hM~(#xf$Vd2p`X1f4ICekUIl-dwl-WW)PxSEsV?a*B5t$ zbM`|`Z)z6i72tmO@c!dj9ffZJ@;;#X1aEPRfgl*ZkE8X6Bw^far)$d4(vixgDttNo zE{S;+P%_rf$Cn>oAHTYM|L)CyUw(N1zA#qpLE9g$sBTu@DTh6knt1o=^wsI{<)_p0 z)9>EAzI^ri)9K0U^FlkT1c!N3mT)aVdG+D+)9VkHC&y>U-<`fWy*MpFf>Gqb*}%E@ zpURQC_@8o?MptjdE6+mZY7abL$vYgJg@K74d45&+AOltTmsM#g;%;2JYZ}+JL(nf7 zCMX1L6t6Hz;w2Zdd3>Wtl_hoxlNngTlD6dOL1|p z>}IEce(_=ob@_GM?q-2fFEx&ShqVu*hlr~i}tGOa@4(5?TMo*2KsW`0^;`jO^DlNw?*8kyBYDKSgf3aN7YPTVp+u~ zC|-#`L6=FaGYO7!UVT#i)xVs{VzZM|+{4)g2n8CHS05@>Rr^flQlu#g@N6v_>`4%_ zgaDtC@ZCdgeu%$Oywbd0-cD8@-R%mX7|>#(4lu8B{&Bb`uj6GJn^}REPdgP{>bA0x zJ6+;>1zJTeI*xv`{x)k z=Vi89sal8CAx)Ag@?&k{T6^ENfJ`1E_X;mahTa{YgY%Q)H?M)taTEd(pC8W>*-2iq zya&UzcMCXSPWeZ@Yu6TeOhuq?$;AEDY^#Z)b~soL$VAoVuPU~K{Ch{wZ@+2u`*c2U z^#3jr%2LRJ#Y6dj`-6jn;{Jbs|LOkE$9W!k|Nr9stM?NSq6jer!X&st1O&-4O(>FY zMJmlWKmh+2UpfH2rv)%;5A%G$#c9~VR_AdCp|92xueIEdQc`z6@gsApf zzknX6buXhtbV&|zM-OoUR+I!+9F|+E0_5$%dG%w**#fnZZrP>*|Io=O>F5uhdfqzx zpC;j5GXQSb|LgDfi~0W!2m4R)Uyt(0{lC`5LZnBNk`)UnT)qF-Z8h2e zOq0;g|K~XE%r2e0f?rru#do#a7Ui>5Qr@7mh-+2WYy+d<}s zqrjaa?!vU97Z#k8D5DIK?=hk5XUrBq%94e3XGMjwiSK6h4`X$)WH*r)?s~omj^s8M z@qMKT60YDC67sEgQ@7lfpoaQ!_f0@Q#-gnCVgmm5_j_#0?moA-R?!Q zbJN<@8J01-C6qjoaSaGQsdYB=Q+g_w7hcJsmL54Z?KS)J@>l0zr{j6lhorC64d7R3 zO>3I@6=X5~1^fzVLYTPjb+@qDl!w{qJH4x+xt?xoFCvHHh6{so$Z+1CN@QOKTH5jO zQ0OIqGDCyso7INTf2rnb8i5_X&r^c2D?ERjv}Q?BGJK2HgP;YkuxMj%!({FNW?qumIRJX@djb4%EN0N2_d;%VUjBkYcM zfNa|TIUJSl|34T$-T(P0kJ$e?6ZuDs!%yFH=Q#WtxckH|x0P4WWHO4}^iKZc?}fVu z&DkgS%0O4+rYaAM%AiuCO+`sZk(LTe81fzvm55HgleIfls<+A}l~>21FT8e-@MW&t zK-1xWR!XiLoo2-J!|JT)#dDJ+rbr<7V1*UHa+62H*oj?sN)h$>M{C#Iy=m=zM&yPb z1z{pg8JeYnEWEu?^+jwE8em?1Gke9Q`6rtYct)rI8!r%pD7cDsXuD{F! z<17VIlCUI5THPora9EW8B}snkq%i?#x?>iz%h zz59FHHqtQKpZ!gsp9=XLC~_1Ro}Y$rYMcKg&22}xK}1WQ16v`x?7 zejeON5F{j#anf|3=!e7-!NCkJbHmI)ncU^ZN^Vr`kr+~1pevgdxILA@Nb0FPJ=%++ zj=mPl!sGC;b`$?ejPA`QmG>G8u9IKOr-XxO@=A$A{&%T-ft*;A{mDiZ>1uUn_NE_q zI)+B>fy#^OoJlOEQo5Y#QWjdXuK?|2ezeDV#Q#WgNYpqSBB6{M__Z>}HDs$*7X?iXIG+ZLC@Dv~fvQ7xj(H1nYFuf+> z-F7Or4ryu54fUj^w|oqQI->}veR(G}&7r5e;npoB4OPSj!1x@+aFZWn8PmwOaj&Kk z*gmWpJXbl_8M;|!h%QMSRbksL_5{rE3XwH)qFjEyC(yKfnrFi-J+6niryWuM=i|u# zo%){{In`1N+@b&V18->8fAYrO7ya*3e1wVmR(e;rcmSODd^!WvZF7JB>wrvmxh&32 z1kjSkQIrii`KGW^kHsbwJssK(1@wzqdGKj|N4zNECp$842CwN!S8Uc$N<9==2!`8J zwl5%T0o|)WE2A&;oKpGirwKAabh@2G=?k!`tXLIRij)^wJ-vjIfpw{_idl7~x8n@L zfT1&EWdr@KDHKUSMpC#CzGB(X{&fdb7jv}*`>(q%-!ENe?>;rW4@;>^?s}AJHQa|R zPfjgOjn*;lLsltCUV5vpL3JgGjU}2E`>L{N_;csN(S6#wxOmICZmLgrP1BZ%`f>p9 zIG;V`{|7mMcF6z1a6Gp2KfKYG{Etua5&oau@_#R1P=0i4`L8uYG$p-T0mvUp|CZOCL&+|kYidcU8myPB(+q&%99+R$(#A~)h*#o8sNHiD`vwivYOuFi=Zfy#A zo7eX!%Wza%NI;~?3nzl>C84TR{W1o9xkmSADlhifV^*B~9af7IB=)&d#X0a82w94# zt8aUN=OmL}#cc@fe4|b&EmBwY%j|8TmPn^v$p6ek#Pc4@hZNdBX6-G|L93K)&T&@W zU;5Wl`PH(fXM$Rx2(K%i!s0M52iK7;J2l$#_8utyH+q3r*gn;(?Idqp*N^zB+n!kD z)_61r)sZAwb-&2b%u}N~hpr|vsku|S;^t3e_AeB&oTcSON%B=}G!SQbNT&ChtXSA- ze5vbYT$~zeGrL za~ZIM{||@0?f>z|U+(|-G@ly&uj}?u06_+mh^&C-4B`|*%LmM~W<&uDGeRj?r;%7h zD8h_tzk&!GY$_Q3rK&m?p)d>1CAm41TjKZKKi_wX^e>^zcNB;Y&~Y+5#7eh&08{*y z6GD;`aPJ@7Va{J<68gakF&IGxIb)Hxh#R3TmJ2}NGG4>OYB;f=Dw?Gky2oTK<75fB zTc@CN?