From 20b4b30c9be6356584f6d005a4f8bb91e72e08af Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Wed, 25 May 2022 07:14:05 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- .../{2.0.69 => 2.0.70}/CHANGELOG.md | 18 +- core/prometheus/{2.0.69 => 2.0.70}/CONFIG.md | 0 core/prometheus/{2.0.69 => 2.0.70}/Chart.lock | 2 +- core/prometheus/{2.0.69 => 2.0.70}/Chart.yaml | 4 +- core/prometheus/{2.0.69 => 2.0.70}/README.md | 0 .../{2.0.69 => 2.0.70}/app-readme.md | 0 .../charts/common-9.3.17.tgz | Bin .../charts/kube-state-metrics-2.2.24.tgz | Bin .../charts/node-exporter-2.4.16.tgz | Bin .../crds/crd-alertmanager-config.yaml | 0 .../crds/crd-alertmanager.yaml | 0 .../crds/crd-podmonitor.yaml | 0 .../{2.0.69 => 2.0.70}/crds/crd-probes.yaml | 0 .../crds/crd-prometheus.yaml | 0 .../crds/crd-prometheusrules.yaml | 0 .../crds/crd-servicemonitor.yaml | 0 .../crds/crd-thanosrulers.yaml | 0 .../{2.0.69 => 2.0.70}/helm-values.md | 0 .../{2.0.69 => 2.0.70}/ix_values.yaml | 4 +- .../{2.0.69 => 2.0.70}/questions.yaml | 0 .../prometheus/{2.0.69 => 2.0.70}/security.md | 4 +- .../{2.0.69 => 2.0.70}/templates/_helpers.tpl | 0 .../templates/alertmanager/_alertmanager.tpl | 0 .../templates/alertmanager/secrets.yaml | 0 .../alertmanager/serviceaccount.yaml | 0 .../alertmanager/servicemonitor.yaml | 0 .../{2.0.69 => 2.0.70}/templates/common.yaml | 0 .../templates/exporters/core-dns/service.yaml | 0 .../exporters/core-dns/servicemonitor.yaml | 0 .../kube-apiserver/servicemonitor.yaml | 0 .../kube-controller-manager/endpoints.yaml | 0 .../kube-controller-manager/service.yaml | 0 .../servicemonitor.yaml | 0 .../exporters/kube-scheduler/endpoints.yaml | 0 .../exporters/kube-scheduler/service.yaml | 0 .../kube-scheduler/servicemonitor.yaml | 0 .../exporters/kubelet/servicemonitor.yaml | 0 .../templates/operator/_args.tpl | 0 .../templates/operator/configmap.yaml | 0 .../templates/operator/servicemonitor.yaml | 0 .../prometheus/_additionalPrometheusRules.tpl | 0 .../prometheus/_additionalScrapeJobs.tpl | 0 .../templates/prometheus/_prometheus.tpl | 0 .../templates/prometheus/_servicemonitor.tpl | 0 .../templates/prometheus/clusterrole.yaml | 0 .../prometheus/clusterrolebinding.yaml | 0 .../templates/prometheus/serviceaccount.yaml | 0 .../prometheus/{2.0.69 => 2.0.70}/values.yaml | 0 .../mariadb/{2.0.77 => 2.0.78}/CHANGELOG.md | 18 +- .../mariadb/{2.0.77 => 2.0.78}/CONFIG.md | 0 .../mariadb/{2.0.77 => 2.0.78}/Chart.lock | 2 +- .../mariadb/{2.0.77 => 2.0.78}/Chart.yaml | 2 +- .../mariadb/{2.0.77 => 2.0.78}/README.md | 0 .../mariadb/{2.0.77 => 2.0.78}/app-readme.md | 0 .../charts/common-9.3.17.tgz | Bin .../mariadb/{2.0.77 => 2.0.78}/helm-values.md | 0 .../mariadb/{2.0.77 => 2.0.78}/ix_values.yaml | 2 +- .../mariadb/{2.0.77 => 2.0.78}/questions.yaml | 0 .../mariadb/{2.0.77 => 2.0.78}/security.md | 4 +- .../{2.0.77 => 2.0.78}/templates/common.yaml | 0 .../{2.0.77 => 2.0.78}/templates/secret.yaml | 0 .../mariadb/{2.0.77 => 2.0.78}/values.yaml | 0 .../memcached/{2.0.77 => 2.0.78}/CHANGELOG.md | 18 +- .../memcached/{2.0.77 => 2.0.78}/CONFIG.md | 0 .../memcached/{2.0.77 => 2.0.78}/Chart.lock | 2 +- .../memcached/{2.0.77 => 2.0.78}/Chart.yaml | 2 +- .../memcached/{2.0.77 => 2.0.78}/README.md | 0 .../{2.0.77 => 2.0.78}/app-readme.md | 0 .../charts/common-9.3.17.tgz | Bin .../{2.0.77 => 2.0.78}/helm-values.md | 0 .../{2.0.77 => 2.0.78}/ix_values.yaml | 2 +- .../{2.0.77 => 2.0.78}/questions.yaml | 0 .../memcached/{2.0.77 => 2.0.78}/security.md | 4 +- .../{2.0.77 => 2.0.78}/templates/common.yaml | 0 .../memcached/{2.0.77 => 2.0.78}/values.yaml | 0 .../mongodb/{0.1.34 => 0.1.35}/CHANGELOG.md | 18 +- .../mongodb/{0.1.34 => 0.1.35}/CONFIG.md | 0 .../mongodb/{0.1.34 => 0.1.35}/Chart.lock | 2 +- .../mongodb/{0.1.34 => 0.1.35}/Chart.yaml | 2 +- .../mongodb/{0.1.34 => 0.1.35}/README.md | 0 .../mongodb/{0.1.34 => 0.1.35}/app-readme.md | 0 .../charts/common-9.3.17.tgz | Bin .../mongodb/{0.1.34 => 0.1.35}/helm-values.md | 0 .../mongodb/{0.1.34 => 0.1.35}/ix_values.yaml | 2 +- .../mongodb/{0.1.34 => 0.1.35}/questions.yaml | 0 .../mongodb/{0.1.34 => 0.1.35}/security.md | 4 +- .../{0.1.34 => 0.1.35}/templates/common.yaml | 0 .../{0.1.34 => 0.1.35}/templates/secret.yaml | 0 .../mongodb/{0.1.34 => 0.1.35}/values.yaml | 0 .../{7.0.78 => 7.0.79}/CHANGELOG.md | 18 +- .../postgresql/{7.0.78 => 7.0.79}/CONFIG.md | 0 dependency/postgresql/7.0.79/Chart.lock | 6 + .../postgresql/{7.0.78 => 7.0.79}/Chart.yaml | 2 +- .../postgresql/{7.0.78 => 7.0.79}/README.md | 0 .../{7.0.78 => 7.0.79}/app-readme.md | 0 .../charts/common-9.3.17.tgz | Bin .../{7.0.78 => 7.0.79}/helm-values.md | 0 .../{7.0.78 => 7.0.79}/ix_values.yaml | 2 +- .../{7.0.78 => 7.0.79}/questions.yaml | 0 .../postgresql/{7.0.78 => 7.0.79}/security.md | 4 +- .../templates/backup-postgres-config.yaml | 0 .../{7.0.78 => 7.0.79}/templates/common.yaml | 0 .../{7.0.78 => 7.0.79}/templates/secret.yaml | 0 .../upgrade-backup-postgres-hook.yaml | 0 .../postgresql/{7.0.78 => 7.0.79}/values.yaml | 0 games/minecraft-java/0.0.56/Chart.lock | 6 - .../{0.0.56 => 0.0.57}/CHANGELOG.md | 18 +- .../{0.0.56 => 0.0.57}/CONFIG.md | 0 games/minecraft-java/0.0.57/Chart.lock | 6 + .../{0.0.56 => 0.0.57}/Chart.yaml | 2 +- .../{0.0.56 => 0.0.57}/README.md | 0 .../{0.0.56 => 0.0.57}/app-readme.md | 0 .../charts/common-9.3.17.tgz | Bin .../{0.0.56 => 0.0.57}/ci/base-values.yaml | 0 .../{0.0.56 => 0.0.57}/ci/j11-values.yaml | 2 +- .../{0.0.56 => 0.0.57}/ci/j11j9-values.yaml | 0 .../{0.0.56 => 0.0.57}/ci/j8-values.yaml | 2 +- .../{0.0.56 => 0.0.57}/ci/j8j9-values.yaml | 0 .../{0.0.56 => 0.0.57}/helm-values.md | 0 .../{0.0.56 => 0.0.57}/ix_values.yaml | 6 +- .../{0.0.56 => 0.0.57}/questions.yaml | 0 .../{0.0.56 => 0.0.57}/security.md | 4 +- .../{0.0.56 => 0.0.57}/templates/common.yaml | 0 .../{0.0.56 => 0.0.57}/values.yaml | 0 .../ghost/{1.0.38 => 1.0.39}/CHANGELOG.md | 18 +- incubator/ghost/{1.0.38 => 1.0.39}/CONFIG.md | 0 incubator/ghost/{1.0.38 => 1.0.39}/Chart.lock | 2 +- incubator/ghost/{1.0.38 => 1.0.39}/Chart.yaml | 4 +- incubator/ghost/{1.0.38 => 1.0.39}/README.md | 0 .../ghost/{1.0.38 => 1.0.39}/app-readme.md | 0 .../charts/common-9.3.17.tgz | Bin .../charts/mariadb-2.0.76.tgz | Bin .../ghost/{1.0.38 => 1.0.39}/helm-values.md | 0 .../ghost/{1.0.38 => 1.0.39}/ix_values.yaml | 2 +- .../ghost/{1.0.38 => 1.0.39}/questions.yaml | 0 .../ghost/{1.0.38 => 1.0.39}/security.md | 14 +- .../{1.0.38 => 1.0.39}/templates/common.yaml | 0 .../ghost/{1.0.38 => 1.0.39}/values.yaml | 0 .../{1.0.15 => 1.0.16}/CHANGELOG.md | 18 +- stable/audiobookshelf/1.0.16/Chart.lock | 6 + .../{1.0.15 => 1.0.16}/Chart.yaml | 4 +- .../{1.0.15 => 1.0.16}/README.md | 0 .../{1.0.15 => 1.0.16}/app-readme.md | 0 .../charts/common-9.3.17.tgz | Bin .../{1.0.15 => 1.0.16}/ix_values.yaml | 2 +- .../{1.0.15 => 1.0.16}/questions.yaml | 0 .../{1.0.15 => 1.0.16}/security.md | 4 +- .../{1.0.15 => 1.0.16}/templates/_secrets.tpl | 0 .../{1.0.15 => 1.0.16}/templates/common.yaml | 0 .../{1.0.15 => 1.0.16}/values.yaml | 0 stable/cyberchef/1.0.25/Chart.lock | 6 - .../cyberchef/{1.0.25 => 1.0.26}/CHANGELOG.md | 20 +- .../1.0.15 => cyberchef/1.0.26}/Chart.lock | 2 +- .../cyberchef/{1.0.25 => 1.0.26}/Chart.yaml | 2 +- stable/cyberchef/{1.0.25 => 1.0.26}/README.md | 0 .../{1.0.25 => 1.0.26}/app-readme.md | 0 .../charts/common-9.3.17.tgz | Bin .../{1.0.25 => 1.0.26}/ix_values.yaml | 2 +- .../{1.0.25 => 1.0.26}/questions.yaml | 0 .../cyberchef/{1.0.25 => 1.0.26}/security.md | 10 +- .../{1.0.25 => 1.0.26}/templates/common.yaml | 0 .../cyberchef/{1.0.25 => 1.0.26}/values.yaml | 0 stable/deconz/7.0.25/Chart.lock | 6 - stable/deconz/{7.0.25 => 7.0.26}/CHANGELOG.md | 18 +- stable/deconz/{7.0.25 => 7.0.26}/CONFIG.md | 0 stable/deconz/7.0.26/Chart.lock | 6 + stable/deconz/{7.0.25 => 7.0.26}/Chart.yaml | 4 +- stable/deconz/{7.0.25 => 7.0.26}/README.md | 0 .../deconz/{7.0.25 => 7.0.26}/app-readme.md | 0 .../charts/common-9.3.17.tgz | Bin .../{7.0.25 => 7.0.26}/ci/test-values.yaml | 0 .../deconz/{7.0.25 => 7.0.26}/helm-values.md | 0 .../deconz/{7.0.25 => 7.0.26}/ix_values.yaml | 2 +- .../deconz/{7.0.25 => 7.0.26}/questions.yaml | 0 stable/deconz/{7.0.25 => 7.0.26}/security.md | 33 +- .../{7.0.25 => 7.0.26}/templates/common.yaml | 0 stable/deconz/{7.0.25 => 7.0.26}/values.yaml | 0 stable/dokuwiki/2.0.26/Chart.lock | 6 - .../dokuwiki/{2.0.26 => 2.0.27}/CHANGELOG.md | 20 +- stable/dokuwiki/{2.0.26 => 2.0.27}/CONFIG.md | 0 stable/dokuwiki/2.0.27/Chart.lock | 6 + stable/dokuwiki/{2.0.26 => 2.0.27}/Chart.yaml | 2 +- stable/dokuwiki/{2.0.26 => 2.0.27}/README.md | 0 .../dokuwiki/{2.0.26 => 2.0.27}/app-readme.md | 0 .../charts/common-9.3.17.tgz | Bin .../{2.0.26 => 2.0.27}/helm-values.md | 0 .../{2.0.26 => 2.0.27}/ix_values.yaml | 2 +- .../{2.0.26 => 2.0.27}/questions.yaml | 0 .../dokuwiki/{2.0.26 => 2.0.27}/security.md | 4 +- .../{2.0.26 => 2.0.27}/templates/common.yaml | 0 .../dokuwiki/{2.0.26 => 2.0.27}/values.yaml | 0 stable/double-take/1.0.14/Chart.lock | 6 - .../{1.0.14 => 1.0.15}/CHANGELOG.md | 18 +- .../double-take/{1.0.14 => 1.0.15}/CONFIG.md | 0 stable/double-take/1.0.15/Chart.lock | 6 + .../double-take/{1.0.14 => 1.0.15}/Chart.yaml | 4 +- .../double-take/{1.0.14 => 1.0.15}/README.md | 0 .../{1.0.14 => 1.0.15}/app-readme.md | 0 .../charts/common-9.3.17.tgz | Bin .../{1.0.14 => 1.0.15}/helm-values.md | 0 .../{1.0.14 => 1.0.15}/ix_values.yaml | 2 +- .../{1.0.14 => 1.0.15}/questions.yaml | 0 .../{1.0.14 => 1.0.15}/security.md | 127 +- .../{1.0.14 => 1.0.15}/templates/common.yaml | 0 .../{1.0.14 => 1.0.15}/values.yaml | 0 stable/esphome/10.0.24/CHANGELOG.md | 99 + .../5.0.19 => esphome/10.0.24}/CONFIG.md | 0 stable/esphome/10.0.24/Chart.lock | 6 + stable/esphome/10.0.24/Chart.yaml | 29 + stable/esphome/10.0.24/README.md | 38 + stable/esphome/10.0.24/app-readme.md | 3 + .../10.0.24}/charts/common-9.3.17.tgz | Bin stable/esphome/10.0.24/helm-values.md | 31 + stable/esphome/10.0.24/ix_values.yaml | 39 + stable/esphome/10.0.24/questions.yaml | 2570 +++++++++++++++++ stable/esphome/10.0.24/security.md | 322 +++ .../10.0.24}/templates/common.yaml | 0 .../5.0.19 => esphome/10.0.24}/values.yaml | 0 stable/hyperion-ng/5.0.19/Chart.lock | 6 - .../{5.0.19 => 5.0.20}/CHANGELOG.md | 18 +- .../3.0.31 => hyperion-ng/5.0.20}/CONFIG.md | 0 stable/hyperion-ng/5.0.20/Chart.lock | 6 + .../hyperion-ng/{5.0.19 => 5.0.20}/Chart.yaml | 2 +- .../hyperion-ng/{5.0.19 => 5.0.20}/README.md | 0 .../{5.0.19 => 5.0.20}/app-readme.md | 0 .../5.0.20}/charts/common-9.3.17.tgz | Bin .../{5.0.19 => 5.0.20}/helm-values.md | 0 .../{5.0.19 => 5.0.20}/ix_values.yaml | 2 +- .../{5.0.19 => 5.0.20}/questions.yaml | 0 .../{5.0.19 => 5.0.20}/security.md | 8 +- .../5.0.20}/templates/common.yaml | 0 .../3.0.31 => hyperion-ng/5.0.20}/values.yaml | 0 .../logitech-media-server/3.0.31/Chart.lock | 6 - .../{3.0.31 => 3.0.32}/CHANGELOG.md | 18 +- .../3.0.32}/CONFIG.md | 0 .../logitech-media-server/3.0.32}/Chart.lock | 2 +- .../{3.0.31 => 3.0.32}/Chart.yaml | 2 +- .../{3.0.31 => 3.0.32}/README.md | 0 .../{3.0.31 => 3.0.32}/app-readme.md | 0 .../3.0.32}/charts/common-9.3.17.tgz | Bin .../{3.0.31 => 3.0.32}/helm-values.md | 0 .../{3.0.31 => 3.0.32}/ix_values.yaml | 2 +- .../{3.0.31 => 3.0.32}/questions.yaml | 0 .../{3.0.31 => 3.0.32}/security.md | 6 +- .../3.0.32}/templates/common.yaml | 0 .../3.0.32}/values.yaml | 0 stable/matomo/{1.0.61 => 1.0.62}/CHANGELOG.md | 20 +- .../{n8n/2.0.33 => matomo/1.0.62}/CONFIG.md | 0 stable/matomo/{1.0.61 => 1.0.62}/Chart.lock | 2 +- stable/matomo/{1.0.61 => 1.0.62}/Chart.yaml | 4 +- stable/matomo/{1.0.61 => 1.0.62}/README.md | 0 .../matomo/{1.0.61 => 1.0.62}/app-readme.md | 0 .../1.0.62}/charts/common-9.3.17.tgz | Bin .../charts/mariadb-2.0.76.tgz | Bin .../matomo/{1.0.61 => 1.0.62}/helm-values.md | 0 .../matomo/{1.0.61 => 1.0.62}/ix_values.yaml | 2 +- .../matomo/{1.0.61 => 1.0.62}/questions.yaml | 0 stable/matomo/{1.0.61 => 1.0.62}/security.md | 12 +- .../1.0.62}/templates/common.yaml | 0 .../{n8n/2.0.33 => matomo/1.0.62}/values.yaml | 0 stable/n8n/{2.0.33 => 2.0.34}/CHANGELOG.md | 18 +- .../{outline/1.0.25 => n8n/2.0.34}/CONFIG.md | 0 .../{outline/1.0.25 => n8n/2.0.34}/Chart.lock | 2 +- stable/n8n/{2.0.33 => 2.0.34}/Chart.yaml | 4 +- stable/n8n/{2.0.33 => 2.0.34}/README.md | 0 stable/n8n/{2.0.33 => 2.0.34}/app-readme.md | 0 .../2.0.34}/charts/common-9.3.17.tgz | Bin .../charts/postgresql-7.0.77.tgz | Bin .../charts/redis-2.0.69.tgz | Bin stable/n8n/{2.0.33 => 2.0.34}/helm-values.md | 0 stable/n8n/{2.0.33 => 2.0.34}/ix_values.yaml | 2 +- stable/n8n/{2.0.33 => 2.0.34}/questions.yaml | 0 stable/n8n/{2.0.33 => 2.0.34}/security.md | 0 .../templates/_configmap.tpl | 0 .../{2.0.33 => 2.0.34}/templates/common.yaml | 0 .../1.0.25 => n8n/2.0.34}/values.yaml | 0 .../outline/{1.0.25 => 1.0.26}/CHANGELOG.md | 18 +- .../2.0.24 => outline/1.0.26}/CONFIG.md | 0 .../{n8n/2.0.33 => outline/1.0.26}/Chart.lock | 2 +- stable/outline/{1.0.25 => 1.0.26}/Chart.yaml | 4 +- stable/outline/{1.0.25 => 1.0.26}/README.md | 0 .../outline/{1.0.25 => 1.0.26}/app-readme.md | 0 .../1.0.26}/charts/common-9.3.17.tgz | Bin .../charts/postgresql-7.0.77.tgz | Bin .../charts/redis-2.0.69.tgz | Bin .../outline/{1.0.25 => 1.0.26}/helm-values.md | 0 .../outline/{1.0.25 => 1.0.26}/ix_values.yaml | 2 +- .../outline/{1.0.25 => 1.0.26}/questions.yaml | 0 stable/outline/{1.0.25 => 1.0.26}/security.md | 18 +- .../{1.0.25 => 1.0.26}/templates/_secrets.tpl | 0 .../{1.0.25 => 1.0.26}/templates/common.yaml | 0 .../2.0.24 => outline/1.0.26}/values.yaml | 0 .../snipe-it/{2.0.24 => 2.0.25}/CHANGELOG.md | 18 +- .../1.0.16 => snipe-it/2.0.25}/CONFIG.md | 0 stable/snipe-it/{2.0.24 => 2.0.25}/Chart.lock | 2 +- stable/snipe-it/{2.0.24 => 2.0.25}/Chart.yaml | 4 +- stable/snipe-it/{2.0.24 => 2.0.25}/README.md | 0 .../snipe-it/{2.0.24 => 2.0.25}/app-readme.md | 0 .../2.0.25}/charts/common-9.3.17.tgz | Bin .../charts/mariadb-2.0.76.tgz | Bin .../charts/redis-2.0.69.tgz | Bin .../{2.0.24 => 2.0.25}/helm-values.md | 0 .../{2.0.24 => 2.0.25}/ix_values.yaml | 2 +- .../{2.0.24 => 2.0.25}/questions.yaml | 0 .../snipe-it/{2.0.24 => 2.0.25}/security.md | 24 +- .../{2.0.24 => 2.0.25}/templates/_secrets.tpl | 0 .../{2.0.24 => 2.0.25}/templates/common.yaml | 0 .../1.0.16 => snipe-it/2.0.25}/values.yaml | 0 stable/xwiki/{1.0.16 => 1.0.17}/CHANGELOG.md | 18 +- stable/xwiki/1.0.17/CONFIG.md | 7 + stable/xwiki/{1.0.16 => 1.0.17}/Chart.lock | 2 +- stable/xwiki/{1.0.16 => 1.0.17}/Chart.yaml | 4 +- stable/xwiki/{1.0.16 => 1.0.17}/README.md | 0 stable/xwiki/{1.0.16 => 1.0.17}/app-readme.md | 0 stable/xwiki/1.0.17/charts/common-9.3.17.tgz | Bin 0 -> 44145 bytes .../charts/postgresql-7.0.77.tgz | Bin .../xwiki/{1.0.16 => 1.0.17}/helm-values.md | 0 .../xwiki/{1.0.16 => 1.0.17}/ix_values.yaml | 2 +- .../xwiki/{1.0.16 => 1.0.17}/questions.yaml | 0 stable/xwiki/{1.0.16 => 1.0.17}/security.md | 27 +- stable/xwiki/1.0.17/templates/common.yaml | 1 + stable/xwiki/1.0.17/values.yaml | 0 stable/zwavejs2mqtt/10.0.29/CHANGELOG.md | 99 + stable/zwavejs2mqtt/10.0.29/CONFIG.md | 7 + stable/zwavejs2mqtt/10.0.29/Chart.lock | 6 + stable/zwavejs2mqtt/10.0.29/Chart.yaml | 32 + stable/zwavejs2mqtt/10.0.29/README.md | 38 + stable/zwavejs2mqtt/10.0.29/app-readme.md | 3 + .../10.0.29/charts/common-9.3.17.tgz | Bin 0 -> 44145 bytes stable/zwavejs2mqtt/10.0.29/helm-values.md | 31 + stable/zwavejs2mqtt/10.0.29/ix_values.yaml | 86 + stable/zwavejs2mqtt/10.0.29/questions.yaml | 2532 ++++++++++++++++ stable/zwavejs2mqtt/10.0.29/security.md | 157 + .../10.0.29/templates/common.yaml | 1 + stable/zwavejs2mqtt/10.0.29/values.yaml | 0 335 files changed, 6567 insertions(+), 443 deletions(-) rename core/prometheus/{2.0.69 => 2.0.70}/CHANGELOG.md (91%) rename core/prometheus/{2.0.69 => 2.0.70}/CONFIG.md (100%) rename core/prometheus/{2.0.69 => 2.0.70}/Chart.lock (89%) rename core/prometheus/{2.0.69 => 2.0.70}/Chart.yaml (97%) rename core/prometheus/{2.0.69 => 2.0.70}/README.md (100%) rename core/prometheus/{2.0.69 => 2.0.70}/app-readme.md (100%) rename core/prometheus/{2.0.69 => 2.0.70}/charts/common-9.3.17.tgz (100%) rename core/prometheus/{2.0.69 => 2.0.70}/charts/kube-state-metrics-2.2.24.tgz (100%) rename core/prometheus/{2.0.69 => 2.0.70}/charts/node-exporter-2.4.16.tgz (100%) rename core/prometheus/{2.0.69 => 2.0.70}/crds/crd-alertmanager-config.