{`2)B4E)+Qy3OR3P2sb-~SZNE+M5VLQ4P0Ia2v&Nse|r7#I|RQwq{I;3<$k zHltaOzn`O!3ylsq1nA}WT;^BwzYnmI7^;D2cPi|NW;mAMl=|BfSOrJTZc7!) ziXr4%NaTaPTCc#+s~?)$Mzz#xz+z-j5|&G)xd|(Jt9!E~W7k=%#v%{5`6WI%KK}Fl z$)E54`_K1X)yqi`cq4J-YHu+0{~L-jSBHF z7p3uvMCcn;Qs|RoEmXafWQ;R13w6QE1g36=wiT`mW^-`=ie{k&N&G~AiDinv7~`5X z@HnHy`|1jvstyVH;1eLAfY+g*9(_b4q>JQr3V&IngI{Z}xm1wy`Mk^-(o=&)NQgO$ z+70GPF^L?M!8P^;)>~&W=!jLxK{Q&BE&AXq|5NnCcWzBTdu-a4ojC}5^bSL^N@K)O zxv$@mY*K2GVlYBle|6fTkv~~en!eLM8@F^XEkKqH{&;6G!K8Ewp5TU#Le+q$pp{YN&fvxF$ zhwILPZUvg%c>}O@c(-;8=3`dd#6|yh&)`lvb+0Ylg9U8UWHf#q4uXEkYTT|qY_}b2 z-`&e;*iA^qt)xMG-k8_9JNF%Rx8w77pk=2MbSpQ192e+55M5qSYtZYL%Hs{#9-ctM zI5Q|~=?|;}mYSe)CeZ*?Lx-R}J?(nh*Dd%sy}6u&d`*1BE?q9dkJD|vqwuq1{;lZ} z;-Q|nKPqVs=jcb}V*iP5(*M}c9`=8RBHZ5i-=qGI@7eahKj?qS|N11K&&&Q7OYK8U ze*vJ@>X)E@FN0t7{^2%%0cMBUAI&a=(R%VtULURFb*#Y<|K_~=(VPPU>^1|w++c^1 zU4_=htgh*Do4LHh-WAYHl|cS53dYltHed|%4jmw$u*b8T)K+*LlW8lkJ&Y9bz5>(I zG?9bZ%#<+DZVZ241L8yaaG4E!B|UmaE@PoVXJ7QW|Flo7{OX#(kEs81k5?x$2NcJMbMtRjd|1LII+4lXqLS^w6=Lfw0T56!XCNUF zI@QI=i+jTkYVO=J77~Ap_BepNjN%>IbU^3Z*RMN8eZ;4tMsDZX=~ajS`;U&Qkm%AP z9X)i#6kKE0Yk3P6P8Ju7gycUze}}@gC?j(KKvyN`qa;N7WPSx%xP1OD z&5*oi$2_su*Jk%hcP#J^Nx3RbvJ-HT7(YugPb$^hRAprOxD1K+Ba$X-FYc~nn?4}C zSh5q~m-w_bk4u5>djbqK49YVIpdqX z13GfIe3TjNl<($7zW|-MF8VYR!uR7EJp-VTD6G?*#d>K1RlZSzT2n{4jsvD7(&K;3 z|4tZgJ|8KGEPg2NElp6u^0`3oSO#D6Mf*YxsyoXXqWv>y+#dN| z(6Hxy4^%3ac4#-vRc@H3y}R`cWeH-4_AoilUpkT17K#C`bXQxOQx(~{ zLz^S;C$VcqEwIXf+Zd?}fmCTO@m?)Es&t%ae?*CIa(<>pt;TavfvoQs`8#K~j@m_~ zOC(!^&LSo=7z?qvg#na%$R%JAtFJ3y_3~bgK>p$d1{YQ<{>yv7$hEj4CvRC4fjbex z!|F)@+G;uQ!7D}$tSN`if22x=ZW&13MBP-rV^E6LIho?gIhJKAK(ft zFlE_B9UlTAn8DKsr5Oq#L(vIXQv}MBBrk8ZG`F@@E<>F=%Rh2I z>mL^TPB)U@_t}IctR8U$5!VhN<8!E7DX=)Jrdx)oGPaLCSf+Bndw^>2`Mrhz4*9RN z^p7q7yVY$UFJWKZIc2skiFI<@a-ZQ)3XWRa#jASCG@dFva zF8x0k*!usNKmM}+Kf$ND{%^|fYq>(eSqy2dEY?d%T&PwEV54$oy%}H@qAiR8uvN}l zedQOW{YgC#NXpwn%}T)L!(5#tYnHCf%jWW^s7m|X;qVmw0y^DJxkR@7H+vaM@XKM*^HV%w{~ z*3`Y$cfHkvv4-l<-H?j)2r5_OJkE$ZZuzLY5HT-KVvK;S=`4&ng-_RvRQltH;@{=7 zP5!eqzE{__e~<>SOaC8vV_W_Q!!P>(C;2pz|J;D3vMlx*$(t(F?aYNq-aB|h;R2o1 zX#>TAlE!eM5Qv}aRRQtS-o|#d3yUFg@=BLqOJb~(7?#HRi9T`xwKe9;uRQJP^Bq}> zCeB+XMU_WN3ljeT$O_bh_C;{~7(CKfR|* z*dLBg0xGJau5n|Fy{q)ygf$4fyb%12SpTi@N3e|@9tym+L_xP}k zB#U?hGQ`p6Oeq440C-PuR2@YMusD9rNVJxBaiioOXCzsng!K;o4^HL;EE!Ab$?@C1lV zLAp-mz4>&B;uvt-PR9J;WN`#C6hnsZk+@XG_#GzE!4r@mb%*EEG(&Uz4n?xC+5bB1 z0dZ3(NyM8RC6J;F#5h5{gWmb|&)1A(=->%B6H6AnJ-Y@G&gemJf!VS6SE7H=oBcaG z7XRuWmWyNlkN!&Ulj8!=42E~>RLDMh@RuHaNDuzfo58z-zx3FO|4lNyIQYx|ckl$f zg_+2QyEuPN4|-`v{)Iwz(8Cde$Fg}w{&mp1ry+^Z@gISKs{McV{pqXkp1*kgU2hdV zdLLW&zwZtGz|Q~Z2Ve3(KF#L|I9tMGfnu`w>n!`*!NI{_p@>cRMrm8!Y0vNZgU;Xn zdJO+|@Z`x8@MG!0PfxWrvcPP)o(VmKWosnTe(5nxQ!0Y)V1|y(H-lcUSAuj1p7y5otP{qb-wS}>(+M2~s|_wA=7h_>9r+uYEkKZ(2A5K52wvY9!?Jr+pqSi zV@&o#qGm`YW?1+FSMOcu-l8Or2oi3{bS1Lgh1SPja9GRnj4DDShI{po&-O;3?Oo$Rxl73^kv z#h-53D=z(}wR&S|H>Psq58I7pL;b|xrk}XflUCXZLzH!cUSKo7;1P)S8ZID@FCf{` zISHxeEzfWkJ%btITm{N|&GBr_RX@&uXX}ON&715e3UzPZ#5=TjdWKfy9)Vku-AXf> zXrmTpi}ea6l6U!|hKqN!W%0T+w)P5Jc^*x5&1=U9yg@U1y}=fGo%&i^dTnjZq&K%j zzD1CUh9ZDdH4OXlmtq(K*D!dFVer}w z!=&er%RJjFk3(SX^JiDjPyc@L>N_AkC*URD^+I1k$$j@8W)zS$qc}o<%=vGCBI(Z; z1F@&hoezZX)enTkyJjThgVsY~*qRd3wz1%5_RT-Q4B=z}9@KG%JhO?oU8B?*zGxJC z#EgQx!U6^JjI89~WoQMlIAuCbQ!2;GYbN(R&ms3DVXm=i#Vo~}zBN__yX<%SlQ!(q zpEeUjy!{rM>-eR7(3)n?qS-fT9$M=oBw2<+#utTT590Q5n{^1fNBb#UIo+ed7P{*= zgnZDF?onl~J(KQ1g;&NTysIUa?}ac!d?E11l9zHbFh7@51oqR@$G5NEUYuW?{`~gh`r_G(=Rco6e|vHE{Q3lR?g@@M$|IE!@ZIGb zfGL2K;srO-#EAF}x0>%}*8`V`8nhNs14~2=3=!qGJZ!cDS;$zzS0a?~n*3#0h0Ej)lRoP8S)BkUVZG0sx)#I7GytwTK8T5iu}C zM2Q}Qb8DnI0h$<^q7ct%vLe(tFh|PwP7z}`Sx}(MmWh)b^($DX;LY_j5TSbfZ0GuJq8FDxkZPB_-g3wF8u;~fdGUc&|GxwV_VYt!{xZ@Rv<>H6hOR~bW@e;sf5 zf?uaVRG{m^Y>@}&Dxw=M9M8RQ`mW8=Z@pRi)@JFKH%s4Q01*l00jfwqCmDk=*J9>) zv4ZkQO58||8AxG9kx0nmYfQEg12Wn(h)oa3$alNj`mUYSZ@rWJ%7A$F17hr?o16bR z0@pX^7q7$+TwHz&SC}u1(mH6kr#$y@LjC!pe9)3?&x|aRkZiJRQSoY{cI1QBsFXES z&j{S{+dBV7lV*;a(Zubz@m$KR*IJqNEM?X!DYI>99*>*RJRWbM*`dsOt(95NQf9r9 zGP^g;HNFM$)1exJX6$z~cC%m4rQCY0m0Qn}+g?ez^` z(IHm7)?(GO#Hv>kt6n>&!D!Hs=D{|a9a7b6Emb{Bh0zAY6QO`_nqXsRblg5#SNXP(tqcI0)zr&ti0>N;T?IPjV#s4H;YC$=EpB zwIjhFv>u6)Eai~Qk!WXtjQoZI%y$Yfj-ZR?mO^{l>kloOM<&fJce&Sap1twjCpp80 zC!j<32`DGtHJ&XMf@!Zmu*P#}j%PcCVAxOz8oHGrj-ZR?mI}eN*AFb32L{b8y&l6+ zvo$mvZQ~X73IKo5n&!Smb70ausd2#QsEueQ@9X2tQ{L?+>1}qXG8{P%RXB1kdRuA( z(_Y`V=ql}Za=UBTFnnj|4&UL(yT+rXrZDaGJ!?FCb3EE<3d3eu8NB@# zn(H+M{-7<*{?ww`)D--7p8KKSOd}lnPK}Tw=%9Je^SL^jCuN%bX)VoaA#24*1Y|~d zF2XdKxDg+$v-oQ&cD+tk)0ee6$*D_2k`F#8*I;asG%-nX9!69SgvInV6!k-I3!C;` zDxKe2rSmP7&No#$&t}ss+o-Z45KtuUtU`r$yU55o6%&|Wyt@G`gE(;#1+O|mLT`!@mU*8nr*tlWZR~5DN%cBzI8-eN|bLZQSR^}i^y>^xAkD`bX!mBv$*Ah z588_M@*K1xw3&K1aAh|M3`|w2^t*vrH6claro%Wc&c@9kbwUA4Pw1M0W;sc`y=n1Sz#0Z_4F=O~z?$imgF&zbSVIGT&>wFD))2FP2{ScUCH^f| zVT4jD3X||d*z?V8nFzkABG&AoM_gHtGAb?wvR%@9J}QM* zQz<-T4nmZ%E>)MfkVFrP9ExU#&I5Oj$JB8WHf?(lHtkt%uYoxfwrL?lrj<6K4Zs*D zcgSh}xtvz*eO6_B0~24T$D+J8gGsYMyI|rBw3|B4tfp;`tfsbT>DLmdCPXoGyBs!H zAdz61L?}a%k$)$tZ>DJn+Z?e@rK2tNmPg7rsdqYO?CEV5?GU(=C#R01s%hJks);?l zUM+$8oa$ng#z@4x2xkn%t2D-Q9EuWpDsT3gtp6!VZ+PMyxKErXj=7z*o!d!yZYSlr z^($PL5|u+PY#v#k7$*yW6F^aRk3-|qGzSIslQ(HQc~+|Lq&#`m1i&2oa7`Im73YZZ z3K=dY6eYB$rmrDm8ao-2E9fYE;&zMrD1l8MoR1H%?P?EuIp=K2`Z5 zw3?v|q=d3XhUhOb$OvH|g_J&!EOOCMFUVULsjzBP3`>H1-y^sFxS6KXA3HS_S4oQ2 z6)CKO6vL7ruc;+)EiL0so>(L=2<4{pQAwv(soHG#4ReyZ-Or0p2_Lw-!|W0mIuZh2wBcg4o5@o=S~oJ68^QUl15QgE34(lz~$|E{gnSDq!F3DGgkKO+o9xroakp3e3PJ zzw7PkFYJ$+IYj#-r$aPwg*yc;!=1#NV~fa%N#vdfPW^_VnSFO?X5fl(3R=fF1y+nx zV8%F^MCuT=!khs~M3^{=^u_Mx%0`q>l1dk;kpkKuHB*cFBd6gSxT2zh)=^P`6%`ej zQBmHO8xhp~PsfEyav};xcsj%_!V5$hAED7W7|#bIIT{U5Ap7N*itU+C{h;BN3bt*j zdL27x9h((cu~~r`o3(AItt}NaTu;Ha^;ECr1|J%mO1_% zfh%?