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/crds/crd-alertmanager.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/crds/crd-podmonitor.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/crds/crd-probes.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/crds/crd-prometheus.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/crds/crd-prometheusrules.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/crds/crd-servicemonitor.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/crds/crd-thanosrulers.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/helm-values.md (100%) rename core/prometheus/{2.0.69 => 2.0.70}/ix_values.yaml (99%) rename core/prometheus/{2.0.69 => 2.0.70}/questions.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/security.md (99%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/_helpers.tpl (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/alertmanager/_alertmanager.tpl (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/alertmanager/secrets.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/alertmanager/serviceaccount.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/alertmanager/servicemonitor.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/common.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/exporters/core-dns/service.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/exporters/core-dns/servicemonitor.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/exporters/kube-apiserver/servicemonitor.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/exporters/kube-controller-manager/endpoints.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/exporters/kube-controller-manager/service.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/exporters/kube-controller-manager/servicemonitor.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/exporters/kube-scheduler/endpoints.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/exporters/kube-scheduler/service.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/exporters/kube-scheduler/servicemonitor.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/exporters/kubelet/servicemonitor.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/operator/_args.tpl (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/operator/configmap.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/operator/servicemonitor.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/prometheus/_additionalPrometheusRules.tpl (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/prometheus/_additionalScrapeJobs.tpl (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/prometheus/_prometheus.tpl (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/prometheus/_servicemonitor.tpl (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/prometheus/clusterrole.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/prometheus/clusterrolebinding.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/templates/prometheus/serviceaccount.yaml (100%) rename core/prometheus/{2.0.69 => 2.0.70}/values.yaml (100%) rename dependency/mariadb/{2.0.77 => 2.0.78}/CHANGELOG.md (91%) rename dependency/mariadb/{2.0.77 => 2.0.78}/CONFIG.md (100%) rename dependency/mariadb/{2.0.77 => 2.0.78}/Chart.lock (80%) rename dependency/mariadb/{2.0.77 => 2.0.78}/Chart.yaml (98%) rename dependency/mariadb/{2.0.77 => 2.0.78}/README.md (100%) rename dependency/mariadb/{2.0.77 => 2.0.78}/app-readme.md (100%) rename dependency/mariadb/{2.0.77 => 2.0.78}/charts/common-9.3.17.tgz (100%) rename dependency/mariadb/{2.0.77 => 2.0.78}/helm-values.md (100%) rename dependency/mariadb/{2.0.77 => 2.0.78}/ix_values.yaml (97%) rename dependency/mariadb/{2.0.77 => 2.0.78}/questions.yaml (100%) rename dependency/mariadb/{2.0.77 => 2.0.78}/security.md (99%) rename dependency/mariadb/{2.0.77 => 2.0.78}/templates/common.yaml (100%) rename dependency/mariadb/{2.0.77 => 2.0.78}/templates/secret.yaml (100%) rename dependency/mariadb/{2.0.77 => 2.0.78}/values.yaml (100%) rename dependency/memcached/{2.0.77 => 2.0.78}/CHANGELOG.md (91%) rename dependency/memcached/{2.0.77 => 2.0.78}/CONFIG.md (100%) rename dependency/memcached/{2.0.77 => 2.0.78}/Chart.lock (80%) rename dependency/memcached/{2.0.77 => 2.0.78}/Chart.yaml (98%) rename dependency/memcached/{2.0.77 => 2.0.78}/README.md (100%) rename dependency/memcached/{2.0.77 => 2.0.78}/app-readme.md (100%) rename dependency/memcached/{2.0.77 => 2.0.78}/charts/common-9.3.17.tgz (100%) rename dependency/memcached/{2.0.77 => 2.0.78}/helm-values.md (100%) rename dependency/memcached/{2.0.77 => 2.0.78}/ix_values.yaml (65%) rename dependency/memcached/{2.0.77 => 2.0.78}/questions.yaml (100%) rename dependency/memcached/{2.0.77 => 2.0.78}/security.md (99%) rename dependency/memcached/{2.0.77 => 2.0.78}/templates/common.yaml (100%) rename dependency/memcached/{2.0.77 => 2.0.78}/values.yaml (100%) rename dependency/mongodb/{0.1.34 => 0.1.35}/CHANGELOG.md (89%) rename dependency/mongodb/{0.1.34 => 0.1.35}/CONFIG.md (100%) rename dependency/mongodb/{0.1.34 => 0.1.35}/Chart.lock (80%) rename dependency/mongodb/{0.1.34 => 0.1.35}/Chart.yaml (98%) rename dependency/mongodb/{0.1.34 => 0.1.35}/README.md (100%) rename dependency/mongodb/{0.1.34 => 0.1.35}/app-readme.md (100%) rename dependency/mongodb/{0.1.34 => 0.1.35}/charts/common-9.3.17.tgz (100%) rename dependency/mongodb/{0.1.34 => 0.1.35}/helm-values.md (100%) rename dependency/mongodb/{0.1.34 => 0.1.35}/ix_values.yaml (97%) rename dependency/mongodb/{0.1.34 => 0.1.35}/questions.yaml (100%) rename dependency/mongodb/{0.1.34 => 0.1.35}/security.md (99%) rename dependency/mongodb/{0.1.34 => 0.1.35}/templates/common.yaml (100%) rename dependency/mongodb/{0.1.34 => 0.1.35}/templates/secret.yaml (100%) rename dependency/mongodb/{0.1.34 => 0.1.35}/values.yaml (100%) rename dependency/postgresql/{7.0.78 => 7.0.79}/CHANGELOG.md (89%) rename dependency/postgresql/{7.0.78 => 7.0.79}/CONFIG.md (100%) create mode 100644 dependency/postgresql/7.0.79/Chart.lock rename dependency/postgresql/{7.0.78 => 7.0.79}/Chart.yaml (97%) rename dependency/postgresql/{7.0.78 => 7.0.79}/README.md (100%) rename dependency/postgresql/{7.0.78 => 7.0.79}/app-readme.md (100%) rename dependency/postgresql/{7.0.78 => 7.0.79}/charts/common-9.3.17.tgz (100%) rename dependency/postgresql/{7.0.78 => 7.0.79}/helm-values.md (100%) rename dependency/postgresql/{7.0.78 => 7.0.79}/ix_values.yaml (97%) rename dependency/postgresql/{7.0.78 => 7.0.79}/questions.yaml (100%) rename dependency/postgresql/{7.0.78 => 7.0.79}/security.md (99%) rename dependency/postgresql/{7.0.78 => 7.0.79}/templates/backup-postgres-config.yaml (100%) rename dependency/postgresql/{7.0.78 => 7.0.79}/templates/common.yaml (100%) rename dependency/postgresql/{7.0.78 => 7.0.79}/templates/secret.yaml (100%) rename dependency/postgresql/{7.0.78 => 7.0.79}/templates/upgrade-backup-postgres-hook.yaml (100%) rename dependency/postgresql/{7.0.78 => 7.0.79}/values.yaml (100%) delete mode 100644 games/minecraft-java/0.0.56/Chart.lock rename games/minecraft-java/{0.0.56 => 0.0.57}/CHANGELOG.md (91%) rename games/minecraft-java/{0.0.56 => 0.0.57}/CONFIG.md (100%) create mode 100644 games/minecraft-java/0.0.57/Chart.lock rename games/minecraft-java/{0.0.56 => 0.0.57}/Chart.yaml (97%) rename games/minecraft-java/{0.0.56 => 0.0.57}/README.md (100%) rename games/minecraft-java/{0.0.56 => 0.0.57}/app-readme.md (100%) rename games/minecraft-java/{0.0.56 => 0.0.57}/charts/common-9.3.17.tgz (100%) rename games/minecraft-java/{0.0.56 => 0.0.57}/ci/base-values.yaml (100%) rename games/minecraft-java/{0.0.56 => 0.0.57}/ci/j11-values.yaml (54%) rename games/minecraft-java/{0.0.56 => 0.0.57}/ci/j11j9-values.yaml (100%) rename games/minecraft-java/{0.0.56 => 0.0.57}/ci/j8-values.yaml (56%) rename games/minecraft-java/{0.0.56 => 0.0.57}/ci/j8j9-values.yaml (100%) rename games/minecraft-java/{0.0.56 => 0.0.57}/helm-values.md (100%) rename games/minecraft-java/{0.0.56 => 0.0.57}/ix_values.yaml (86%) rename games/minecraft-java/{0.0.56 => 0.0.57}/questions.yaml (100%) rename games/minecraft-java/{0.0.56 => 0.0.57}/security.md (99%) rename games/minecraft-java/{0.0.56 => 0.0.57}/templates/common.yaml (100%) rename games/minecraft-java/{0.0.56 => 0.0.57}/values.yaml (100%) rename incubator/ghost/{1.0.38 => 1.0.39}/CHANGELOG.md (88%) rename incubator/ghost/{1.0.38 => 1.0.39}/CONFIG.md (100%) rename incubator/ghost/{1.0.38 => 1.0.39}/Chart.lock (85%) rename incubator/ghost/{1.0.38 => 1.0.39}/Chart.yaml (96%) rename incubator/ghost/{1.0.38 => 1.0.39}/README.md (100%) rename incubator/ghost/{1.0.38 => 1.0.39}/app-readme.md (100%) rename incubator/ghost/{1.0.38 => 1.0.39}/charts/common-9.3.17.tgz (100%) rename incubator/ghost/{1.0.38 => 1.0.39}/charts/mariadb-2.0.76.tgz (100%) rename incubator/ghost/{1.0.38 => 1.0.39}/helm-values.md (100%) rename incubator/ghost/{1.0.38 => 1.0.39}/ix_values.yaml (95%) rename incubator/ghost/{1.0.38 => 1.0.39}/questions.yaml (100%) rename incubator/ghost/{1.0.38 => 1.0.39}/security.md (99%) rename incubator/ghost/{1.0.38 => 1.0.39}/templates/common.yaml (100%) rename incubator/ghost/{1.0.38 => 1.0.39}/values.yaml (100%) rename stable/audiobookshelf/{1.0.15 => 1.0.16}/CHANGELOG.md (90%) create mode 100644 stable/audiobookshelf/1.0.16/Chart.lock rename stable/audiobookshelf/{1.0.15 => 1.0.16}/Chart.yaml (95%) rename stable/audiobookshelf/{1.0.15 => 1.0.16}/README.md (100%) rename stable/audiobookshelf/{1.0.15 => 1.0.16}/app-readme.md (100%) rename stable/audiobookshelf/{1.0.15 => 1.0.16}/charts/common-9.3.17.tgz (100%) rename stable/audiobookshelf/{1.0.15 => 1.0.16}/ix_values.yaml (87%) rename stable/audiobookshelf/{1.0.15 => 1.0.16}/questions.yaml (100%) rename stable/audiobookshelf/{1.0.15 => 1.0.16}/security.md (99%) rename stable/audiobookshelf/{1.0.15 => 1.0.16}/templates/_secrets.tpl (100%) rename stable/audiobookshelf/{1.0.15 => 1.0.16}/templates/common.yaml (100%) rename stable/audiobookshelf/{1.0.15 => 1.0.16}/values.yaml (100%) delete mode 100644 stable/cyberchef/1.0.25/Chart.lock rename stable/cyberchef/{1.0.25 => 1.0.26}/CHANGELOG.md (87%) rename stable/{audiobookshelf/1.0.15 => cyberchef/1.0.26}/Chart.lock (80%) rename stable/cyberchef/{1.0.25 => 1.0.26}/Chart.yaml (97%) rename stable/cyberchef/{1.0.25 => 1.0.26}/README.md (100%) rename stable/cyberchef/{1.0.25 => 1.0.26}/app-readme.md (100%) rename stable/cyberchef/{1.0.25 => 1.0.26}/charts/common-9.3.17.tgz (100%) rename stable/cyberchef/{1.0.25 => 1.0.26}/ix_values.yaml (76%) rename stable/cyberchef/{1.0.25 => 1.0.26}/questions.yaml (100%) rename stable/cyberchef/{1.0.25 => 1.0.26}/security.md (89%) rename stable/cyberchef/{1.0.25 => 1.0.26}/templates/common.yaml (100%) rename stable/cyberchef/{1.0.25 => 1.0.26}/values.yaml (100%) delete mode 100644 stable/deconz/7.0.25/Chart.lock rename stable/deconz/{7.0.25 => 7.0.26}/CHANGELOG.md (90%) rename stable/deconz/{7.0.25 => 7.0.26}/CONFIG.md (100%) create mode 100644 stable/deconz/7.0.26/Chart.lock rename stable/deconz/{7.0.25 => 7.0.26}/Chart.yaml (95%) rename stable/deconz/{7.0.25 => 7.0.26}/README.md (100%) rename stable/deconz/{7.0.25 => 7.0.26}/app-readme.md (100%) rename stable/deconz/{7.0.25 => 7.0.26}/charts/common-9.3.17.tgz (100%) rename stable/deconz/{7.0.25 => 7.0.26}/ci/test-values.yaml (100%) rename stable/deconz/{7.0.25 => 7.0.26}/helm-values.md (100%) rename stable/deconz/{7.0.25 => 7.0.26}/ix_values.yaml (94%) rename stable/deconz/{7.0.25 => 7.0.26}/questions.yaml (100%) rename stable/deconz/{7.0.25 => 7.0.26}/security.md (96%) rename stable/deconz/{7.0.25 => 7.0.26}/templates/common.yaml (100%) rename stable/deconz/{7.0.25 => 7.0.26}/values.yaml (100%) delete mode 100644 stable/dokuwiki/2.0.26/Chart.lock rename stable/dokuwiki/{2.0.26 => 2.0.27}/CHANGELOG.md (88%) rename stable/dokuwiki/{2.0.26 => 2.0.27}/CONFIG.md (100%) create mode 100644 stable/dokuwiki/2.0.27/Chart.lock rename stable/dokuwiki/{2.0.26 => 2.0.27}/Chart.yaml (98%) rename stable/dokuwiki/{2.0.26 => 2.0.27}/README.md (100%) rename stable/dokuwiki/{2.0.26 => 2.0.27}/app-readme.md (100%) rename stable/dokuwiki/{2.0.26 => 2.0.27}/charts/common-9.3.17.tgz (100%) rename stable/dokuwiki/{2.0.26 => 2.0.27}/helm-values.md (100%) rename stable/dokuwiki/{2.0.26 => 2.0.27}/ix_values.yaml (85%) rename stable/dokuwiki/{2.0.26 => 2.0.27}/questions.yaml (100%) rename stable/dokuwiki/{2.0.26 => 2.0.27}/security.md (99%) rename stable/dokuwiki/{2.0.26 => 2.0.27}/templates/common.yaml (100%) rename stable/dokuwiki/{2.0.26 => 2.0.27}/values.yaml (100%) delete mode 100644 stable/double-take/1.0.14/Chart.lock rename stable/double-take/{1.0.14 => 1.0.15}/CHANGELOG.md (90%) rename stable/double-take/{1.0.14 => 1.0.15}/CONFIG.md (100%) create mode 100644 stable/double-take/1.0.15/Chart.lock rename stable/double-take/{1.0.14 => 1.0.15}/Chart.yaml (95%) rename stable/double-take/{1.0.14 => 1.0.15}/README.md (100%) rename stable/double-take/{1.0.14 => 1.0.15}/app-readme.md (100%) rename stable/double-take/{1.0.14 => 1.0.15}/charts/common-9.3.17.tgz (100%) rename stable/double-take/{1.0.14 => 1.0.15}/helm-values.md (100%) rename stable/double-take/{1.0.14 => 1.0.15}/ix_values.yaml (72%) rename stable/double-take/{1.0.14 => 1.0.15}/questions.yaml (100%) rename stable/double-take/{1.0.14 => 1.0.15}/security.md (98%) rename stable/double-take/{1.0.14 => 1.0.15}/templates/common.yaml (100%) rename stable/double-take/{1.0.14 => 1.0.15}/values.yaml (100%) create mode 100644 stable/esphome/10.0.24/CHANGELOG.md rename stable/{hyperion-ng/5.0.19 => esphome/10.0.24}/CONFIG.md (100%) create mode 100644 stable/esphome/10.0.24/Chart.lock create mode 100644 stable/esphome/10.0.24/Chart.yaml create mode 100644 stable/esphome/10.0.24/README.md create mode 100644 stable/esphome/10.0.24/app-readme.md rename stable/{hyperion-ng/5.0.19 => esphome/10.0.24}/charts/common-9.3.17.tgz (100%) create mode 100644 stable/esphome/10.0.24/helm-values.md create mode 100644 stable/esphome/10.0.24/ix_values.yaml create mode 100644 stable/esphome/10.0.24/questions.yaml create mode 100644 stable/esphome/10.0.24/security.md rename stable/{hyperion-ng/5.0.19 => esphome/10.0.24}/templates/common.yaml (100%) rename stable/{hyperion-ng/5.0.19 => esphome/10.0.24}/values.yaml (100%) delete mode 100644 stable/hyperion-ng/5.0.19/Chart.lock rename stable/hyperion-ng/{5.0.19 => 5.0.20}/CHANGELOG.md (90%) rename stable/{logitech-media-server/3.0.31 => hyperion-ng/5.0.20}/CONFIG.md (100%) create mode 100644 stable/hyperion-ng/5.0.20/Chart.lock rename stable/hyperion-ng/{5.0.19 => 5.0.20}/Chart.yaml (97%) rename stable/hyperion-ng/{5.0.19 => 5.0.20}/README.md (100%) rename stable/hyperion-ng/{5.0.19 => 5.0.20}/app-readme.md (100%) rename stable/{logitech-media-server/3.0.31 => hyperion-ng/5.0.20}/charts/common-9.3.17.tgz (100%) rename stable/hyperion-ng/{5.0.19 => 5.0.20}/helm-values.md (100%) rename stable/hyperion-ng/{5.0.19 => 5.0.20}/ix_values.yaml (92%) rename stable/hyperion-ng/{5.0.19 => 5.0.20}/questions.yaml (100%) rename stable/hyperion-ng/{5.0.19 => 5.0.20}/security.md (99%) rename stable/{logitech-media-server/3.0.31 => hyperion-ng/5.0.20}/templates/common.yaml (100%) rename stable/{logitech-media-server/3.0.31 => hyperion-ng/5.0.20}/values.yaml (100%) delete mode 100644 stable/logitech-media-server/3.0.31/Chart.lock rename stable/logitech-media-server/{3.0.31 => 3.0.32}/CHANGELOG.md (91%) rename stable/{matomo/1.0.61 => logitech-media-server/3.0.32}/CONFIG.md (100%) rename {dependency/postgresql/7.0.78 => stable/logitech-media-server/3.0.32}/Chart.lock (80%) rename stable/logitech-media-server/{3.0.31 => 3.0.32}/Chart.yaml (98%) rename stable/logitech-media-server/{3.0.31 => 3.0.32}/README.md (100%) rename stable/logitech-media-server/{3.0.31 => 3.0.32}/app-readme.md (100%) rename stable/{matomo/1.0.61 => logitech-media-server/3.0.32}/charts/common-9.3.17.tgz (100%) rename stable/logitech-media-server/{3.0.31 => 3.0.32}/helm-values.md (100%) rename stable/logitech-media-server/{3.0.31 => 3.0.32}/ix_values.yaml (95%) rename stable/logitech-media-server/{3.0.31 => 3.0.32}/questions.yaml (100%) rename stable/logitech-media-server/{3.0.31 => 3.0.32}/security.md (99%) rename stable/{matomo/1.0.61 => logitech-media-server/3.0.32}/templates/common.yaml (100%) rename stable/{matomo/1.0.61 => logitech-media-server/3.0.32}/values.yaml (100%) rename stable/matomo/{1.0.61 => 1.0.62}/CHANGELOG.md (87%) rename stable/{n8n/2.0.33 => matomo/1.0.62}/CONFIG.md (100%) rename stable/matomo/{1.0.61 => 1.0.62}/Chart.lock (85%) rename stable/matomo/{1.0.61 => 1.0.62}/Chart.yaml (95%) rename stable/matomo/{1.0.61 => 1.0.62}/README.md (100%) rename stable/matomo/{1.0.61 => 1.0.62}/app-readme.md (100%) rename stable/{n8n/2.0.33 => matomo/1.0.62}/charts/common-9.3.17.tgz (100%) rename stable/matomo/{1.0.61 => 1.0.62}/charts/mariadb-2.0.76.tgz (100%) rename stable/matomo/{1.0.61 => 1.0.62}/helm-values.md (100%) rename stable/matomo/{1.0.61 => 1.0.62}/ix_values.yaml (96%) rename stable/matomo/{1.0.61 => 1.0.62}/questions.yaml (100%) rename stable/matomo/{1.0.61 => 1.0.62}/security.md (99%) rename stable/{xwiki/1.0.16 => matomo/1.0.62}/templates/common.yaml (100%) rename stable/{n8n/2.0.33 => matomo/1.0.62}/values.yaml (100%) rename stable/n8n/{2.0.33 => 2.0.34}/CHANGELOG.md (91%) rename stable/{outline/1.0.25 => n8n/2.0.34}/CONFIG.md (100%) rename stable/{outline/1.0.25 => n8n/2.0.34}/Chart.lock (88%) rename stable/n8n/{2.0.33 => 2.0.34}/Chart.yaml (95%) rename stable/n8n/{2.0.33 => 2.0.34}/README.md (100%) rename stable/n8n/{2.0.33 => 2.0.34}/app-readme.md (100%) rename stable/{outline/1.0.25 => n8n/2.0.34}/charts/common-9.3.17.tgz (100%) rename stable/n8n/{2.0.33 => 2.0.34}/charts/postgresql-7.0.77.tgz (100%) rename stable/n8n/{2.0.33 => 2.0.34}/charts/redis-2.0.69.tgz (100%) rename stable/n8n/{2.0.33 => 2.0.34}/helm-values.md (100%) rename stable/n8n/{2.0.33 => 2.0.34}/ix_values.yaml (97%) rename stable/n8n/{2.0.33 => 2.0.34}/questions.yaml (100%) rename stable/n8n/{2.0.33 => 2.0.34}/security.md (100%) rename stable/n8n/{2.0.33 => 2.0.34}/templates/_configmap.tpl (100%) rename stable/n8n/{2.0.33 => 2.0.34}/templates/common.yaml (100%) rename stable/{outline/1.0.25 => n8n/2.0.34}/values.yaml (100%) rename stable/outline/{1.0.25 => 1.0.26}/CHANGELOG.md (87%) rename stable/{snipe-it/2.0.24 => outline/1.0.26}/CONFIG.md (100%) rename stable/{n8n/2.0.33 => outline/1.0.26}/Chart.lock (88%) rename stable/outline/{1.0.25 => 1.0.26}/Chart.yaml (96%) rename stable/outline/{1.0.25 => 1.0.26}/README.md (100%) rename stable/outline/{1.0.25 => 1.0.26}/app-readme.md (100%) rename stable/{snipe-it/2.0.24 => outline/1.0.26}/charts/common-9.3.17.tgz (100%) rename stable/outline/{1.0.25 => 1.0.26}/charts/postgresql-7.0.77.tgz (100%) rename stable/outline/{1.0.25 => 1.0.26}/charts/redis-2.0.69.tgz (100%) rename stable/outline/{1.0.25 => 1.0.26}/helm-values.md (100%) rename stable/outline/{1.0.25 => 1.0.26}/ix_values.yaml (96%) rename stable/outline/{1.0.25 => 1.0.26}/questions.yaml (100%) rename stable/outline/{1.0.25 => 1.0.26}/security.md (99%) rename stable/outline/{1.0.25 => 1.0.26}/templates/_secrets.tpl (100%) rename stable/outline/{1.0.25 => 1.0.26}/templates/common.yaml (100%) rename stable/{snipe-it/2.0.24 => outline/1.0.26}/values.yaml (100%) rename stable/snipe-it/{2.0.24 => 2.0.25}/CHANGELOG.md (90%) rename stable/{xwiki/1.0.16 => snipe-it/2.0.25}/CONFIG.md (100%) rename stable/snipe-it/{2.0.24 => 2.0.25}/Chart.lock (88%) rename stable/snipe-it/{2.0.24 => 2.0.25}/Chart.yaml (96%) rename stable/snipe-it/{2.0.24 => 2.0.25}/README.md (100%) rename stable/snipe-it/{2.0.24 => 2.0.25}/app-readme.md (100%) rename stable/{xwiki/1.0.16 => snipe-it/2.0.25}/charts/common-9.3.17.tgz (100%) rename stable/snipe-it/{2.0.24 => 2.0.25}/charts/mariadb-2.0.76.tgz (100%) rename stable/snipe-it/{2.0.24 => 2.0.25}/charts/redis-2.0.69.tgz (100%) rename stable/snipe-it/{2.0.24 => 2.0.25}/helm-values.md (100%) rename stable/snipe-it/{2.0.24 => 2.0.25}/ix_values.yaml (95%) rename stable/snipe-it/{2.0.24 => 2.0.25}/questions.yaml (100%) rename stable/snipe-it/{2.0.24 => 2.0.25}/security.md (99%) rename stable/snipe-it/{2.0.24 => 2.0.25}/templates/_secrets.tpl (100%) rename stable/snipe-it/{2.0.24 => 2.0.25}/templates/common.yaml (100%) rename stable/{xwiki/1.0.16 => snipe-it/2.0.25}/values.yaml (100%) rename stable/xwiki/{1.0.16 => 1.0.17}/CHANGELOG.md (90%) create mode 100644 stable/xwiki/1.0.17/CONFIG.md rename stable/xwiki/{1.0.16 => 1.0.17}/Chart.lock (85%) rename stable/xwiki/{1.0.16 => 1.0.17}/Chart.yaml (95%) rename stable/xwiki/{1.0.16 => 1.0.17}/README.md (100%) rename stable/xwiki/{1.0.16 => 1.0.17}/app-readme.md (100%) create mode 100644 stable/xwiki/1.0.17/charts/common-9.3.17.tgz rename stable/xwiki/{1.0.16 => 1.0.17}/charts/postgresql-7.0.77.tgz (100%) rename stable/xwiki/{1.0.16 => 1.0.17}/helm-values.md (100%) rename stable/xwiki/{1.0.16 => 1.0.17}/ix_values.yaml (89%) rename stable/xwiki/{1.0.16 => 1.0.17}/questions.yaml (100%) rename stable/xwiki/{1.0.16 => 1.0.17}/security.md (95%) create mode 100644 stable/xwiki/1.0.17/templates/common.yaml create mode 100644 stable/xwiki/1.0.17/values.yaml create mode 100644 stable/zwavejs2mqtt/10.0.29/CHANGELOG.md create mode 100644 stable/zwavejs2mqtt/10.0.29/CONFIG.md create mode 100644 stable/zwavejs2mqtt/10.0.29/Chart.lock create mode 100644 stable/zwavejs2mqtt/10.0.29/Chart.yaml create mode 100644 stable/zwavejs2mqtt/10.0.29/README.md create mode 100644 stable/zwavejs2mqtt/10.0.29/app-readme.md create mode 100644 stable/zwavejs2mqtt/10.0.29/charts/common-9.3.17.tgz create mode 100644 stable/zwavejs2mqtt/10.0.29/helm-values.md create mode 100644 stable/zwavejs2mqtt/10.0.29/ix_values.yaml create mode 100644 stable/zwavejs2mqtt/10.0.29/questions.yaml create mode 100644 stable/zwavejs2mqtt/10.0.29/security.md create mode 100644 stable/zwavejs2mqtt/10.0.29/templates/common.yaml create mode 100644 stable/zwavejs2mqtt/10.0.29/values.yaml diff --git a/core/prometheus/2.0.69/CHANGELOG.md b/core/prometheus/2.0.70/CHANGELOG.md similarity index 91% rename from core/prometheus/2.0.69/CHANGELOG.md rename to core/prometheus/2.0.70/CHANGELOG.md index 1ab768a3b2b..eb402e67373 100644 --- a/core/prometheus/2.0.69/CHANGELOG.md +++ b/core/prometheus/2.0.70/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [prometheus-2.0.70](https://github.com/truecharts/apps/compare/prometheus-2.0.69...prometheus-2.0.70) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [prometheus-2.0.69](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-3.0.17...prometheus-2.0.69) (2022-05-24) @@ -88,12 +97,3 @@ - -### [prometheus-2.0.58](https://github.com/truecharts/apps/compare/prometheus-2.0.57...prometheus-2.0.58) (2022-05-15) - -#### Chore - -* update docker general non-major ([#2686](https://github.com/truecharts/apps/issues/2686)) - - - diff --git a/core/prometheus/2.0.69/CONFIG.md b/core/prometheus/2.0.70/CONFIG.md similarity index 100% rename from core/prometheus/2.0.69/CONFIG.md rename to core/prometheus/2.0.70/CONFIG.md diff --git a/core/prometheus/2.0.69/Chart.lock b/core/prometheus/2.0.70/Chart.lock similarity index 89% rename from core/prometheus/2.0.69/Chart.lock rename to core/prometheus/2.0.70/Chart.lock index 40a1ede94e4..a5bf40c286d 100644 --- a/core/prometheus/2.0.69/Chart.lock +++ b/core/prometheus/2.0.70/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://charts.bitnami.com/bitnami version: 2.2.24 digest: sha256:73da44420f95b7b95d84abeff8b5e28d813df221c0a990c57c5c403430d5083d -generated: "2022-05-24T18:20:58.975982824Z" +generated: "2022-05-25T06:55:08.168634035Z" diff --git a/core/prometheus/2.0.69/Chart.yaml b/core/prometheus/2.0.70/Chart.yaml similarity index 97% rename from core/prometheus/2.0.69/Chart.yaml rename to core/prometheus/2.0.70/Chart.yaml index 8927b18ab0b..471b3744bfc 100644 --- a/core/prometheus/2.0.69/Chart.yaml +++ b/core/prometheus/2.0.70/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "0.56.2" +appVersion: "0.56.3" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -28,7 +28,7 @@ sources: - https://github.com/prometheus-community/helm-charts - https://github.com/prometheus-operator/kube-prometheus type: application -version: 2.0.69 +version: 2.0.70 annotations: truecharts.org/catagories: | - metrics diff --git a/core/prometheus/2.0.69/README.md b/core/prometheus/2.0.70/README.md similarity index 100% rename from core/prometheus/2.0.69/README.md rename to core/prometheus/2.0.70/README.md diff --git a/core/prometheus/2.0.69/app-readme.md b/core/prometheus/2.0.70/app-readme.md similarity index 100% rename from core/prometheus/2.0.69/app-readme.md rename to core/prometheus/2.0.70/app-readme.md diff --git a/core/prometheus/2.0.69/charts/common-9.3.17.tgz b/core/prometheus/2.0.70/charts/common-9.3.17.tgz similarity index 100% rename from core/prometheus/2.0.69/charts/common-9.3.17.tgz rename to core/prometheus/2.0.70/charts/common-9.3.17.tgz diff --git a/core/prometheus/2.0.69/charts/kube-state-metrics-2.2.24.tgz b/core/prometheus/2.0.70/charts/kube-state-metrics-2.2.24.tgz similarity index 100% rename from core/prometheus/2.0.69/charts/kube-state-metrics-2.2.24.tgz rename to core/prometheus/2.0.70/charts/kube-state-metrics-2.2.24.tgz diff --git a/core/prometheus/2.0.69/charts/node-exporter-2.4.16.tgz b/core/prometheus/2.0.70/charts/node-exporter-2.4.16.tgz similarity index 100% rename from core/prometheus/2.0.69/charts/node-exporter-2.4.16.tgz rename to core/prometheus/2.0.70/charts/node-exporter-2.4.16.tgz diff --git a/core/prometheus/2.0.69/crds/crd-alertmanager-config.yaml b/core/prometheus/2.0.70/crds/crd-alertmanager-config.yaml similarity index 100% rename from core/prometheus/2.0.69/crds/crd-alertmanager-config.yaml rename to core/prometheus/2.0.70/crds/crd-alertmanager-config.yaml diff --git a/core/prometheus/2.0.69/crds/crd-alertmanager.yaml b/core/prometheus/2.0.70/crds/crd-alertmanager.yaml similarity index 100% rename from core/prometheus/2.0.69/crds/crd-alertmanager.yaml rename to core/prometheus/2.0.70/crds/crd-alertmanager.yaml diff --git a/core/prometheus/2.0.69/crds/crd-podmonitor.yaml b/core/prometheus/2.0.70/crds/crd-podmonitor.yaml similarity index 100% rename from core/prometheus/2.0.69/crds/crd-podmonitor.yaml rename to core/prometheus/2.0.70/crds/crd-podmonitor.yaml diff --git a/core/prometheus/2.0.69/crds/crd-probes.yaml b/core/prometheus/2.0.70/crds/crd-probes.yaml similarity index 100% rename from core/prometheus/2.0.69/crds/crd-probes.yaml rename to core/prometheus/2.0.70/crds/crd-probes.yaml diff --git a/core/prometheus/2.0.69/crds/crd-prometheus.yaml b/core/prometheus/2.0.70/crds/crd-prometheus.yaml similarity index 100% rename from core/prometheus/2.0.69/crds/crd-prometheus.yaml rename to core/prometheus/2.0.70/crds/crd-prometheus.yaml diff --git a/core/prometheus/2.0.69/crds/crd-prometheusrules.yaml b/core/prometheus/2.0.70/crds/crd-prometheusrules.yaml similarity index 100% rename from core/prometheus/2.0.69/crds/crd-prometheusrules.yaml rename to core/prometheus/2.0.70/crds/crd-prometheusrules.yaml diff --git a/core/prometheus/2.0.69/crds/crd-servicemonitor.yaml b/core/prometheus/2.0.70/crds/crd-servicemonitor.yaml similarity index 100% rename from core/prometheus/2.0.69/crds/crd-servicemonitor.yaml rename to core/prometheus/2.0.70/crds/crd-servicemonitor.yaml diff --git a/core/prometheus/2.0.69/crds/crd-thanosrulers.yaml b/core/prometheus/2.0.70/crds/crd-thanosrulers.yaml similarity index 100% rename from core/prometheus/2.0.69/crds/crd-thanosrulers.yaml rename to core/prometheus/2.0.70/crds/crd-thanosrulers.yaml diff --git a/core/prometheus/2.0.69/helm-values.md b/core/prometheus/2.0.70/helm-values.md similarity index 100% rename from core/prometheus/2.0.69/helm-values.md rename to core/prometheus/2.0.70/helm-values.md diff --git a/core/prometheus/2.0.69/ix_values.yaml b/core/prometheus/2.0.70/ix_values.yaml similarity index 99% rename from core/prometheus/2.0.69/ix_values.yaml rename to core/prometheus/2.0.70/ix_values.yaml index aefadaab609..e57784c0fea 100644 --- a/core/prometheus/2.0.69/ix_values.yaml +++ b/core/prometheus/2.0.70/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/prometheus-operator - tag: v0.56.2@sha256:fd3745eda50b88cd5626d5b3d0ecea22559e98e6042568ff077f7102eaef422d + tag: v0.56.3@sha256:7dcd175be97d3a0144ec5e1aeb991b2fa00a54594002303d45f690ab7f9c3579 prometheusImage: repository: tccr.io/truecharts/prometheus @@ -12,7 +12,7 @@ thanosImage: alertmanagerImage: repository: tccr.io/truecharts/alertmanager - tag: v0.24.0@sha256:d17a971554a8bb022b86afd090f7d5921822196762e401f431999883f4f64da6 + tag: v0.24.0@sha256:ae4a80776c5e8dd59f192dcca04c0d654d6be7cfcb7505c7a428405855ae825f global: labels: {} diff --git a/core/prometheus/2.0.69/questions.yaml b/core/prometheus/2.0.70/questions.yaml similarity index 100% rename from core/prometheus/2.0.69/questions.yaml rename to core/prometheus/2.0.70/questions.yaml diff --git a/core/prometheus/2.0.69/security.md b/core/prometheus/2.0.70/security.md similarity index 99% rename from core/prometheus/2.0.69/security.md rename to core/prometheus/2.0.70/security.md index b9ffbca4925..6a65dffee21 100644 --- a/core/prometheus/2.0.69/security.md +++ b/core/prometheus/2.0.70/security.md @@ -183,7 +183,7 @@ hide: bitnami/node-exporter:1.3.1-debian-10-r160 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/prometheus-operator:v0.56.2@sha256:fd3745eda50b88cd5626d5b3d0ecea22559e98e6042568ff077f7102eaef422d + tccr.io/truecharts/prometheus-operator:v0.56.3@sha256:7dcd175be97d3a0144ec5e1aeb991b2fa00a54594002303d45f690ab7f9c3579 ##### Scan Results @@ -624,7 +624,7 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/prometheus-operator:v0.56.2@sha256:fd3745eda50b88cd5626d5b3d0ecea22559e98e6042568ff077f7102eaef422d (debian 10.12) +#### Container: tccr.io/truecharts/prometheus-operator:v0.56.3@sha256:7dcd175be97d3a0144ec5e1aeb991b2fa00a54594002303d45f690ab7f9c3579 (debian 10.12) **debian** diff --git a/core/prometheus/2.0.69/templates/_helpers.tpl b/core/prometheus/2.0.70/templates/_helpers.tpl similarity index 100% rename from core/prometheus/2.0.69/templates/_helpers.tpl rename to core/prometheus/2.0.70/templates/_helpers.tpl diff --git a/core/prometheus/2.0.69/templates/alertmanager/_alertmanager.tpl b/core/prometheus/2.0.70/templates/alertmanager/_alertmanager.tpl similarity index 100% rename from core/prometheus/2.0.69/templates/alertmanager/_alertmanager.tpl rename to core/prometheus/2.0.70/templates/alertmanager/_alertmanager.tpl diff --git a/core/prometheus/2.0.69/templates/alertmanager/secrets.yaml b/core/prometheus/2.0.70/templates/alertmanager/secrets.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/alertmanager/secrets.yaml rename to core/prometheus/2.0.70/templates/alertmanager/secrets.yaml diff --git a/core/prometheus/2.0.69/templates/alertmanager/serviceaccount.yaml b/core/prometheus/2.0.70/templates/alertmanager/serviceaccount.