@Xc;>t-n2KKUr&tE&A33zFa6e=O3JqiQCwS9v86ahpMc7b7ujX3_XVr$rMu0=R;<0bD`PQeda%FjW23+_Jle8Rsc#SxAe9WeBcfoFEX* zz&eX5fD30xci@PK3fe|QS;6>$5fP=Rs7J%4MYdKVEgf=PJDB;F(=G!;nys@~rFiIc zPrqT}tM5*H4IG}(psgp=DyJ3nOoh>%zT+;6=Qs5D`)-fFtLRqinp;-Mt)OSBZ0@`r zOKvvwpZo4mELVlC)&;h#`dUHHRMkW_emxp4wWzgLWGO|#erUM#f%fV^8IAsaXgDQ# zTQqDrz8@Mcf!R`C_U%dW_Cdo{r>J$ABCASKzdR`eCmQvW(z^g5M1AHB*)bAIswNc|)MvZ3}H9JtLpB}HZ%I%d^ZqHD;w_{ST@_Ox5UgekY%bJT< z=)D}5i4&K4#no%8xO!#9)hiTNj>gD|M!n+dwN+fL`d40|xNb+IUY%@R{K~T@Wwaj} z^?Fe2+DukyCa=(gI2tZ%!c`xsWqG80oes*l1pDFQ;v?8 zjy8EnMCzsyyFZ;avd^Ydhj})3iQRE)u{*ZJ?${Q)?#n_-Cfc;w`Sa9u{5*Dv^Kol& zKDNa9*cRu$BR%5*XK1m8StRZO6L*6x5L5U6)P{`6u3Xr++P>mV&%)l^z?C`>$@)&_ z{=L0?rQ!wo`h*NTAP|w{YbFj1o^B931Z2$snX4=Hog~$9f^lo5W?WWk#V*G3-*G4rmsOQo%t^+_!$o18vNUe1ERD+w%GlDADeNbHC$ zH*Z{%WTG|X^X?;jsK^qp~AeP>+OcgB{!Q!{DupyEDF?8qG#zIBSxxUFI|E-OZ3 zOEGekClzlw&}iiW<1Y@%XbiUvo8mn%NeC0^LN737a)pcZ6ZutcW6q7zjD(0%RYzN0 z)E1dJ2-9Y_kxyNhk&hiZXY879KE_(E;VE%sAPaEG_uAKR4QMwhK{T=u6ma42NCaIp*fVvc7IVv+p0Wf z3^!c*Gol4%UTjEiGs+bMiX#+qBIJBD3J;mOF0vXsY@Bgh8)sa$amJR7QyolEahwZM zt_eXAR(T28GOyDjQ)@Tsn)vXvPVKL2Ye}Y@M9aS0uS2M9f9OgY0lu zrV}egf*w;>m1BivJ>_jfEaakqyH z-p4@3{;Vm3*;n2N_hl3J2l+e!7b;DH3&VqhZ`X;81B~%3gV{!CGB?>8ov8@AT@9|W zNV5Sk5e^})1Qk!^t?pd>s_%0mG!Y0WUf~#KAcc&fEI9&fiD}-)1EgTK#<39184^hy zD~J<@63Dv?31wi0*aJd|)Vm~j;jQATnG*Ue+W;6YF}mj{E(nY{j`HIA^Q-^qao!28 zq0 zxcUC#8k~K9dUXRXuEDFD9tf8xyc34NkH4&Oc-Q4ygn`8xM~D`ppy2;Kk}Zx`Fj>R+`2P`aT=O^n z-1oi{?;Lx6_cV%dvgj6T;rI~DaYkA1pbM@M66F5)1HQwq9u5z>;H*IH9Mh0wQPDb* zKlB!hWA>I_-hBVV4a@jTuTzu&2!0d-s);B|(8F=KB!r^FgKoEba2m(p3NMz7a@7)L z_b38ga8q95DoFSbA^{cuU!r)`Rjz|a7Xn-PzwZtF;n?E;LD2WU@c&Qo;XF*n8FS9k zeJhs0!GW=!F$HOcS1`lzMlj)sGhv}nZp6BOb$YGhkvVto9eht7&^^kIzyng*v$8FW zW5xd|pbRDv%p%#V?5PJX63O=So4z;%yb|`9dHI(Pjg|`*;6!i)dG?^0qF|X~Pjd={ z4}Z2PPtv(7De53Ugd`PHW22CvY+NrE_J!*ng~J_YZUtCj=# z^)~@Q+>*KhFxk{vyA&)@Ci4HdvCAK38-N*F(H?jX!)3jROqXOG=U1&!;VZgBo1TifoOjP@$#H6V*4HQtmm|)D`?~;V}cvErFpMWo2 zDeDYHV4XxLlM6^7RCL-4NhJAoX7_KpOG{X2)g#9P3IPTn;J~^HnnX&tRKgHZ3g$RQ zd?m9z5d4;8(v69eIXTM3E(1UE)ftgc30p4PNJx8zsV<}zS!Z3rxRvNqR-wYYs|M`& ziGlE8{iyWB)q(FpjHy^aKX$rZxMs`FQ70h@>incvq%n}ZH?c=>f&k1GVtdjaU$hiQ zsJM%>+g($XbtA}NH^P}1tRmf(ftbj8W^yY^@TEc4fTY)vI!KVt#|XR!GeY=e-p*l6 z5y$+w@=LChq&kJg(#DCpS}<~UabLI3L~(!(K*>GMNFun@J% zCm^2(G4NdNC;+OWRz>r9&Kj3~EbK26HMXOO9tEzMHp;459-cvE_J#q~(B zzG+dj+r`?QDF?X9FZT-s-(d!_LT{dJL@@vlMlKm;crGZ=pOiCi4rg)Y-vm!l(*I%iE+*p zLL3oU94*aIh`23*9IUI1+O<5>t)lk)9j0Qts8e4x@%$Hi1a7pY1kk%w9P?peVa<@- zhzZMi76P|8`Z=TUb_;Xu;bf5^O83}{FafHu;VZZKs;e87zFyM}SLDrJ@=}4#J9!}4 z9ZnYKI4ckGamN&{9Hwds1alMd5o%A86eTE9nMx)@V?wjKn1h5cnYATX1x!=%<`JU@k<88k=nmJ2L=NiB)e8>jg=kT{ zdY>kHFL}!_$rt?F%U8K9`K%QGJn*o4pC*SE**%Hiw>U=S71>ccpmV~d=}|`?YIjaL z$M^>EHMO@<1g@@pE66-6$be%eYDL@HXFP1hUcC^S==E&ui?%Z$@X^Jbb%3ZO_ zmeFB{6&0Izz?=8LTNvX=uXJHk>6eaxo)MB6G1sEg`5Y&hZEAMGIhx~yTW7jSND?Y8 zL}MUZ3un%cKW1qDQ*m%`m+!