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/alertmanager/serviceaccount.yaml rename to core/prometheus/2.0.70/templates/alertmanager/serviceaccount.yaml diff --git a/core/prometheus/2.0.69/templates/alertmanager/servicemonitor.yaml b/core/prometheus/2.0.70/templates/alertmanager/servicemonitor.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/alertmanager/servicemonitor.yaml rename to core/prometheus/2.0.70/templates/alertmanager/servicemonitor.yaml diff --git a/core/prometheus/2.0.69/templates/common.yaml b/core/prometheus/2.0.70/templates/common.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/common.yaml rename to core/prometheus/2.0.70/templates/common.yaml diff --git a/core/prometheus/2.0.69/templates/exporters/core-dns/service.yaml b/core/prometheus/2.0.70/templates/exporters/core-dns/service.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/exporters/core-dns/service.yaml rename to core/prometheus/2.0.70/templates/exporters/core-dns/service.yaml diff --git a/core/prometheus/2.0.69/templates/exporters/core-dns/servicemonitor.yaml b/core/prometheus/2.0.70/templates/exporters/core-dns/servicemonitor.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/exporters/core-dns/servicemonitor.yaml rename to core/prometheus/2.0.70/templates/exporters/core-dns/servicemonitor.yaml diff --git a/core/prometheus/2.0.69/templates/exporters/kube-apiserver/servicemonitor.yaml b/core/prometheus/2.0.70/templates/exporters/kube-apiserver/servicemonitor.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/exporters/kube-apiserver/servicemonitor.yaml rename to core/prometheus/2.0.70/templates/exporters/kube-apiserver/servicemonitor.yaml diff --git a/core/prometheus/2.0.69/templates/exporters/kube-controller-manager/endpoints.yaml b/core/prometheus/2.0.70/templates/exporters/kube-controller-manager/endpoints.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/exporters/kube-controller-manager/endpoints.yaml rename to core/prometheus/2.0.70/templates/exporters/kube-controller-manager/endpoints.yaml diff --git a/core/prometheus/2.0.69/templates/exporters/kube-controller-manager/service.yaml b/core/prometheus/2.0.70/templates/exporters/kube-controller-manager/service.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/exporters/kube-controller-manager/service.yaml rename to core/prometheus/2.0.70/templates/exporters/kube-controller-manager/service.yaml diff --git a/core/prometheus/2.0.69/templates/exporters/kube-controller-manager/servicemonitor.yaml b/core/prometheus/2.0.70/templates/exporters/kube-controller-manager/servicemonitor.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/exporters/kube-controller-manager/servicemonitor.yaml rename to core/prometheus/2.0.70/templates/exporters/kube-controller-manager/servicemonitor.yaml diff --git a/core/prometheus/2.0.69/templates/exporters/kube-scheduler/endpoints.yaml b/core/prometheus/2.0.70/templates/exporters/kube-scheduler/endpoints.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/exporters/kube-scheduler/endpoints.yaml rename to core/prometheus/2.0.70/templates/exporters/kube-scheduler/endpoints.yaml diff --git a/core/prometheus/2.0.69/templates/exporters/kube-scheduler/service.yaml b/core/prometheus/2.0.70/templates/exporters/kube-scheduler/service.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/exporters/kube-scheduler/service.yaml rename to core/prometheus/2.0.70/templates/exporters/kube-scheduler/service.yaml diff --git a/core/prometheus/2.0.69/templates/exporters/kube-scheduler/servicemonitor.yaml b/core/prometheus/2.0.70/templates/exporters/kube-scheduler/servicemonitor.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/exporters/kube-scheduler/servicemonitor.yaml rename to core/prometheus/2.0.70/templates/exporters/kube-scheduler/servicemonitor.yaml diff --git a/core/prometheus/2.0.69/templates/exporters/kubelet/servicemonitor.yaml b/core/prometheus/2.0.70/templates/exporters/kubelet/servicemonitor.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/exporters/kubelet/servicemonitor.yaml rename to core/prometheus/2.0.70/templates/exporters/kubelet/servicemonitor.yaml diff --git a/core/prometheus/2.0.69/templates/operator/_args.tpl b/core/prometheus/2.0.70/templates/operator/_args.tpl similarity index 100% rename from core/prometheus/2.0.69/templates/operator/_args.tpl rename to core/prometheus/2.0.70/templates/operator/_args.tpl diff --git a/core/prometheus/2.0.69/templates/operator/configmap.yaml b/core/prometheus/2.0.70/templates/operator/configmap.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/operator/configmap.yaml rename to core/prometheus/2.0.70/templates/operator/configmap.yaml diff --git a/core/prometheus/2.0.69/templates/operator/servicemonitor.yaml b/core/prometheus/2.0.70/templates/operator/servicemonitor.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/operator/servicemonitor.yaml rename to core/prometheus/2.0.70/templates/operator/servicemonitor.yaml diff --git a/core/prometheus/2.0.69/templates/prometheus/_additionalPrometheusRules.tpl b/core/prometheus/2.0.70/templates/prometheus/_additionalPrometheusRules.tpl similarity index 100% rename from core/prometheus/2.0.69/templates/prometheus/_additionalPrometheusRules.tpl rename to core/prometheus/2.0.70/templates/prometheus/_additionalPrometheusRules.tpl diff --git a/core/prometheus/2.0.69/templates/prometheus/_additionalScrapeJobs.tpl b/core/prometheus/2.0.70/templates/prometheus/_additionalScrapeJobs.tpl similarity index 100% rename from core/prometheus/2.0.69/templates/prometheus/_additionalScrapeJobs.tpl rename to core/prometheus/2.0.70/templates/prometheus/_additionalScrapeJobs.tpl diff --git a/core/prometheus/2.0.69/templates/prometheus/_prometheus.tpl b/core/prometheus/2.0.70/templates/prometheus/_prometheus.tpl similarity index 100% rename from core/prometheus/2.0.69/templates/prometheus/_prometheus.tpl rename to core/prometheus/2.0.70/templates/prometheus/_prometheus.tpl diff --git a/core/prometheus/2.0.69/templates/prometheus/_servicemonitor.tpl b/core/prometheus/2.0.70/templates/prometheus/_servicemonitor.tpl similarity index 100% rename from core/prometheus/2.0.69/templates/prometheus/_servicemonitor.tpl rename to core/prometheus/2.0.70/templates/prometheus/_servicemonitor.tpl diff --git a/core/prometheus/2.0.69/templates/prometheus/clusterrole.yaml b/core/prometheus/2.0.70/templates/prometheus/clusterrole.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/prometheus/clusterrole.yaml rename to core/prometheus/2.0.70/templates/prometheus/clusterrole.yaml diff --git a/core/prometheus/2.0.69/templates/prometheus/clusterrolebinding.yaml b/core/prometheus/2.0.70/templates/prometheus/clusterrolebinding.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/prometheus/clusterrolebinding.yaml rename to core/prometheus/2.0.70/templates/prometheus/clusterrolebinding.yaml diff --git a/core/prometheus/2.0.69/templates/prometheus/serviceaccount.yaml b/core/prometheus/2.0.70/templates/prometheus/serviceaccount.yaml similarity index 100% rename from core/prometheus/2.0.69/templates/prometheus/serviceaccount.yaml rename to core/prometheus/2.0.70/templates/prometheus/serviceaccount.yaml diff --git a/core/prometheus/2.0.69/values.yaml b/core/prometheus/2.0.70/values.yaml similarity index 100% rename from core/prometheus/2.0.69/values.yaml rename to core/prometheus/2.0.70/values.yaml diff --git a/dependency/mariadb/2.0.77/CHANGELOG.md b/dependency/mariadb/2.0.78/CHANGELOG.md similarity index 91% rename from dependency/mariadb/2.0.77/CHANGELOG.md rename to dependency/mariadb/2.0.78/CHANGELOG.md index c29840419da..027fc5a12cd 100644 --- a/dependency/mariadb/2.0.77/CHANGELOG.md +++ b/dependency/mariadb/2.0.78/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [mariadb-2.0.78](https://github.com/truecharts/apps/compare/mariadb-2.0.77...mariadb-2.0.78) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [mariadb-2.0.77](https://github.com/truecharts/apps/compare/mariadb-2.0.76...mariadb-2.0.77) (2022-05-24) @@ -88,12 +97,3 @@ ### [mariadb-2.0.67](https://github.com/truecharts/apps/compare/mariadb-2.0.65...mariadb-2.0.67) (2022-05-15) - -#### Chore - -* update helm chart common to v9.3.12 -* update docker general non-major ([#2679](https://github.com/truecharts/apps/issues/2679)) - - - - diff --git a/dependency/mariadb/2.0.77/CONFIG.md b/dependency/mariadb/2.0.78/CONFIG.md similarity index 100% rename from dependency/mariadb/2.0.77/CONFIG.md rename to dependency/mariadb/2.0.78/CONFIG.md diff --git a/dependency/mariadb/2.0.77/Chart.lock b/dependency/mariadb/2.0.78/Chart.lock similarity index 80% rename from dependency/mariadb/2.0.77/Chart.lock rename to dependency/mariadb/2.0.78/Chart.lock index 9a77ae17a1d..f842f741c45 100644 --- a/dependency/mariadb/2.0.77/Chart.lock +++ b/dependency/mariadb/2.0.78/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 9.3.17 digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc -generated: "2022-05-24T18:20:49.401752671Z" +generated: "2022-05-25T06:54:54.291960287Z" diff --git a/dependency/mariadb/2.0.77/Chart.yaml b/dependency/mariadb/2.0.78/Chart.yaml similarity index 98% rename from dependency/mariadb/2.0.77/Chart.yaml rename to dependency/mariadb/2.0.78/Chart.yaml index 4ab70d362ea..b000c86e940 100644 --- a/dependency/mariadb/2.0.77/Chart.yaml +++ b/dependency/mariadb/2.0.78/Chart.yaml @@ -24,7 +24,7 @@ sources: - https://github.com/prometheus/mysqld_exporter - https://mariadb.org type: application -version: 2.0.77 +version: 2.0.78 annotations: truecharts.org/catagories: | - database diff --git a/dependency/mariadb/2.0.77/README.md b/dependency/mariadb/2.0.78/README.md similarity index 100% rename from dependency/mariadb/2.0.77/README.md rename to dependency/mariadb/2.0.78/README.md diff --git a/dependency/mariadb/2.0.77/app-readme.md b/dependency/mariadb/2.0.78/app-readme.md similarity index 100% rename from dependency/mariadb/2.0.77/app-readme.md rename to dependency/mariadb/2.0.78/app-readme.md diff --git a/dependency/mariadb/2.0.77/charts/common-9.3.17.tgz b/dependency/mariadb/2.0.78/charts/common-9.3.17.tgz similarity index 100% rename from dependency/mariadb/2.0.77/charts/common-9.3.17.tgz rename to dependency/mariadb/2.0.78/charts/common-9.3.17.tgz diff --git a/dependency/mariadb/2.0.77/helm-values.md b/dependency/mariadb/2.0.78/helm-values.md similarity index 100% rename from dependency/mariadb/2.0.77/helm-values.md rename to dependency/mariadb/2.0.78/helm-values.md diff --git a/dependency/mariadb/2.0.77/ix_values.yaml b/dependency/mariadb/2.0.78/ix_values.yaml similarity index 97% rename from dependency/mariadb/2.0.77/ix_values.yaml rename to dependency/mariadb/2.0.78/ix_values.yaml index a4768f54fc6..dc4f32f4c8d 100644 --- a/dependency/mariadb/2.0.77/ix_values.yaml +++ b/dependency/mariadb/2.0.78/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: ghcr.io/truecharts/mariadb pullPolicy: IfNotPresent - tag: v10.7.4@sha256:5aae300a8f9322789746171d70486e1c36d5cb95599ef12e9439b4dd7173e116 + tag: v10.7.4@sha256:3c98ce702e0a3bfcb7dc3eb39af7b2ce4f224be0af8b9f4462a51fde9643905c controller: # -- Set the controller type. diff --git a/dependency/mariadb/2.0.77/questions.yaml b/dependency/mariadb/2.0.78/questions.yaml similarity index 100% rename from dependency/mariadb/2.0.77/questions.yaml rename to dependency/mariadb/2.0.78/questions.yaml diff --git a/dependency/mariadb/2.0.77/security.md b/dependency/mariadb/2.0.78/security.md similarity index 99% rename from dependency/mariadb/2.0.77/security.md rename to dependency/mariadb/2.0.78/security.md index 4d9a7f12814..f1d19e2a002 100644 --- a/dependency/mariadb/2.0.77/security.md +++ b/dependency/mariadb/2.0.78/security.md @@ -45,7 +45,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/mariadb:v10.7.4@sha256:5aae300a8f9322789746171d70486e1c36d5cb95599ef12e9439b4dd7173e116 + tccr.io/truecharts/mariadb:v10.7.4@sha256:3c98ce702e0a3bfcb7dc3eb39af7b2ce4f224be0af8b9f4462a51fde9643905c ##### Scan Results @@ -92,7 +92,7 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/mariadb:v10.7.4@sha256:5aae300a8f9322789746171d70486e1c36d5cb95599ef12e9439b4dd7173e116 (debian 10.12) +#### Container: tccr.io/truecharts/mariadb:v10.7.4@sha256:3c98ce702e0a3bfcb7dc3eb39af7b2ce4f224be0af8b9f4462a51fde9643905c (debian 10.12) **debian** diff --git a/dependency/mariadb/2.0.77/templates/common.yaml b/dependency/mariadb/2.0.78/templates/common.yaml similarity index 100% rename from dependency/mariadb/2.0.77/templates/common.yaml rename to dependency/mariadb/2.0.78/templates/common.yaml diff --git a/dependency/mariadb/2.0.77/templates/secret.yaml b/dependency/mariadb/2.0.78/templates/secret.yaml similarity index 100% rename from dependency/mariadb/2.0.77/templates/secret.yaml rename to dependency/mariadb/2.0.78/templates/secret.yaml diff --git a/dependency/mariadb/2.0.77/values.yaml b/dependency/mariadb/2.0.78/values.yaml similarity index 100% rename from dependency/mariadb/2.0.77/values.yaml rename to dependency/mariadb/2.0.78/values.yaml diff --git a/dependency/memcached/2.0.77/CHANGELOG.md b/dependency/memcached/2.0.78/CHANGELOG.md similarity index 91% rename from dependency/memcached/2.0.77/CHANGELOG.md rename to dependency/memcached/2.0.78/CHANGELOG.md index d4517d63322..122a59e1d00 100644 --- a/dependency/memcached/2.0.77/CHANGELOG.md +++ b/dependency/memcached/2.0.78/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [memcached-2.0.78](https://github.com/truecharts/apps/compare/memcached-2.0.77...memcached-2.0.78) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [memcached-2.0.77](https://github.com/truecharts/apps/compare/memcached-2.0.76...memcached-2.0.77) (2022-05-24) @@ -88,12 +97,3 @@ ### [memcached-2.0.67](https://github.com/truecharts/apps/compare/memcached-2.0.65...memcached-2.0.67) (2022-05-15) - -#### Chore - -* update helm chart common to v9.3.12 -* update docker general non-major ([#2679](https://github.com/truecharts/apps/issues/2679)) - - - - diff --git a/dependency/memcached/2.0.77/CONFIG.md b/dependency/memcached/2.0.78/CONFIG.md similarity index 100% rename from dependency/memcached/2.0.77/CONFIG.md rename to dependency/memcached/2.0.78/CONFIG.md diff --git a/dependency/memcached/2.0.77/Chart.lock b/dependency/memcached/2.0.78/Chart.lock similarity index 80% rename from dependency/memcached/2.0.77/Chart.lock rename to dependency/memcached/2.0.78/Chart.lock index 8ea125e8216..a714a7cd4ae 100644 --- a/dependency/memcached/2.0.77/Chart.lock +++ b/dependency/memcached/2.0.78/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 9.3.17 digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc -generated: "2022-05-24T18:20:49.457737454Z" +generated: "2022-05-25T06:54:54.341922656Z" diff --git a/dependency/memcached/2.0.77/Chart.yaml b/dependency/memcached/2.0.78/Chart.yaml similarity index 98% rename from dependency/memcached/2.0.77/Chart.yaml rename to dependency/memcached/2.0.78/Chart.yaml index 2601b88a341..b1c1bf47e81 100644 --- a/dependency/memcached/2.0.77/Chart.yaml +++ b/dependency/memcached/2.0.78/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/bitnami/bitnami-docker-memcached - http://memcached.org/ type: application -version: 2.0.77 +version: 2.0.78 annotations: truecharts.org/catagories: | - database diff --git a/dependency/memcached/2.0.77/README.md b/dependency/memcached/2.0.78/README.md similarity index 100% rename from dependency/memcached/2.0.77/README.md rename to dependency/memcached/2.0.78/README.md diff --git a/dependency/memcached/2.0.77/app-readme.md b/dependency/memcached/2.0.78/app-readme.md similarity index 100% rename from dependency/memcached/2.0.77/app-readme.md rename to dependency/memcached/2.0.78/app-readme.md diff --git a/dependency/memcached/2.0.77/charts/common-9.3.17.tgz