$ICW1pBha?G6%IGl-mnd4tI9YVjy>zP`b8~i)bW;*_ z6B420C%UgLOrkDK81Cv{6qAlqoS+M_6dkKeHrcwk3Lw379mkg>#-U{!U(8<-b}3E0 z%9x+ZF655j5J0LxSkN=`)XRXrScVxNA@g)aytch78$5%HGTeJnE2;nAbP4;z(Mf-b zqF^xbpoh>Pn2+InH1X#s8b*V8*!PD+e*|Z9KOFc7Mrbq*CbRx1nuOD^AC8BUU^_OV zcaBk=j`{i?Wf>P^!g%8?w4JF9xMEibAZtcw2xCb}KCyq*OZab`)kP72;CqtcfAe=^ zZbE@m^`e4Pn5kPAiRlJ%FBA({yTxLfxAiN=?xw-2F@W#Uab0KCH8kk;d!AlGlRoN4 z6R(ek(^-Es9S*$dXxN`Z=uOZhn4wwJ_q;&_N29?Up(&h=!m010!FTCccL>yijUa*+gl(MUm8FUGs?|b{s*p zA_+xoOE0xrnlNLH!lNJFquax$VvW_P==S#e&f(>#7T0jJK~28B&p3QoKN%7+=bQ+x zle`DFKJVkzS`;ECa}Xhlxs{och*n>|#}t#~drUc}eSufPMXvw_!Zj}8UyB4G*%~Zm za}dk+7EB`IQ{ISR%3caHhNUbq_-le=JrD+w;L3az7_V;Yfv&R!azQUf(*nMN?|^!9 z8}M}k?;(!GT58ip>HTs?T#ICAv2npIFI})s7a5EY$Y1-GWZ*pSn;vo98%Nq0;hOK2 zzJTnhk`9N$wN}DXdK<3QBwV9fK(CW?6eEVJuNR*uYtFN-d%q z_#`?HqN);_IAr{LXJb9d#&zS-3+@fFlq;_~JWker zmEC|9+<**G65k_`(3p_Bb*j%JNFq~S4EG5|Y@Mpr8zrd2q5gRt|_ROl49OpX#n^c>F~A`?(#=mPr46sA#NnN4HoPaksXW-c(xIDeS{^9%teEsXMpm(LN9uV=Ezy0<# zI4c^64@&O8&B#i91EAN_b0L1Oh=k_%NqbGp(9&{-H=HFgAr1>~^KK}Z^{xxN&0$e`(`=K!XgeQDZ)m@O_;#&t2rQ{j;*rptq_-z; z1?33vMT#KZfE0&!+B~0&#AAK_%gyy8fLAHW7)+RBXX=QIoxTMAs%ngOx)X|qZM_LA zh?B21oSunlk3ZUB{pLqa^_J;_I0WL#!;H_Li2aZ1I$1Nq1#;ceKV35t^Jm7uNbaoT zPsG()Bx6T1DoFU|#YO&nmC751srhyd0#f#Ui{GK>C61yPaqdoQOygWFAX-m{NzR|a ziodH~t?#0deIHR_&N7JR_|AO7WtiZE zDGZV3s(gZ0kl|27nVkuhnF^gbpY3AYO=uz=G)++wNysu&M08s8Li1Rh{7w1Lkaufc zKA~(7X#9%x_mrZPYisDRgb2rutVJ{yp-RVH>3&fXi9pKgNDHq0qxX~eqs%(Qmh7T; zaFxcW7n2aif{}10tA&g00#mzGs0(!)A@5F{&g(zwf}}3RvE`$HuO6>n3Xv??qFCh- zSF97l02hWj>*jCY0KexCy52q=>9{hN#L=3AT={xyi`IFe2gMCBmFLP0dKIa;d-p0@ z@7=5VQWO#2qHLLMWjvb>pwBzWnUuphbP-Jdi zT<7XbJ_OIWgqG2>uk>C2Qa9(kOBKq|xpMz1DBGPwqAm;EN|s6wDVpf;kZheCiK`W46^OjW zkw`yH7F=V(e7c$LM=UwnbByOG+=O)cLXM(WVC^<(2=mFl^z zYSde2b#92T?Aa812`17`kiHqABl1nD*zB9D7uUS$nj#}$lM`_MtY`MP^~^cHX4QS* zY=UWb+N?XNH`hw=8yqvM_jdGF>7jbI?0da&FVKg}qhLG;X1)i*;ix~G%try7ML{%& z{lTa|orI&&coNRhY>LLi;WQi#`=jA}=#56fWH=A!qaFBY15!u)Zk?SXoY*}*B|y&k zIgKCShE{O1;*Ra9DZ_3sH~Ph09acN3Opo9#OwZ2H8%Dt(@K7`k{b&%(QRGjeS>*fU z@oYRo;cPSygYn4sgIPH6qhJuhe&B@zuMY>4;cyp1#`HXp>@FY59Ts-Ed7YT30PP`d zy_cmOS6fJ?OIWE!VotD9EG#h1jX;aI3dq8-@L{OQl~lC_I#poW!?Z~e?WywwdQvDC zNd2#V=%PY$CL}UFF*av?MIx?-$Lhi)BVO#$1H}>%#v(D1J~$QPwsn*55qW5WX~%+f ztX&x6!p&rF_fj_vcDs77D}nFVccs4_8-ErCa5$RvLw`DigV`WN!*Dd7&%ChjP3OVH z3r54fk7iNekD_@Wj-%0JHs}v$({M1E1>SyG>Fr-SL)*3a&Bh<5A?_KblV?^KJ*x;6 z7q&X_*~YaRzfE1Bds4-CNh}MdbA@2^Lxvf8orKcyd0Mp0UGhZ+smuuINrOZh3`Ffv zVVX%zWb*o z<$$Qmw`X~?dXOy`xjCCcUw464Nrq=J#H%{<^I|UC{SPovHCsf1yaebMLCD`cDy&m= zw30vP+4!|L1Pzj7LXCi9=!68$V+{M+qO zek#HU_`3VGiY}lg^x2w~7lx5x=$wN`c1h@6?dUB-FcOjNHOpJGWjr^Ds^oP54x?Kb zc{ROI{BLVXO{dfEaGq8K<;0MA&ObCU8Tw_7D9b6T&5JkdTy?51*`Qo(GKYOJ z7pHA}A#`t#K(tBV3Wt)vQA`qbX`qfhF1?W7MRMp=!cTTP(}iINqP_YsePgX0fP^ATz+V?=~v7bY3A8Gb+n- zIxwupSf%%&4z8-Qa?!jJU3F4ijDDp4{QmL?r1#+wK&zB(&T)369AQUA?CDWa=9J5O zd6r#|=L)9!@WG`=JXep&T-0UI;moT%mw7AH{~YdV5+w(!D$Q0K*|xiaY1QsDq-ZgY zYRqK{oo0KxG5FZbRVJhFoQiRbfE;k5~{UJ)dwUdJ+JK>P(c9%S+D2Th$+L zF9x=a!mPFAs$wi6P-fVfVD~+tOfXeh9f9D)sBN6bKyrMKIg~kxMHVi}&⩔@Ge&h z3C*!@gZz`F!sQU$ygq*oR5YznV~EhD|6j0#6wG4YWn}m4qTH3pI>Ske{MFhX>bFZr z#3C8}RJM(hW;-{HSeGzfi+y~n>A9^(C_?vpaf5tVBtDNbaW0HplMtc%$Cw1O2Zv+p z_sJiw#niD}KJ_Z8sj8vXTM%V@GBc1ogq1dmTJGAMXbaWMn&QT|ol~-1quBh98yxMg0 zr@#GVDdwtM33t2AXQA>RU^ZD4xs7PqaH|2W268X!+3NQr8*Fq5GvU*(KSRnB#k2!Q zcftq|ujXaaOBYqq58`j4uLx&V1wvxmTcHTAYtIRE(4lI<2Vp$x4KO~09#JLMeJAeWE<{+2qbCQ*&wRpCkTzmd+7tvk}-0B*1G zzmdf8nZQMw!Soi)5foR=Ecg_N0xPO6$%d@OSq9Y+S3tOxMXsIz1Qb8PmXEcoh)z5Yk?_s7Yo&6#9u0r?o-@F>p&w1jrwNqRD z4Cg&tCx4I~uaNy*r~ZR8z#lPfJ0;QS&N3l2H9K@E%kujz3xF8FUhH3+qw-esvKt17 zYj=sW+h03#`W;uaJ14`@)Xwgu zL9|`*>h5mqx~d6)E>+j^2O~cU;A}MZ=3zMSr~M$D_UA$1h0~z#P5SfEXc!@rNm&fb>ibS6))bXySSK@>&SEaNg+R3T6mM^(6{ z3g4G0Ev{v;$1xa#^iD`;x${NHXD--{-(!4_5=3d2TZCBrC5nfy)2_rppPPvA@e z*$e$#w69yMWjH;3x?f|;3ig7fi7&m1SjBu{x)iF5nz4<(QdUE~6rI;~x3i$TOt2^s zQ3uCPNbDSUq#gjl_cu3}>P;PSq)Xh0HNc-A^M9`MDhY>1W}SYgu2*UuoZ9!Bi05;R zEYG6Dz1C+z zse2GU?FucredHxt9A8heLaej_S^N(yiorZ?b8I*Qui#^^{;52r5>8-o$AG1 z9acN3YMlMvpr{D!kA37#qA-g5XcT(W*?c}7Ov7LtqQQJH9*$;Hggig!&nMAjFbe$X zWHg7c-w%ePKCDUYun^MfW;TP)b*sHPK-IUoBC*UQHoiZ@Nu;aOa9F*tc(&VAFWa|f zH+Aq-UmpN=8@B4%R+Ij;>J8Wv`Uik5;I+txXfk!8R=5MjEAea_a&#?TbLA7{kJTAz z6_FmmNf@tnl?XT^_edS7MVcMMFw9RsGZf)%su-r*&2sVnC$z{jM9De}D`g!;g;Lr% z`Lz?K>&{7M;CbGvbJUUUxz0&v@*VE{cGOYP_(n^=+-~T-#GT(to)g`t4&|rdSXM-( zj?`|6YHljJ4A5%fs$2jRW@cVrOdlmzhB+?|#|TJCx{f8kQSI|06iP@687O<~foG~V zob<6Wkuh(S1LcwlC1JKnRf3d~tVc2~L!4HM(hVZ8<{ne5$_>F}Gb7PPcCKg9IM!De z2h4G-WT-B-Y0c{8n~QVhID7N*^!o3elYVJtE>#VNHxy;y;v78XFB}4t+;{I`26T0u zcvI@6-rpypLM}6Wk7Kkz&uIu_vCNe(?WkiG0OiZ4T1oV%lj`@Q{55?Jd_@TRHg|gK zOHqV>@D&k$MEP42Utmo|0bLhnui9OC{l6V9=e*sARqoOiZcIc!Zso30C%ZJ`D&x-w z(*}jpZ{Z5ZxTekwS5$Ed=K8tVTE)@6OmE5akS{Lp2S@zhk+YLcouYOv3RPS)7~WO1 z6r3ux%;?8xe*`W?&dK>2#_9)Ez9;{sip%2`?J0qN7^Wet0EX>BC>NY)aEt8>572uY)y*-luU-Lh1&Mt4obl<)?zr5`M zY3cJHl+B;QhXg=yb9Py(dbmKW*r}pSE#E(Hu3m_zVqY7FO52EHFk2wDYvmR-7mfCo zb45D(ORQcDz&s->sXrGrjl~n;Mz}2i-ijnceGQdzBADw-vnLfGSIBC^vtS*6-=+ev zm;_NgN$FR7h$6*sw02gcujl+vxG-F+qI_Oj&j1ZhzJm`|`)IghXz8M=7B#|l>>3S! z&y7Rf#XfQ&lslL5wlgWP2i$n-~Whl>e zX|-Z3ji4cUt2T*1woYWpQ3a`V^^Jrern$GsV2CbJhDGQENh0$u67M!Y@!Tfp^K571 zVHc+Om<#)uz^I#B_{S-Uy7&I^lf07J;ZGHuR)|u#K(2`8kBm^)--42}xb!DOio{Bs z*4&D#^*bn&B8rwDTD(X=6gS!xP}S))BPof=Vso8xqxdW@m{dhi-^S;9qs^6kdhEoI z$#K)*yHvpM7B!sofjVQg0o;wZ*3HfTlsA^T=H;W8Fhnq10u*6!TgqDA<)X90IU|wS z$hb98vfw5!yI51j-cj?wy7lG6yq4wGxVQu-5x&RK8phmIxzi=fMJY+jV1DO)erw~_ zV~-zjhQ1SbJ8n7mD1&Nu@KJPBfAV4V(ctJKe{*M_HT~4Y+w{C%-|PF{)F0&at;P@y z<`d7K1e4(eMWbLmosH&``FJ#+p!s0#&j#bctl#g?Cf;z2ys1Bf-fVz|^HF~~o$ka; zo`M{l#xc0UizTDrN?!jGfvym@H`yAU33|b0M)*V?eD&q?d41&7(Z||F+FM1B--qXU z-e@oo|9hTi|L+Y(C_-8HvaCpoz ze81_1ly-!f^G%1LckEbv&rtkLhq6tK=n^5;0mpwkIC%0z)c)-XcEP_sdGZ8YhcMwh zWgRnmaBy(&9=sypC8i~2&t=IviS*q)oL`=FcYWTA9t#<)d*tF>1PPdr>ah8}r|rw< a%je7I%jbhX|9=1g0RR7e@mjk83 + +## Helm-Chart + +##### Scan Results + +#### Chart Object: mongodb/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mongodb' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-mongodb' of StatefulSet 'RELEASE-NAME-mongodb' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mongodb' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mongodb' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mongodb' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mongodb' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-mongodb' of StatefulSet 'RELEASE-NAME-mongodb' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mongodb' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mongodb' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mongodb' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mongodb' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mongodb' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mongodb' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-mongodb' of StatefulSet 'RELEASE-NAME-mongodb' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mongodb' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mongodb' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-mongodb' of StatefulSet 'RELEASE-NAME-mongodb' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mongodb' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mongodb' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


StatefulSet 'RELEASE-NAME-mongodb' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-mongodb' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + bitnami/mongodb:4.4.13@sha256:c78b3d35adaae2efe74aa75be9ca31a9825bf43fd88ae50a674d8cf9915f4a45 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: bitnami/mongodb:4.4.13@sha256:c78b3d35adaae2efe74aa75be9ca31a9825bf43fd88ae50a674d8cf9915f4a45 (debian 10.12) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://access.redhat.com/security/cve/CVE-2019-13627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://access.redhat.com/security/cve/CVE-2020-11080
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://nvd.nist.gov/vuln/detail/CVE-2020-11080
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://access.redhat.com/security/cve/CVE-2019-9893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-13115
https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://access.redhat.com/security/cve/CVE-2019-17498
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
https://nvd.nist.gov/vuln/detail/CVE-2019-17498
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
| +| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://www.openwall.com/lists/oss-security/2022/03/24/1
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43784
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.5 | 0.3.7 |
Expand...https://go-review.googlesource.com/c/text/+/340830
https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f