b/dependency/memcached/2.0.78/charts/common-9.3.17.tgz similarity index 100% rename from dependency/memcached/2.0.77/charts/common-9.3.17.tgz rename to dependency/memcached/2.0.78/charts/common-9.3.17.tgz diff --git a/dependency/memcached/2.0.77/helm-values.md b/dependency/memcached/2.0.78/helm-values.md similarity index 100% rename from dependency/memcached/2.0.77/helm-values.md rename to dependency/memcached/2.0.78/helm-values.md diff --git a/dependency/memcached/2.0.77/ix_values.yaml b/dependency/memcached/2.0.78/ix_values.yaml similarity index 65% rename from dependency/memcached/2.0.77/ix_values.yaml rename to dependency/memcached/2.0.78/ix_values.yaml index 37782a31307..7b226a19275 100644 --- a/dependency/memcached/2.0.77/ix_values.yaml +++ b/dependency/memcached/2.0.78/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: ghcr.io/truecharts/memcached pullPolicy: IfNotPresent - tag: v1.6.15@sha256:8eadb3b3e8b4882ad3e408d15278cc6a699cdbf1615ce1a3ef0c65c06dcbe8c0 + tag: v1.6.15@sha256:d3f95a6a9ce52089ef59adacd2b6a8622c38bd5287be77023eea0c214880d10b service: main: diff --git a/dependency/memcached/2.0.77/questions.yaml b/dependency/memcached/2.0.78/questions.yaml similarity index 100% rename from dependency/memcached/2.0.77/questions.yaml rename to dependency/memcached/2.0.78/questions.yaml diff --git a/dependency/memcached/2.0.77/security.md b/dependency/memcached/2.0.78/security.md similarity index 99% rename from dependency/memcached/2.0.77/security.md rename to dependency/memcached/2.0.78/security.md index a46f5efbee3..a0dc81088bd 100644 --- a/dependency/memcached/2.0.77/security.md +++ b/dependency/memcached/2.0.78/security.md @@ -44,7 +44,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/memcached:v1.6.15@sha256:8eadb3b3e8b4882ad3e408d15278cc6a699cdbf1615ce1a3ef0c65c06dcbe8c0 + tccr.io/truecharts/memcached:v1.6.15@sha256:d3f95a6a9ce52089ef59adacd2b6a8622c38bd5287be77023eea0c214880d10b ##### Scan Results @@ -91,7 +91,7 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/memcached:v1.6.15@sha256:8eadb3b3e8b4882ad3e408d15278cc6a699cdbf1615ce1a3ef0c65c06dcbe8c0 (debian 10.12) +#### Container: tccr.io/truecharts/memcached:v1.6.15@sha256:d3f95a6a9ce52089ef59adacd2b6a8622c38bd5287be77023eea0c214880d10b (debian 10.12) **debian** diff --git a/dependency/memcached/2.0.77/templates/common.yaml b/dependency/memcached/2.0.78/templates/common.yaml similarity index 100% rename from dependency/memcached/2.0.77/templates/common.yaml rename to dependency/memcached/2.0.78/templates/common.yaml diff --git a/dependency/memcached/2.0.77/values.yaml b/dependency/memcached/2.0.78/values.yaml similarity index 100% rename from dependency/memcached/2.0.77/values.yaml rename to dependency/memcached/2.0.78/values.yaml diff --git a/dependency/mongodb/0.1.34/CHANGELOG.md b/dependency/mongodb/0.1.35/CHANGELOG.md similarity index 89% rename from dependency/mongodb/0.1.34/CHANGELOG.md rename to dependency/mongodb/0.1.35/CHANGELOG.md index ea16122b335..bdd82e6371b 100644 --- a/dependency/mongodb/0.1.34/CHANGELOG.md +++ b/dependency/mongodb/0.1.35/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [mongodb-0.1.35](https://github.com/truecharts/apps/compare/mongodb-0.1.34...mongodb-0.1.35) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [mongodb-0.1.34](https://github.com/truecharts/apps/compare/mongodb-0.1.33...mongodb-0.1.34) (2022-05-24) @@ -88,12 +97,3 @@ ### [mongodb-0.1.26](https://github.com/truecharts/apps/compare/mongodb-0.1.24...mongodb-0.1.26) (2022-05-15) #### Chore - -* update helm chart common to v9.3.12 -* update docker general non-major ([#2679](https://github.com/truecharts/apps/issues/2679)) - - - - -### [mongodb-0.1.24](https://github.com/truecharts/apps/compare/mongodb-0.1.23...mongodb-0.1.24) (2022-05-14) - diff --git a/dependency/mongodb/0.1.34/CONFIG.md b/dependency/mongodb/0.1.35/CONFIG.md similarity index 100% rename from dependency/mongodb/0.1.34/CONFIG.md rename to dependency/mongodb/0.1.35/CONFIG.md diff --git a/dependency/mongodb/0.1.34/Chart.lock b/dependency/mongodb/0.1.35/Chart.lock similarity index 80% rename from dependency/mongodb/0.1.34/Chart.lock rename to dependency/mongodb/0.1.35/Chart.lock index 9942397e46d..dae8017bd11 100644 --- a/dependency/mongodb/0.1.34/Chart.lock +++ b/dependency/mongodb/0.1.35/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 9.3.17 digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc -generated: "2022-05-24T18:20:49.553194032Z" +generated: "2022-05-25T06:54:54.372716321Z" diff --git a/dependency/mongodb/0.1.34/Chart.yaml b/dependency/mongodb/0.1.35/Chart.yaml similarity index 98% rename from dependency/mongodb/0.1.34/Chart.yaml rename to dependency/mongodb/0.1.35/Chart.yaml index 72a72cf891c..560510ecdb8 100644 --- a/dependency/mongodb/0.1.34/Chart.yaml +++ b/dependency/mongodb/0.1.35/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/bitnami/bitnami-docker-mongodb - https://www.mongodb.com type: application -version: 0.1.34 +version: 0.1.35 annotations: truecharts.org/catagories: | - database diff --git a/dependency/mongodb/0.1.34/README.md b/dependency/mongodb/0.1.35/README.md similarity index 100% rename from dependency/mongodb/0.1.34/README.md rename to dependency/mongodb/0.1.35/README.md diff --git a/dependency/mongodb/0.1.34/app-readme.md b/dependency/mongodb/0.1.35/app-readme.md similarity index 100% rename from dependency/mongodb/0.1.34/app-readme.md rename to dependency/mongodb/0.1.35/app-readme.md diff --git a/dependency/mongodb/0.1.34/charts/common-9.3.17.tgz b/dependency/mongodb/0.1.35/charts/common-9.3.17.tgz similarity index 100% rename from dependency/mongodb/0.1.34/charts/common-9.3.17.tgz rename to dependency/mongodb/0.1.35/charts/common-9.3.17.tgz diff --git a/dependency/mongodb/0.1.34/helm-values.md b/dependency/mongodb/0.1.35/helm-values.md similarity index 100% rename from dependency/mongodb/0.1.34/helm-values.md rename to dependency/mongodb/0.1.35/helm-values.md diff --git a/dependency/mongodb/0.1.34/ix_values.yaml b/dependency/mongodb/0.1.35/ix_values.yaml similarity index 97% rename from dependency/mongodb/0.1.34/ix_values.yaml rename to dependency/mongodb/0.1.35/ix_values.yaml index 0e609fb5dd5..6f11a5d23a8 100644 --- a/dependency/mongodb/0.1.34/ix_values.yaml +++ b/dependency/mongodb/0.1.35/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: ghcr.io/truecharts/mongodb pullPolicy: IfNotPresent - tag: v5.0.8@sha256:e07f9e161703eb4414ddd8344cca1c7ba720626e9cc0a0cdcc620140cbd4438c + tag: v5.0.8@sha256:84767416aa97a8b82e396e01c2777d03f1c705a3a864d4113757b79ea2227a08 controller: # -- Set the controller type. diff --git a/dependency/mongodb/0.1.34/questions.yaml b/dependency/mongodb/0.1.35/questions.yaml similarity index 100% rename from dependency/mongodb/0.1.34/questions.yaml rename to dependency/mongodb/0.1.35/questions.yaml diff --git a/dependency/mongodb/0.1.34/security.md b/dependency/mongodb/0.1.35/security.md similarity index 99% rename from dependency/mongodb/0.1.34/security.md rename to dependency/mongodb/0.1.35/security.md index 954ebe00fde..8a5cc5946bd 100644 --- a/dependency/mongodb/0.1.34/security.md +++ b/dependency/mongodb/0.1.35/security.md @@ -45,7 +45,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/mongodb:v5.0.8@sha256:e07f9e161703eb4414ddd8344cca1c7ba720626e9cc0a0cdcc620140cbd4438c + tccr.io/truecharts/mongodb:v5.0.8@sha256:84767416aa97a8b82e396e01c2777d03f1c705a3a864d4113757b79ea2227a08 ##### Scan Results @@ -92,7 +92,7 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/mongodb:v5.0.8@sha256:e07f9e161703eb4414ddd8344cca1c7ba720626e9cc0a0cdcc620140cbd4438c (debian 10.12) +#### Container: tccr.io/truecharts/mongodb:v5.0.8@sha256:84767416aa97a8b82e396e01c2777d03f1c705a3a864d4113757b79ea2227a08 (debian 10.12) **debian** diff --git a/dependency/mongodb/0.1.34/templates/common.yaml b/dependency/mongodb/0.1.35/templates/common.yaml similarity index 100% rename from dependency/mongodb/0.1.34/templates/common.yaml rename to dependency/mongodb/0.1.35/templates/common.yaml diff --git a/dependency/mongodb/0.1.34/templates/secret.yaml b/dependency/mongodb/0.1.35/templates/secret.yaml similarity index 100% rename from dependency/mongodb/0.1.34/templates/secret.yaml rename to dependency/mongodb/0.1.35/templates/secret.yaml diff --git a/dependency/mongodb/0.1.34/values.yaml b/dependency/mongodb/0.1.35/values.yaml similarity index 100% rename from dependency/mongodb/0.1.34/values.yaml rename to dependency/mongodb/0.1.35/values.yaml diff --git a/dependency/postgresql/7.0.78/CHANGELOG.md b/dependency/postgresql/7.0.79/CHANGELOG.md similarity index 89% rename from dependency/postgresql/7.0.78/CHANGELOG.md rename to dependency/postgresql/7.0.79/CHANGELOG.md index 24a5cefcda9..7a2d448d932 100644 --- a/dependency/postgresql/7.0.78/CHANGELOG.md +++ b/dependency/postgresql/7.0.79/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [postgresql-7.0.79](https://github.com/truecharts/apps/compare/postgresql-7.0.78...postgresql-7.0.79) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [postgresql-7.0.78](https://github.com/truecharts/apps/compare/postgresql-7.0.77...postgresql-7.0.78) (2022-05-24) @@ -88,12 +97,3 @@ ### [postgresql-7.0.70](https://github.com/truecharts/apps/compare/postgresql-7.0.68...postgresql-7.0.70) (2022-05-15) -#### Chore - -* update helm chart common to v9.3.12 -* update docker general non-major ([#2679](https://github.com/truecharts/apps/issues/2679)) - - - - -### [postgresql-7.0.68](https://github.com/truecharts/apps/compare/postgresql-7.0.67...postgresql-7.0.68) (2022-05-14) diff --git a/dependency/postgresql/7.0.78/CONFIG.md b/dependency/postgresql/7.0.79/CONFIG.md similarity index 100% rename from dependency/postgresql/7.0.78/CONFIG.md rename to dependency/postgresql/7.0.79/CONFIG.md diff --git a/dependency/postgresql/7.0.79/Chart.lock b/dependency/postgresql/7.0.79/Chart.lock new file mode 100644 index 00000000000..853f9eff789 --- /dev/null +++ b/dependency/postgresql/7.0.79/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.17 +digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc +generated: "2022-05-25T06:55:30.578381167Z" diff --git a/dependency/postgresql/7.0.78/Chart.yaml b/dependency/postgresql/7.0.79/Chart.yaml similarity index 97% rename from dependency/postgresql/7.0.78/Chart.yaml rename to dependency/postgresql/7.0.79/Chart.yaml index fe69db396b5..bd439b2f412 100644 --- a/dependency/postgresql/7.0.78/Chart.yaml +++ b/dependency/postgresql/7.0.79/Chart.yaml @@ -22,7 +22,7 @@ name: postgresql sources: - https://www.postgresql.org/ type: application -version: 7.0.78 +version: 7.0.79 annotations: truecharts.org/catagories: | - database diff --git a/dependency/postgresql/7.0.78/README.md b/dependency/postgresql/7.0.79/README.md similarity index 100% rename from dependency/postgresql/7.0.78/README.md rename to dependency/postgresql/7.0.79/README.md diff --git a/dependency/postgresql/7.0.78/app-readme.md b/dependency/postgresql/7.0.79/app-readme.md similarity index 100% rename from dependency/postgresql/7.0.78/app-readme.md rename to dependency/postgresql/7.0.79/app-readme.md diff --git a/dependency/postgresql/7.0.78/charts/common-9.3.17.tgz b/dependency/postgresql/7.0.79/charts/common-9.3.17.tgz similarity index 100% rename from dependency/postgresql/7.0.78/charts/common-9.3.17.tgz rename to dependency/postgresql/7.0.79/charts/common-9.3.17.tgz diff --git a/dependency/postgresql/7.0.78/helm-values.md b/dependency/postgresql/7.0.79/helm-values.md similarity index 100% rename from dependency/postgresql/7.0.78/helm-values.md rename to dependency/postgresql/7.0.79/helm-values.md diff --git a/dependency/postgresql/7.0.78/ix_values.yaml b/dependency/postgresql/7.0.79/ix_values.yaml similarity index 97% rename from dependency/postgresql/7.0.78/ix_values.yaml rename to dependency/postgresql/7.0.79/ix_values.yaml index 31266ada9fd..1886ae07453 100644 --- a/dependency/postgresql/7.0.78/ix_values.yaml +++ b/dependency/postgresql/7.0.79/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: ghcr.io/truecharts/postgresql pullPolicy: IfNotPresent - tag: v14.3.0@sha256:a44f8616a1fb62dd64183a9776d481c28992a91f717a651abeb880141abb26e7 + tag: v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1 controller: # -- Set the controller type. diff --git a/dependency/postgresql/7.0.78/questions.yaml b/dependency/postgresql/7.0.79/questions.yaml similarity index 100% rename from dependency/postgresql/7.0.78/questions.yaml rename to dependency/postgresql/7.0.79/questions.yaml diff --git a/dependency/postgresql/7.0.78/security.md b/dependency/postgresql/7.0.79/security.md similarity index 99% rename from dependency/postgresql/7.0.78/security.md rename to dependency/postgresql/7.0.79/security.md index be54ab48894..113c0bd977d 100644 --- a/dependency/postgresql/7.0.78/security.md +++ b/dependency/postgresql/7.0.79/security.md @@ -45,7 +45,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/postgresql:v14.3.0@sha256:a44f8616a1fb62dd64183a9776d481c28992a91f717a651abeb880141abb26e7 + tccr.io/truecharts/postgresql:v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1 ##### Scan Results @@ -92,7 +92,7 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/postgresql:v14.3.0@sha256:a44f8616a1fb62dd64183a9776d481c28992a91f717a651abeb880141abb26e7 (debian 10.12) +#### Container: tccr.io/truecharts/postgresql:v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1 (debian 10.12) **debian** diff --git a/dependency/postgresql/7.0.78/templates/backup-postgres-config.yaml b/dependency/postgresql/7.0.79/templates/backup-postgres-config.yaml similarity index 100% rename from dependency/postgresql/7.0.78/templates/backup-postgres-config.yaml rename to dependency/postgresql/7.0.79/templates/backup-postgres-config.yaml diff --git a/dependency/postgresql/7.0.78/templates/common.yaml b/dependency/postgresql/7.0.79/templates/common.yaml similarity index 100% rename from dependency/postgresql/7.0.78/templates/common.yaml rename to dependency/postgresql/7.0.79/templates/common.yaml diff --git a/dependency/postgresql/7.0.78/templates/secret.yaml b/dependency/postgresql/7.0.79/templates/secret.yaml similarity index 100% rename from dependency/postgresql/7.0.78/templates/secret.yaml rename to dependency/postgresql/7.0.79/templates/secret.yaml diff --git a/dependency/postgresql/7.0.78/templates/upgrade-backup-postgres-hook.yaml b/dependency/postgresql/7.0.79/templates/upgrade-backup-postgres-hook.yaml similarity index 100% rename from dependency/postgresql/7.0.78/templates/upgrade-backup-postgres-hook.yaml rename to dependency/postgresql/7.0.79/templates/upgrade-backup-postgres-hook.yaml diff --git a/dependency/postgresql/7.0.78/values.yaml b/dependency/postgresql/7.0.79/values.yaml similarity index 100% rename from dependency/postgresql/7.0.78/values.yaml rename to dependency/postgresql/7.0.79/values.yaml diff --git a/games/minecraft-java/0.0.56/Chart.lock b/games/minecraft-java/0.0.56/Chart.lock deleted file mode 100644 index 400b5927dc1..00000000000 --- a/games/minecraft-java/0.0.56/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 9.3.17 -digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc -generated: "2022-05-24T18:21:30.456528961Z" diff --git a/games/minecraft-java/0.0.56/CHANGELOG.md b/games/minecraft-java/0.0.57/CHANGELOG.md similarity index 91% rename from games/minecraft-java/0.0.56/CHANGELOG.md rename to games/minecraft-java/0.0.57/CHANGELOG.md index 5f923b30b10..792d45b9102 100644 --- a/games/minecraft-java/0.0.56/CHANGELOG.md +++ b/games/minecraft-java/0.0.57/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [minecraft-java-0.0.57](https://github.com/truecharts/apps/compare/minecraft-java-0.0.56...minecraft-java-0.0.57) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [minecraft-java-0.0.56](https://github.com/truecharts/apps/compare/minecraft-java-0.0.55...minecraft-java-0.0.56) (2022-05-24) @@ -88,12 +97,3 @@ ### [minecraft-java-0.0.47](https://github.com/truecharts/apps/compare/minecraft-java-0.0.46...minecraft-java-0.0.47) (2022-05-11) #### Chore - -* update docker general non-major ([#2653](https://github.com/truecharts/apps/issues/2653)) - - - - -### [minecraft-java-0.0.46](https://github.com/truecharts/apps/compare/minecraft-java-0.0.45...minecraft-java-0.0.46) (2022-05-10) - -#### Chore diff --git a/games/minecraft-java/0.0.56/CONFIG.md b/games/minecraft-java/0.0.57/CONFIG.md similarity index 100% rename from games/minecraft-java/0.0.56/CONFIG.md rename to games/minecraft-java/0.0.57/CONFIG.md diff --git a/games/minecraft-java/0.0.57/Chart.lock b/games/minecraft-java/0.0.57/Chart.lock new file mode 100644 index 00000000000..ff73927622e --- /dev/null +++ b/games/minecraft-java/0.0.57/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.17 +digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc +generated: "2022-05-25T06:55:40.567860126Z" diff --git a/games/minecraft-java/0.0.56/Chart.yaml b/games/minecraft-java/0.0.57/Chart.yaml similarity index 97% rename from games/minecraft-java/0.0.56/Chart.yaml rename to games/minecraft-java/0.0.57/Chart.yaml index 5dbf3339679..94d6188b2e5 100644 --- a/games/minecraft-java/0.0.56/Chart.yaml +++ b/games/minecraft-java/0.0.57/Chart.yaml @@ -20,7 +20,7 @@ sources: - https://github.com/itzg/docker-minecraft-server - https://hub.docker.com/r/itzg/minecraft-server type: application -version: 0.0.56 +version: 0.0.57 annotations: truecharts.org/catagories: | - games diff --git a/games/minecraft-java/0.0.56/README.md b/games/minecraft-java/0.0.57/README.md similarity index 100% rename from games/minecraft-java/0.0.56/README.md rename to games/minecraft-java/0.0.57/README.md diff --git a/games/minecraft-java/0.0.56/app-readme.md b/games/minecraft-java/0.0.57/app-readme.md similarity index 100% rename from games/minecraft-java/0.0.56/app-readme.md rename to games/minecraft-java/0.0.57/app-readme.md diff --git a/games/minecraft-java/0.0.56/charts/common-9.3.17.tgz b/games/minecraft-java/0.0.57/charts/common-9.3.17.tgz similarity index 100% rename from games/minecraft-java/0.0.56/charts/common-9.3.17.tgz rename to games/minecraft-java/0.0.57/charts/common-9.3.17.tgz diff --git a/games/minecraft-java/0.0.56/ci/base-values.yaml b/games/minecraft-java/0.0.57/ci/base-values.yaml similarity index 100% rename from games/minecraft-java/0.0.56/ci/base-values.yaml rename to games/minecraft-java/0.0.57/ci/base-values.yaml diff --git a/games/minecraft-java/0.0.56/ci/j11-values.yaml b/games/minecraft-java/0.0.57/ci/j11-values.yaml similarity index 54% rename from games/minecraft-java/0.0.56/ci/j11-values.yaml rename to games/minecraft-java/0.0.57/ci/j11-values.yaml index 635fb13327b..933239c466c 100644 --- a/games/minecraft-java/0.0.56/ci/j11-values.yaml +++ b/games/minecraft-java/0.0.57/ci/j11-values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/minecraft-java11 - tag: latest@sha256:86208f6823857517e23c63369abf829fc7b5797b207dde5f741ab1d3b67a0630 + tag: latest@sha256:bf7c96b4c332803e6b06d0bcd2684ff1688f71ee704cfca9078ee5af469f1ed8 pullPolicy: Always env: diff --git a/games/minecraft-java/0.0.56/ci/j11j9-values.yaml b/games/minecraft-java/0.0.57/ci/j11j9-values.yaml similarity index 100% rename from games/minecraft-java/0.0.56/ci/j11j9-values.yaml rename to games/minecraft-java/0.0.57/ci/j11j9-values.yaml diff --git a/games/minecraft-java/0.0.56/ci/j8-values.yaml b/games/minecraft-java/0.0.57/ci/j8-values.yaml similarity index 56% rename from games/minecraft-java/0.0.56/ci/j8-values.yaml rename to games/minecraft-java/0.0.57/ci/j8-values.yaml index 6171249d32f..6561345d5e5 100644 --- a/games/minecraft-java/0.0.56/ci/j8-values.yaml +++ b/games/minecraft-java/0.0.57/ci/j8-values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/minecraft-java8-openj9 - tag: latest@sha256:9ac7be5e31e815902d5c2d814c2d59cafa5b0dd836c84894940ecb171574f4d4 + tag: latest@sha256:d7cc689aaa35a25f0be222c37849cfb38e4782938e67494ab639b211d6fd3338 pullPolicy: Always env: diff --git a/games/minecraft-java/0.0.56/ci/j8j9-values.yaml b/games/minecraft-java/0.0.57/ci/j8j9-values.yaml similarity index 100% rename from games/minecraft-java/0.0.56/ci/j8j9-values.yaml rename to games/minecraft-java/0.0.57/ci/j8j9-values.yaml diff --git a/games/minecraft-java/0.0.56/helm-values.md b/games/minecraft-java/0.0.57/helm-values.md similarity index 100% rename from games/minecraft-java/0.0.56/helm-values.md rename to games/minecraft-java/0.0.57/helm-values.md diff --git a/games/minecraft-java/0.0.56/ix_values.yaml b/games/minecraft-java/0.0.57/ix_values.yaml similarity index 86% rename from games/minecraft-java/0.0.56/ix_values.yaml rename to games/minecraft-java/0.0.57/ix_values.yaml index 19146540853..e151f71bcb0 100644 --- a/games/minecraft-java/0.0.56/ix_values.yaml +++ b/games/minecraft-java/0.0.57/ix_values.yaml @@ -4,7 +4,7 @@ image: pullPolicy: Always j11Image: repository: tccr.io/truecharts/minecraft-java11 - tag: latest@sha256:86208f6823857517e23c63369abf829fc7b5797b207dde5f741ab1d3b67a0630 + tag: latest@sha256:bf7c96b4c332803e6b06d0bcd2684ff1688f71ee704cfca9078ee5af469f1ed8 pullPolicy: Always j11j9Image: repository: tccr.io/truecharts/minecraft-java11-openj9 @@ -12,11 +12,11 @@ j11j9Image: pullPolicy: Always j8Image: repository: tccr.io/truecharts/minecraft-java8-openj9 - tag: latest@sha256:9ac7be5e31e815902d5c2d814c2d59cafa5b0dd836c84894940ecb171574f4d4 + tag: latest@sha256:d7cc689aaa35a25f0be222c37849cfb38e4782938e67494ab639b211d6fd3338 pullPolicy: Always j8j9Image: repository: tccr.io/truecharts/minecraft-java8-openj9 - tag: latest@sha256:9ac7be5e31e815902d5c2d814c2d59cafa5b0dd836c84894940ecb171574f4d4 + tag: latest@sha256:d7cc689aaa35a25f0be222c37849cfb38e4782938e67494ab639b211d6fd3338 pullPolicy: Always portal: diff --git a/games/minecraft-java/0.0.56/questions.yaml b/games/minecraft-java/0.0.57/questions.yaml similarity index 100% rename from games/minecraft-java/0.0.56/questions.yaml rename to games/minecraft-java/0.0.57/questions.yaml diff --git a/games/minecraft-java/0.0.56/security.md b/games/minecraft-java/0.0.57/security.md similarity index 99% rename from games/minecraft-java/0.0.56/security.md rename to games/minecraft-java/0.0.57/security.md index a56c282d6c1..38f952d1dfa 100644 --- a/games/minecraft-java/0.0.56/security.md +++ b/games/minecraft-java/0.0.57/security.md @@ -198,8 +198,8 @@ hide: | libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| | libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| -| libldap-2.4-2 | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| -| libldap-common | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libmagickcore-6.q16-6 | CVE-2020-25664 | MEDIUM | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
| | libmagickcore-6.q16-6 | CVE-2020-27752 | MEDIUM | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
| | libmagickcore-6.q16-6 | CVE-2020-29599 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-29599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599
https://github.com/ImageMagick/ImageMagick/discussions/2851
https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html
https://linux.oracle.com/cve/CVE-2020-29599.html
https://linux.oracle.com/errata/ELSA-2021-0024.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
https://security.gentoo.org/glsa/202101-36
| diff --git a/games/minecraft-java/0.0.56/templates/common.yaml b/games/minecraft-java/0.0.57/templates/common.yaml similarity index 100% rename from games/minecraft-java/0.0.56/templates/common.yaml rename to games/minecraft-java/0.0.57/templates/common.yaml diff --git a/games/minecraft-java/0.0.56/values.yaml b/games/minecraft-java/0.0.57/values.yaml similarity index 100% rename from games/minecraft-java/0.0.56/values.yaml rename to games/minecraft-java/0.0.57/values.yaml diff --git a/incubator/ghost/1.0.38/CHANGELOG.md b/incubator/ghost/1.0.39/CHANGELOG.md similarity index 88% rename from incubator/ghost/1.0.38/CHANGELOG.md rename to incubator/ghost/1.0.39/CHANGELOG.md index 22576220565..65aaa635ad8 100644 --- a/incubator/ghost/1.0.38/CHANGELOG.md +++ b/incubator/ghost/1.0.39/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [ghost-1.0.39](https://github.com/truecharts/apps/compare/ghost-1.0.38...ghost-1.0.39) (2022-05-25) + +#### Chore + +* update container image tccr.io/truecharts/ghost to v5.0.0 ([#2748](https://github.com/truecharts/apps/issues/2748)) + + + ### [ghost-1.0.38](https://github.com/truecharts/apps/compare/ghost-1.0.37...ghost-1.0.38) (2022-05-24) @@ -88,12 +97,3 @@ ### [ghost-1.0.29](https://github.com/truecharts/apps/compare/ghost-1.0.28...ghost-1.0.29) (2022-05-10) #### Chore - -* Auto-update chart README [skip ci] -* Auto-update chart README [skip ci] -* update helm general non-major helm releases ([#2649](https://github.com/truecharts/apps/issues/2649)) -* move to incubator, because upstream does not support mariadb ([#2631](https://github.com/truecharts/apps/issues/2631)) - - - - diff --git a/incubator/ghost/1.0.38/CONFIG.md b/incubator/ghost/1.0.39/CONFIG.md similarity index 100% rename from incubator/ghost/1.0.38/CONFIG.md rename to incubator/ghost/1.0.39/CONFIG.md diff --git a/incubator/ghost/1.0.38/Chart.lock b/incubator/ghost/1.0.39/Chart.lock similarity index 85% rename from incubator/ghost/1.0.38/Chart.lock rename to incubator/ghost/1.0.39/Chart.lock index 09c0fc65d35..1efba589475 100644 --- a/incubator/ghost/1.0.38/Chart.lock +++ b/incubator/ghost/1.0.39/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://charts.truecharts.org/ version: 2.0.76 digest: sha256:4311425693cdc848834dc4ef11ec4559ac7e90135d81767b5a64a7661e5d6e52 -generated: "2022-05-24T18:21:53.045076827Z" +generated: "2022-05-25T06:55:46.163905274Z" diff --git a/incubator/ghost/1.0.38/Chart.yaml b/incubator/ghost/1.0.39/Chart.yaml similarity index 96% rename from incubator/ghost/1.0.38/Chart.yaml rename to incubator/ghost/1.0.39/Chart.yaml index 45acb7ff3af..987429e5649 100644 --- a/incubator/ghost/1.0.38/Chart.yaml +++ b/incubator/ghost/1.0.39/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "4.48.0" +appVersion: "5.0.0" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -25,7 +25,7 @@ sources: - https://github.com/TryGhost/Ghost - https://hub.docker.com/_/ghost - https://ghost.org/docs/ -version: 1.0.38 +version: 1.0.39 annotations: truecharts.org/catagories: | - productivity diff --git a/incubator/ghost/1.0.38/README.md b/incubator/ghost/1.0.39/README.md similarity index 100% rename from incubator/ghost/1.0.38/README.md rename to incubator/ghost/1.0.39/README.md diff --git a/incubator/ghost/1.0.38/app-readme.md b/incubator/ghost/1.0.39/app-readme.md similarity index 100% rename from incubator/ghost/1.0.38/app-readme.md rename to incubator/ghost/1.0.39/app-readme.md diff --git a/incubator/ghost/1.0.38/charts/common-9.3.17.tgz b/incubator/ghost/1.0.39/charts/common-9.3.17.tgz similarity index 100% rename from incubator/ghost/1.0.38/charts/common-9.3.17.tgz rename to incubator/ghost/1.0.39/charts/common-9.3.17.tgz diff --git a/incubator/ghost/1.0.38/charts/mariadb-2.0.76.tgz b/incubator/ghost/1.0.39/charts/mariadb-2.0.76.tgz similarity index 100% rename from incubator/ghost/1.0.38/charts/mariadb-2.0.76.tgz rename to incubator/ghost/1.0.39/charts/mariadb-2.0.76.tgz diff --git a/incubator/ghost/1.0.38/helm-values.md b/incubator/ghost/1.0.39/helm-values.md similarity index 100% rename from incubator/ghost/1.0.38/helm-values.md rename to incubator/ghost/1.0.39/helm-values.md diff --git a/incubator/ghost/1.0.38/ix_values.yaml b/incubator/ghost/1.0.39/ix_values.yaml similarity index 95% rename from incubator/ghost/1.0.38/ix_values.yaml rename to incubator/ghost/1.0.39/ix_values.yaml index da30adaafee..8c2be2227b2 100644 --- a/incubator/ghost/1.0.38/ix_values.yaml +++ b/incubator/ghost/1.0.39/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/ghost - tag: v4.48.0@sha256:7ba970dafeeb198c1036dc98d11b1d2d0c3c57c65b268d48faf544cf71c01525 + tag: v5.0.0@sha256:f5790fa98cb14f225caab9bd68a04dc9023fb137cbd269fa5773290882e12463 pullPolicy: IfNotPresent env: diff --git a/incubator/ghost/1.0.38/questions.yaml b/incubator/ghost/1.0.39/questions.yaml similarity index 100% rename from incubator/ghost/1.0.38/questions.yaml rename to incubator/ghost/1.0.39/questions.yaml diff --git a/incubator/ghost/1.0.38/security.md b/incubator/ghost/1.0.39/security.md similarity index 99% rename from incubator/ghost/1.0.38/security.md rename to incubator/ghost/1.0.39/security.md index 66f368d50b0..5fbb493889e 100644 --- a/incubator/ghost/1.0.38/security.md +++ b/incubator/ghost/1.0.39/security.md @@ -78,7 +78,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/mariadb:v10.7.3@sha256:7e6cda19aa5edae8cfef06f3e5370bfd38a23ece5651c17961a05d7ff9cb8f90 - tccr.io/truecharts/ghost:v4.48.0@sha256:7ba970dafeeb198c1036dc98d11b1d2d0c3c57c65b268d48faf544cf71c01525 + tccr.io/truecharts/ghost:v5.0.0@sha256:f5790fa98cb14f225caab9bd68a04dc9023fb137cbd269fa5773290882e12463 ##### Scan Results @@ -233,12 +233,12 @@ hide: | libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| @@ -473,12 +473,12 @@ hide: | libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| @@ -571,7 +571,7 @@ hide: -#### Container: tccr.io/truecharts/ghost:v4.48.0@sha256:7ba970dafeeb198c1036dc98d11b1d2d0c3c57c65b268d48faf544cf71c01525 (debian 11.3) +#### Container: tccr.io/truecharts/ghost:v5.0.0@sha256:f5790fa98cb14f225caab9bd68a04dc9023fb137cbd269fa5773290882e12463 (debian 11.3) **debian** @@ -663,8 +663,6 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| ansi-regex | CVE-2021-3807 | HIGH | 3.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| ansi-regex | CVE-2021-3807 | HIGH | 4.1.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
| | async | CVE-2021-43138 | HIGH | 0.9.2 | 2.6.4, 3.2.2 |
Expand...https://github.com/advisories/GHSA-fwr7-v2mv-hh25
https://github.com/caolan/async/blob/master/lib/internal/iterator.js
https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js
https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264
https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2
https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d
https://github.com/caolan/async/compare/v2.6.3...v2.6.4
https://github.com/caolan/async/pull/1828
https://jsfiddle.net/oz5twjd9/
https://nvd.nist.gov/vuln/detail/CVE-2021-43138
| | async | CVE-2021-43138 | HIGH | 1.5.2 | 2.6.4, 3.2.2 |
Expand...https://github.com/advisories/GHSA-fwr7-v2mv-hh25
https://github.com/caolan/async/blob/master/lib/internal/iterator.js
https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js
https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264
https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2
https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d
https://github.com/caolan/async/compare/v2.6.3...v2.6.4
https://github.com/caolan/async/pull/1828
https://jsfiddle.net/oz5twjd9/
https://nvd.nist.gov/vuln/detail/CVE-2021-43138
| | async | CVE-2021-43138 | HIGH | 2.6.3 | 2.6.4, 3.2.2 |
Expand...https://github.com/advisories/GHSA-fwr7-v2mv-hh25
https://github.com/caolan/async/blob/master/lib/internal/iterator.js
https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js
https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264
https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2
https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d
https://github.com/caolan/async/compare/v2.6.3...v2.6.4
https://github.com/caolan/async/pull/1828