https://pkg.go.dev/vuln/GO-2021-0113
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.5 | 0.3.7 |
Expand...https://go-review.googlesource.com/c/text/+/340830
https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f
https://pkg.go.dev/vuln/GO-2021-0113
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.5 | 0.3.7 |
Expand...https://go-review.googlesource.com/c/text/+/340830
https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f
https://pkg.go.dev/vuln/GO-2021-0113
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.5 | 0.3.7 |
Expand...https://go-review.googlesource.com/c/text/+/340830
https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f
https://pkg.go.dev/vuln/GO-2021-0113
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.5 | 0.3.7 |
Expand...https://go-review.googlesource.com/c/text/+/340830
https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f
https://pkg.go.dev/vuln/GO-2021-0113
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.5 | 0.3.7 |
Expand...https://go-review.googlesource.com/c/text/+/340830
https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f
https://pkg.go.dev/vuln/GO-2021-0113
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.5 | 0.3.7 |
Expand...https://go-review.googlesource.com/c/text/+/340830
https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f
https://pkg.go.dev/vuln/GO-2021-0113
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.5 | 0.3.7 |
Expand...https://go-review.googlesource.com/c/text/+/340830
https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f
https://pkg.go.dev/vuln/GO-2021-0113
| + diff --git a/dependency/mongodb/0.0.1/templates/common.yaml b/dependency/mongodb/0.0.1/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/dependency/mongodb/0.0.1/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/dependency/mongodb/0.0.1/templates/secret.yaml b/dependency/mongodb/0.0.1/templates/secret.yaml new file mode 100644 index 00000000000..c36531b5dbe --- /dev/null +++ b/dependency/mongodb/0.0.1/templates/secret.yaml @@ -0,0 +1,14 @@ +apiVersion: v1 +kind: Secret +metadata: + name: {{ include "common.names.fullname" . }} + labels: + {{- include "common.labels" . | nindent 4 }} + annotations: + {{- with .Values.annotations }} + {{- toYaml . | nindent 4 }} + {{- end }} +type: Opaque +data: + mongodb-password: {{ ( .Values.mongodbPassword | default "empty" ) | b64enc | quote }} + mongodb-root-password: {{ ( .Values.mongodbRootPassword | default "empty" ) | b64enc | quote }} diff --git a/dependency/mongodb/0.0.1/values.yaml b/dependency/mongodb/0.0.1/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/dependency/mongodb/item.yaml b/dependency/mongodb/item.yaml new file mode 100644 index 00000000000..4a966366cde --- /dev/null +++ b/dependency/mongodb/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/mongodb.png +categories: +- database +