https://jsfiddle.net/oz5twjd9/
https://nvd.nist.gov/vuln/detail/CVE-2021-43138
| diff --git a/incubator/ghost/1.0.38/templates/common.yaml b/incubator/ghost/1.0.39/templates/common.yaml similarity index 100% rename from incubator/ghost/1.0.38/templates/common.yaml rename to incubator/ghost/1.0.39/templates/common.yaml diff --git a/incubator/ghost/1.0.38/values.yaml b/incubator/ghost/1.0.39/values.yaml similarity index 100% rename from incubator/ghost/1.0.38/values.yaml rename to incubator/ghost/1.0.39/values.yaml diff --git a/stable/audiobookshelf/1.0.15/CHANGELOG.md b/stable/audiobookshelf/1.0.16/CHANGELOG.md similarity index 90% rename from stable/audiobookshelf/1.0.15/CHANGELOG.md rename to stable/audiobookshelf/1.0.16/CHANGELOG.md index b5c0088f1ac..c0b8ef8af55 100644 --- a/stable/audiobookshelf/1.0.15/CHANGELOG.md +++ b/stable/audiobookshelf/1.0.16/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [audiobookshelf-1.0.16](https://github.com/truecharts/apps/compare/audiobookshelf-1.0.15...audiobookshelf-1.0.16) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [audiobookshelf-1.0.15](https://github.com/truecharts/apps/compare/audiobookshelf-1.0.14...audiobookshelf-1.0.15) (2022-05-24) @@ -88,12 +97,3 @@ #### Chore -* update docker general non-major - - - - -### [audiobookshelf-1.0.6](https://github.com/truecharts/apps/compare/audiobookshelf-1.0.5...audiobookshelf-1.0.6) (2022-05-05) - -#### Chore - diff --git a/stable/audiobookshelf/1.0.16/Chart.lock b/stable/audiobookshelf/1.0.16/Chart.lock new file mode 100644 index 00000000000..742fe825c1e --- /dev/null +++ b/stable/audiobookshelf/1.0.16/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.17 +digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc +generated: "2022-05-25T06:55:58.221589199Z" diff --git a/stable/audiobookshelf/1.0.15/Chart.yaml b/stable/audiobookshelf/1.0.16/Chart.yaml similarity index 95% rename from stable/audiobookshelf/1.0.15/Chart.yaml rename to stable/audiobookshelf/1.0.16/Chart.yaml index 9d2a265e231..a9c88de61bd 100644 --- a/stable/audiobookshelf/1.0.15/Chart.yaml +++ b/stable/audiobookshelf/1.0.16/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "2.0.15" +appVersion: "2.0.17" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -18,7 +18,7 @@ name: audiobookshelf sources: - https://hub.docker.com/r/advplyr/audiobookshelf - https://github.com/advplyr/audiobookshelf -version: 1.0.15 +version: 1.0.16 annotations: truecharts.org/catagories: | - media diff --git a/stable/audiobookshelf/1.0.15/README.md b/stable/audiobookshelf/1.0.16/README.md similarity index 100% rename from stable/audiobookshelf/1.0.15/README.md rename to stable/audiobookshelf/1.0.16/README.md diff --git a/stable/audiobookshelf/1.0.15/app-readme.md b/stable/audiobookshelf/1.0.16/app-readme.md similarity index 100% rename from stable/audiobookshelf/1.0.15/app-readme.md rename to stable/audiobookshelf/1.0.16/app-readme.md diff --git a/stable/audiobookshelf/1.0.15/charts/common-9.3.17.tgz b/stable/audiobookshelf/1.0.16/charts/common-9.3.17.tgz similarity index 100% rename from stable/audiobookshelf/1.0.15/charts/common-9.3.17.tgz rename to stable/audiobookshelf/1.0.16/charts/common-9.3.17.tgz diff --git a/stable/audiobookshelf/1.0.15/ix_values.yaml b/stable/audiobookshelf/1.0.16/ix_values.yaml similarity index 87% rename from stable/audiobookshelf/1.0.15/ix_values.yaml rename to stable/audiobookshelf/1.0.16/ix_values.yaml index b5deea1c237..9343ca627b8 100644 --- a/stable/audiobookshelf/1.0.15/ix_values.yaml +++ b/stable/audiobookshelf/1.0.16/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/audiobookshelf - tag: v2.0.15@sha256:0dc773818acbe196728b4e885fef63455e62362e93af745702c13b4e76a67a16 + tag: v2.0.17@sha256:8d27398befb8fec5f5888bd9e13999f3a08ff7cb57993aa759e6820917887eb2 pullPolicy: IfNotPresent env: diff --git a/stable/audiobookshelf/1.0.15/questions.yaml b/stable/audiobookshelf/1.0.16/questions.yaml similarity index 100% rename from stable/audiobookshelf/1.0.15/questions.yaml rename to stable/audiobookshelf/1.0.16/questions.yaml diff --git a/stable/audiobookshelf/1.0.15/security.md b/stable/audiobookshelf/1.0.16/security.md similarity index 99% rename from stable/audiobookshelf/1.0.15/security.md rename to stable/audiobookshelf/1.0.16/security.md index 73590aec46d..feedcc26e67 100644 --- a/stable/audiobookshelf/1.0.15/security.md +++ b/stable/audiobookshelf/1.0.16/security.md @@ -44,7 +44,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/audiobookshelf:v2.0.15@sha256:0dc773818acbe196728b4e885fef63455e62362e93af745702c13b4e76a67a16 + tccr.io/truecharts/audiobookshelf:v2.0.17@sha256:8d27398befb8fec5f5888bd9e13999f3a08ff7cb57993aa759e6820917887eb2 ##### Scan Results @@ -91,7 +91,7 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/audiobookshelf:v2.0.15@sha256:0dc773818acbe196728b4e885fef63455e62362e93af745702c13b4e76a67a16 (alpine 3.15.4) +#### Container: tccr.io/truecharts/audiobookshelf:v2.0.17@sha256:8d27398befb8fec5f5888bd9e13999f3a08ff7cb57993aa759e6820917887eb2 (alpine 3.15.4) **alpine** diff --git a/stable/audiobookshelf/1.0.15/templates/_secrets.tpl b/stable/audiobookshelf/1.0.16/templates/_secrets.tpl similarity index 100% rename from stable/audiobookshelf/1.0.15/templates/_secrets.tpl rename to stable/audiobookshelf/1.0.16/templates/_secrets.tpl diff --git a/stable/audiobookshelf/1.0.15/templates/common.yaml b/stable/audiobookshelf/1.0.16/templates/common.yaml similarity index 100% rename from stable/audiobookshelf/1.0.15/templates/common.yaml rename to stable/audiobookshelf/1.0.16/templates/common.yaml diff --git a/stable/audiobookshelf/1.0.15/values.yaml b/stable/audiobookshelf/1.0.16/values.yaml similarity index 100% rename from stable/audiobookshelf/1.0.15/values.yaml rename to stable/audiobookshelf/1.0.16/values.yaml diff --git a/stable/cyberchef/1.0.25/Chart.lock b/stable/cyberchef/1.0.25/Chart.lock deleted file mode 100644 index 241305de1b0..00000000000 --- a/stable/cyberchef/1.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 9.3.17 -digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc -generated: "2022-05-24T06:43:27.235771179Z" diff --git a/stable/cyberchef/1.0.25/CHANGELOG.md b/stable/cyberchef/1.0.26/CHANGELOG.md similarity index 87% rename from stable/cyberchef/1.0.25/CHANGELOG.md rename to stable/cyberchef/1.0.26/CHANGELOG.md index 7d9882ab5ea..a523882e4a3 100644 --- a/stable/cyberchef/1.0.25/CHANGELOG.md +++ b/stable/cyberchef/1.0.26/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [cyberchef-1.0.26](https://github.com/truecharts/apps/compare/cyberchef-1.0.25...cyberchef-1.0.26) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) +* update docker general non-major ([#2740](https://github.com/truecharts/apps/issues/2740)) + + + ### [cyberchef-1.0.25](https://github.com/truecharts/apps/compare/cyberchef-1.0.24...cyberchef-1.0.25) (2022-05-24) @@ -87,13 +97,3 @@ -### [cyberchef-1.0.15](https://github.com/truecharts/apps/compare/cyberchef-1.0.14...cyberchef-1.0.15) (2022-05-14) - -#### Chore - -* update docker general non-major ([#2679](https://github.com/truecharts/apps/issues/2679)) - - - - -### [cyberchef-1.0.14](https://github.com/truecharts/apps/compare/cyberchef-1.0.13...cyberchef-1.0.14) (2022-05-13) diff --git a/stable/audiobookshelf/1.0.15/Chart.lock b/stable/cyberchef/1.0.26/Chart.lock similarity index 80% rename from stable/audiobookshelf/1.0.15/Chart.lock rename to stable/cyberchef/1.0.26/Chart.lock index 9115c680dc0..a68352ccc7f 100644 --- a/stable/audiobookshelf/1.0.15/Chart.lock +++ b/stable/cyberchef/1.0.26/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 9.3.17 digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc -generated: "2022-05-24T06:39:02.90184481Z" +generated: "2022-05-25T06:56:01.42607899Z" diff --git a/stable/cyberchef/1.0.25/Chart.yaml b/stable/cyberchef/1.0.26/Chart.yaml similarity index 97% rename from stable/cyberchef/1.0.25/Chart.yaml rename to stable/cyberchef/1.0.26/Chart.yaml index 3e0de06c382..94741dcc894 100644 --- a/stable/cyberchef/1.0.25/Chart.yaml +++ b/stable/cyberchef/1.0.26/Chart.yaml @@ -17,7 +17,7 @@ maintainers: name: cyberchef sources: - https://hub.docker.com/r/mpepping/cyberchef -version: 1.0.25 +version: 1.0.26 annotations: truecharts.org/catagories: | - utilities diff --git a/stable/cyberchef/1.0.25/README.md b/stable/cyberchef/1.0.26/README.md similarity index 100% rename from stable/cyberchef/1.0.25/README.md rename to stable/cyberchef/1.0.26/README.md diff --git a/stable/cyberchef/1.0.25/app-readme.md b/stable/cyberchef/1.0.26/app-readme.md similarity index 100% rename from stable/cyberchef/1.0.25/app-readme.md rename to stable/cyberchef/1.0.26/app-readme.md diff --git a/stable/cyberchef/1.0.25/charts/common-9.3.17.tgz b/stable/cyberchef/1.0.26/charts/common-9.3.17.tgz similarity index 100% rename from stable/cyberchef/1.0.25/charts/common-9.3.17.tgz rename to stable/cyberchef/1.0.26/charts/common-9.3.17.tgz diff --git a/stable/cyberchef/1.0.25/ix_values.yaml b/stable/cyberchef/1.0.26/ix_values.yaml similarity index 76% rename from stable/cyberchef/1.0.25/ix_values.yaml rename to stable/cyberchef/1.0.26/ix_values.yaml index c6a64066d00..68197607e42 100644 --- a/stable/cyberchef/1.0.25/ix_values.yaml +++ b/stable/cyberchef/1.0.26/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/cyberchef - tag: v9.37.3@sha256:81423c32f332b4edb732da0a1d7c25a3d9f81faa38fa04c8bbe547ff392d078c + tag: v9.37.3@sha256:14bd32ffbcbe1eaf992e5a7853e3fa43f89f3f1b5d88979c3b6248f60033f4ec pullPolicy: IfNotPresent securityContext: diff --git a/stable/cyberchef/1.0.25/questions.yaml b/stable/cyberchef/1.0.26/questions.yaml similarity index 100% rename from stable/cyberchef/1.0.25/questions.yaml rename to stable/cyberchef/1.0.26/questions.yaml diff --git a/stable/cyberchef/1.0.25/security.md b/stable/cyberchef/1.0.26/security.md similarity index 89% rename from stable/cyberchef/1.0.25/security.md rename to stable/cyberchef/1.0.26/security.md index 0bce195c296..4f249271337 100644 --- a/stable/cyberchef/1.0.25/security.md +++ b/stable/cyberchef/1.0.26/security.md @@ -46,7 +46,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/cyberchef:v9.37.3@sha256:81423c32f332b4edb732da0a1d7c25a3d9f81faa38fa04c8bbe547ff392d078c + tccr.io/truecharts/cyberchef:v9.37.3@sha256:14bd32ffbcbe1eaf992e5a7853e3fa43f89f3f1b5d88979c3b6248f60033f4ec ##### Scan Results @@ -93,13 +93,11 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/cyberchef:v9.37.3@sha256:81423c32f332b4edb732da0a1d7c25a3d9f81faa38fa04c8bbe547ff392d078c (alpine 3.15.4) +#### Container: tccr.io/truecharts/cyberchef:v9.37.3@sha256:14bd32ffbcbe1eaf992e5a7853e3fa43f89f3f1b5d88979c3b6248f60033f4ec (alpine 3.15.4) **alpine** -| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | -|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| freetype | CVE-2022-27405 | HIGH | 2.11.1-r1 | 2.11.1-r2 |
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27405
| -| freetype | CVE-2022-27406 | HIGH | 2.11.1-r1 | 2.11.1-r2 |
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27406
| +| No Vulnerabilities found | +|:---------------------------------| diff --git a/stable/cyberchef/1.0.25/templates/common.yaml b/stable/cyberchef/1.0.26/templates/common.yaml similarity index 100% rename from stable/cyberchef/1.0.25/templates/common.yaml rename to stable/cyberchef/1.0.26/templates/common.yaml diff --git a/stable/cyberchef/1.0.25/values.yaml b/stable/cyberchef/1.0.26/values.yaml similarity index 100% rename from stable/cyberchef/1.0.25/values.yaml rename to stable/cyberchef/1.0.26/values.yaml diff --git a/stable/deconz/7.0.25/Chart.lock b/stable/deconz/7.0.25/Chart.lock deleted file mode 100644 index e4a1577d66f..00000000000 --- a/stable/deconz/7.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 9.3.17 -digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc -generated: "2022-05-24T06:44:20.985043849Z" diff --git a/stable/deconz/7.0.25/CHANGELOG.md b/stable/deconz/7.0.26/CHANGELOG.md similarity index 90% rename from stable/deconz/7.0.25/CHANGELOG.md rename to stable/deconz/7.0.26/CHANGELOG.md index f5b4fb7e7b6..8fe043eff77 100644 --- a/stable/deconz/7.0.25/CHANGELOG.md +++ b/stable/deconz/7.0.26/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [deconz-7.0.26](https://github.com/truecharts/apps/compare/deconz-7.0.25...deconz-7.0.26) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [deconz-7.0.25](https://github.com/truecharts/apps/compare/deconz-7.0.24...deconz-7.0.25) (2022-05-24) @@ -88,12 +97,3 @@ ### [deconz-7.0.16](https://github.com/truecharts/apps/compare/deconz-7.0.15...deconz-7.0.16) (2022-04-26) #### Chore - -* update helm general non-major helm releases ([#2573](https://github.com/truecharts/apps/issues/2573)) - - - - -### [deconz-7.0.15](https://github.com/truecharts/apps/compare/deconz-7.0.14...deconz-7.0.15) (2022-04-26) - -#### Chore diff --git a/stable/deconz/7.0.25/CONFIG.md b/stable/deconz/7.0.26/CONFIG.md similarity index 100% rename from stable/deconz/7.0.25/CONFIG.md rename to stable/deconz/7.0.26/CONFIG.md diff --git a/stable/deconz/7.0.26/Chart.lock b/stable/deconz/7.0.26/Chart.lock new file mode 100644 index 00000000000..b5918d7b1c0 --- /dev/null +++ b/stable/deconz/7.0.26/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.17 +digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc +generated: "2022-05-25T06:56:17.669720293Z" diff --git a/stable/deconz/7.0.25/Chart.yaml b/stable/deconz/7.0.26/Chart.yaml similarity index 95% rename from stable/deconz/7.0.25/Chart.yaml rename to stable/deconz/7.0.26/Chart.yaml index 8a4877994b0..8aed3c5e1f6 100644 --- a/stable/deconz/7.0.25/Chart.yaml +++ b/stable/deconz/7.0.26/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "2.16.00" +appVersion: "2.16.01" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -22,7 +22,7 @@ name: deconz sources: - https://github.com/dresden-elektronik/deconz-rest-plugin - https://github.com/marthoc/docker-deconz -version: 7.0.25 +version: 7.0.26 annotations: truecharts.org/catagories: | - media diff --git a/stable/deconz/7.0.25/README.md b/stable/deconz/7.0.26/README.md similarity index 100% rename from stable/deconz/7.0.25/README.md rename to stable/deconz/7.0.26/README.md diff --git a/stable/deconz/7.0.25/app-readme.md b/stable/deconz/7.0.26/app-readme.md similarity index 100% rename from stable/deconz/7.0.25/app-readme.md rename to stable/deconz/7.0.26/app-readme.md diff --git a/stable/deconz/7.0.25/charts/common-9.3.17.tgz b/stable/deconz/7.0.26/charts/common-9.3.17.tgz similarity index 100% rename from stable/deconz/7.0.25/charts/common-9.3.17.tgz rename to stable/deconz/7.0.26/charts/common-9.3.17.tgz diff --git a/stable/deconz/7.0.25/ci/test-values.yaml b/stable/deconz/7.0.26/ci/test-values.yaml similarity index 100% rename from stable/deconz/7.0.25/ci/test-values.yaml rename to stable/deconz/7.0.26/ci/test-values.yaml diff --git a/stable/deconz/7.0.25/helm-values.md b/stable/deconz/7.0.26/helm-values.md similarity index 100% rename from stable/deconz/7.0.25/helm-values.md rename to stable/deconz/7.0.26/helm-values.md diff --git a/stable/deconz/7.0.25/ix_values.yaml b/stable/deconz/7.0.26/ix_values.yaml similarity index 94% rename from stable/deconz/7.0.25/ix_values.yaml rename to stable/deconz/7.0.26/ix_values.yaml index fc48eaf7257..46209deb736 100644 --- a/stable/deconz/7.0.25/ix_values.yaml +++ b/stable/deconz/7.0.26/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/deconz - tag: v2.16.00@sha256:b35aa8d200b583a21ccb09262b778fbeeebb52dd9f5edb94f777c9a51b642f58 + tag: v2.16.01@sha256:72f70eaf5350cf60f2750c0fb6357ff39a7bd915f4e6660036f8ceef1c2ddae9 pullPolicy: IfNotPresent securityContext: diff --git a/stable/deconz/7.0.25/questions.yaml b/stable/deconz/7.0.26/questions.yaml similarity index 100% rename from stable/deconz/7.0.25/questions.yaml rename to stable/deconz/7.0.26/questions.yaml diff --git a/stable/deconz/7.0.25/security.md b/stable/deconz/7.0.26/security.md similarity index 96% rename from stable/deconz/7.0.25/security.md rename to stable/deconz/7.0.26/security.md index 0f3e3b27bbb..78c19ec88fc 100644 --- a/stable/deconz/7.0.25/security.md +++ b/stable/deconz/7.0.26/security.md @@ -46,7 +46,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/deconz:v2.16.00@sha256:b35aa8d200b583a21ccb09262b778fbeeebb52dd9f5edb94f777c9a51b642f58 + tccr.io/truecharts/deconz:v2.16.01@sha256:72f70eaf5350cf60f2750c0fb6357ff39a7bd915f4e6660036f8ceef1c2ddae9 ##### Scan Results @@ -93,7 +93,7 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/deconz:v2.16.00@sha256:b35aa8d200b583a21ccb09262b778fbeeebb52dd9f5edb94f777c9a51b642f58 (debian 11.2) +#### Container: tccr.io/truecharts/deconz:v2.16.01@sha256:72f70eaf5350cf60f2750c0fb6357ff39a7bd915f4e6660036f8ceef1c2ddae9 (debian 11.2) **debian** @@ -307,16 +307,14 @@ hide: | libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | liblapack3 | CVE-2021-4048 | CRITICAL | 3.9.0-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048
https://github.com/JuliaLang/julia/issues/42415
https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781
https://github.com/Reference-LAPACK/lapack/pull/625
https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c
https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41
https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7
https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/
https://nvd.nist.gov/vuln/detail/CVE-2021-4048
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.57+dfsg-3 | 2.4.57+dfsg-3+deb11u1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| -| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| -| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.57+dfsg-3 | 2.4.57+dfsg-3+deb11u1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| -| libldap-common | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| -| libldap-common | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2020-15719 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | liblzma5 | CVE-2022-1271 | HIGH | 5.2.5-2 | 5.2.5-2.1~deb11u1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-2191.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| | libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| @@ -370,9 +368,8 @@ hide: | libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.34.1-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
| | libsqlite3-0 | CVE-2021-36690 | LOW | 3.34.1-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| | libss2 | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| -| libssl1.1 | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://ubuntu.com/security/notices/USN-5402-1
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| -| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| -| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libtiff5 | CVE-2022-1210 | MEDIUM | 4.2.0-1+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1210
https://gitlab.com/libtiff/libtiff/-/issues/402
https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff
https://nvd.nist.gov/vuln/detail/CVE-2022-1210
https://security.netapp.com/advisory/ntap-20220513-0005/
https://vuldb.com/?id.196363
| @@ -396,7 +393,6 @@ hide: | libwebp6 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://access.redhat.com/security/cve/CVE-2016-9085
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| | libwebpdemux2 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://access.redhat.com/security/cve/CVE-2016-9085
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| | libwebpmux3 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://access.redhat.com/security/cve/CVE-2016-9085
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| -| libxml2 | CVE-2022-29824 | MEDIUM | 2.9.10+dfsg-6.7+deb11u1 | 2.9.10+dfsg-6.7+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
https://www.debian.org/security/2022/dsa-5142
| | login | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| @@ -406,9 +402,8 @@ hide: | ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| | ncurses-bin | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| | ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| openssl | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://ubuntu.com/security/notices/USN-5402-1
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| -| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| -| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| | passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| diff --git a/stable/deconz/7.0.25/templates/common.yaml b/stable/deconz/7.0.26/templates/common.yaml similarity index 100% rename from stable/deconz/7.0.25/templates/common.yaml rename to stable/deconz/7.0.26/templates/common.yaml diff --git a/stable/deconz/7.0.25/values.yaml b/stable/deconz/7.0.26/values.yaml similarity index 100% rename from stable/deconz/7.0.25/values.yaml rename to stable/deconz/7.0.26/values.yaml diff --git a/stable/dokuwiki/2.0.26/Chart.lock b/stable/dokuwiki/2.0.26/Chart.lock deleted file mode 100644 index c73ff2ef9e9..00000000000 --- a/stable/dokuwiki/2.0.26/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 9.3.17 -digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc -generated: "2022-05-24T06:45:36.109714503Z" diff --git a/stable/dokuwiki/2.0.26/CHANGELOG.md b/stable/dokuwiki/2.0.27/CHANGELOG.md similarity index 88% rename from stable/dokuwiki/2.0.26/CHANGELOG.md rename to stable/dokuwiki/2.0.27/CHANGELOG.md index c056d34c7e3..a68552eda6b 100644 --- a/stable/dokuwiki/2.0.26/CHANGELOG.md +++ b/stable/dokuwiki/2.0.27/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [dokuwiki-2.0.27](https://github.com/truecharts/apps/compare/dokuwiki-2.0.26...dokuwiki-2.0.27) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) +* update docker general non-major ([#2740](https://github.com/truecharts/apps/issues/2740)) + + + ### [dokuwiki-2.0.26](https://github.com/truecharts/apps/compare/dokuwiki-2.0.25...dokuwiki-2.0.26) (2022-05-24) @@ -87,13 +97,3 @@ ### [dokuwiki-2.0.16](https://github.com/truecharts/apps/compare/dokuwiki-2.0.15...dokuwiki-2.0.16) (2022-05-13) - -#### Chore - -* update docker general non-major ([#2658](https://github.com/truecharts/apps/issues/2658)) - - - - -### [dokuwiki-2.0.15](https://github.com/truecharts/apps/compare/dokuwiki-2.0.14...dokuwiki-2.0.15) (2022-05-11) - diff --git a/stable/dokuwiki/2.0.26/CONFIG.md b/stable/dokuwiki/2.0.27/CONFIG.md similarity index 100% rename from stable/dokuwiki/2.0.26/CONFIG.md rename to stable/dokuwiki/2.0.27/CONFIG.md diff --git a/stable/dokuwiki/2.0.27/Chart.lock b/stable/dokuwiki/2.0.27/Chart.lock new file mode 100644 index 00000000000..f3f437e84f1 --- /dev/null +++ b/stable/dokuwiki/2.0.27/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.17 +digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc +generated: "2022-05-25T06:56:30.656860932Z" diff --git a/stable/dokuwiki/2.0.26/Chart.yaml b/stable/dokuwiki/2.0.27/Chart.yaml similarity index 98% rename from stable/dokuwiki/2.0.26/Chart.yaml rename to stable/dokuwiki/2.0.27/Chart.yaml index e2d8695af00..5e948fd8fd9 100644 --- a/stable/dokuwiki/2.0.26/Chart.yaml +++ b/stable/dokuwiki/2.0.27/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: dokuwiki -version: 2.0.26 +version: 2.0.27 appVersion: "20200729.0" description: Dokuwiki is a simple to use and highly versatile Open Source wiki software that doesn't require a database. type: application diff --git a/stable/dokuwiki/2.0.26/README.md b/stable/dokuwiki/2.0.27/README.md similarity index 100% rename from stable/dokuwiki/2.0.26/README.md rename to stable/dokuwiki/2.0.27/README.md diff --git a/stable/dokuwiki/2.0.26/app-readme.md b/stable/dokuwiki/2.0.27/app-readme.md similarity index 100% rename from stable/dokuwiki/2.0.26/app-readme.md rename to stable/dokuwiki/2.0.27/app-readme.md diff --git a/stable/dokuwiki/2.0.26/charts/common-9.3.17.tgz b/stable/dokuwiki/2.0.27/charts/common-9.3.17.tgz similarity index 100% rename from stable/dokuwiki/2.0.26/charts/common-9.3.17.tgz rename to stable/dokuwiki/2.0.27/charts/common-9.3.17.tgz diff --git a/stable/dokuwiki/2.0.26/helm-values.md b/stable/dokuwiki/2.0.27/helm-values.md similarity index 100% rename from stable/dokuwiki/2.0.26/helm-values.md rename to stable/dokuwiki/2.0.27/helm-values.md diff --git a/stable/dokuwiki/2.0.26/ix_values.yaml b/stable/dokuwiki/2.0.27/ix_values.yaml similarity index 85% rename from stable/dokuwiki/2.0.26/ix_values.yaml rename to stable/dokuwiki/2.0.27/ix_values.yaml index c5a5425ba36..c6385c37db6 100644 --- a/stable/dokuwiki/2.0.26/ix_values.yaml +++ b/stable/dokuwiki/2.0.27/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/dokuwiki pullPolicy: IfNotPresent - tag: v20200729.0.0@sha256:1b75ca1c0eae5aa2c5a8ae5f606dac05f11257687a8d5615645b212c51d9c76c + tag: v20200729.0.0@sha256:f4f720efce405eec224b7a8880f59291fa206bcd4bfffd57a396b52b64b6e052 securityContext: runAsNonRoot: false diff --git a/stable/dokuwiki/2.0.26/questions.yaml b/stable/dokuwiki/2.0.27/questions.yaml similarity index 100% rename from stable/dokuwiki/2.0.26/questions.yaml rename to stable/dokuwiki/2.0.27/questions.yaml diff --git a/stable/dokuwiki/2.0.26/security.md b/stable/dokuwiki/2.0.27/security.md similarity index 99% rename from stable/dokuwiki/2.0.26/security.md rename to stable/dokuwiki/2.0.27/security.md index 1c08726f6f8..502414290c1 100644 --- a/stable/dokuwiki/2.0.26/security.md +++ b/stable/dokuwiki/2.0.27/security.md @@ -46,7 +46,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/dokuwiki:v20200729.0.0@sha256:1b75ca1c0eae5aa2c5a8ae5f606dac05f11257687a8d5615645b212c51d9c76c + tccr.io/truecharts/dokuwiki:v20200729.0.0@sha256:f4f720efce405eec224b7a8880f59291fa206bcd4bfffd57a396b52b64b6e052 ##### Scan Results @@ -93,7 +93,7 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/dokuwiki:v20200729.0.0@sha256:1b75ca1c0eae5aa2c5a8ae5f606dac05f11257687a8d5615645b212c51d9c76c (debian 10.12) +#### Container: tccr.io/truecharts/dokuwiki:v20200729.0.0@sha256:f4f720efce405eec224b7a8880f59291fa206bcd4bfffd57a396b52b64b6e052 (debian 10.12) **debian** diff --git a/stable/dokuwiki/2.0.26/templates/common.yaml b/stable/dokuwiki/2.0.27/templates/common.yaml similarity index 100% rename from stable/dokuwiki/2.0.26/templates/common.yaml rename to stable/dokuwiki/2.0.27/templates/common.yaml diff --git a/stable/dokuwiki/2.0.26/values.yaml b/stable/dokuwiki/2.0.27/values.yaml similarity index 100% rename from stable/dokuwiki/2.0.26/values.yaml rename to stable/dokuwiki/2.0.27/values.yaml diff --git a/stable/double-take/1.0.14/Chart.lock b/stable/double-take/1.0.14/Chart.lock deleted file mode 100644 index b5587c9f70f..00000000000 --- a/stable/double-take/1.0.14/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 9.3.17 -digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc -generated: "2022-05-24T18:23:25.341825124Z" diff --git a/stable/double-take/1.0.14/CHANGELOG.md b/stable/double-take/1.0.15/CHANGELOG.md similarity index 90% rename from stable/double-take/1.0.14/CHANGELOG.md rename to stable/double-take/1.0.15/CHANGELOG.md index dbb5733bbc2..bbd59755877 100644 --- a/stable/double-take/1.0.14/CHANGELOG.md +++ b/stable/double-take/1.0.15/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [double-take-1.0.15](https://github.com/truecharts/apps/compare/double-take-1.0.14...double-take-1.0.15) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [double-take-1.0.14](https://github.com/truecharts/apps/compare/double-take-1.0.13...double-take-1.0.14) (2022-05-24) @@ -88,12 +97,3 @@ ### [double-take-1.0.6](https://github.com/truecharts/apps/compare/double-take-1.0.5...double-take-1.0.6) (2022-04-12) #### Chore - -* update helm general non-major helm releases ([#2480](https://github.com/truecharts/apps/issues/2480)) - - - - -### [double-take-1.0.5](https://github.com/truecharts/apps/compare/double-take-1.0.4...double-take-1.0.5) (2022-04-03) - -#### Chore diff --git a/stable/double-take/1.0.14/CONFIG.md b/stable/double-take/1.0.15/CONFIG.md similarity index 100% rename from stable/double-take/1.0.14/CONFIG.md rename to stable/double-take/1.0.15/CONFIG.md diff --git a/stable/double-take/1.0.15/Chart.lock b/stable/double-take/1.0.15/Chart.lock new file mode 100644 index 00000000000..6e170c6ed4d --- /dev/null +++ b/stable/double-take/1.0.15/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.17 +digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc +generated: "2022-05-25T06:56:44.731212775Z" diff --git a/stable/double-take/1.0.14/Chart.yaml b/stable/double-take/1.0.15/Chart.yaml similarity index 95% rename from stable/double-take/1.0.14/Chart.yaml rename to stable/double-take/1.0.15/Chart.yaml index 08479dde628..d5956bbdadd 100644 --- a/stable/double-take/1.0.14/Chart.yaml +++ b/stable/double-take/1.0.15/Chart.yaml @@ -1,8 +1,8 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: double-take -version: 1.0.14 -appVersion: "1.9.0" +version: 1.0.15 +appVersion: "1.10.0" description: Unified UI and API for processing and training images for facial recognition type: application deprecated: false diff --git a/stable/double-take/1.0.14/README.md b/stable/double-take/1.0.15/README.md similarity index 100% rename from stable/double-take/1.0.14/README.md rename to stable/double-take/1.0.15/README.md diff --git a/stable/double-take/1.0.14/app-readme.md b/stable/double-take/1.0.15/app-readme.md similarity index 100% rename from stable/double-take/1.0.14/app-readme.md rename to stable/double-take/1.0.15/app-readme.md diff --git a/stable/double-take/1.0.14/charts/common-9.3.17.tgz b/stable/double-take/1.0.15/charts/common-9.3.17.tgz similarity index 100% rename from stable/double-take/1.0.14/charts/common-9.3.17.tgz rename to stable/double-take/1.0.15/charts/common-9.3.17.tgz diff --git a/stable/double-take/1.0.14/helm-values.md b/stable/double-take/1.0.15/helm-values.md similarity index 100% rename from stable/double-take/1.0.14/helm-values.md rename to stable/double-take/1.0.15/helm-values.md diff --git a/stable/double-take/1.0.14/ix_values.yaml b/stable/double-take/1.0.15/ix_values.yaml similarity index 72% rename from stable/double-take/1.0.14/ix_values.yaml rename to stable/double-take/1.0.15/ix_values.yaml index bb703d8a546..f6c9dec3d3c 100644 --- a/stable/double-take/1.0.14/ix_values.yaml +++ b/stable/double-take/1.0.15/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/double-take pullPolicy: IfNotPresent - tag: v1.9.0@sha256:a98a67a48e4bbe623d7db6fa0bfdb810d6dd6ba6c5fd28862c4e4692f975b7c2 + tag: v1.10.0@sha256:775e0b3a7f223c145eeb0f799d4371bb93266877ae1f7fc74d5a4fa1d8cb1820 service: main: diff --git a/stable/double-take/1.0.14/questions.yaml b/stable/double-take/1.0.15/questions.yaml similarity index 100% rename from stable/double-take/1.0.14/questions.yaml rename to stable/double-take/1.0.15/questions.yaml diff --git a/stable/double-take/1.0.14/security.md b/stable/double-take/1.0.15/security.md similarity index 98% rename from stable/double-take/1.0.14/security.md rename to stable/double-take/1.0.15/security.md index d8d1cfbacd1..d7f2a1e2f7b 100644 --- a/stable/double-take/1.0.14/security.md +++ b/stable/double-take/1.0.15/security.md @@ -44,7 +44,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/double-take:v1.9.0@sha256:a98a67a48e4bbe623d7db6fa0bfdb810d6dd6ba6c5fd28862c4e4692f975b7c2 + tccr.io/truecharts/double-take:v1.10.0@sha256:775e0b3a7f223c145eeb0f799d4371bb93266877ae1f7fc74d5a4fa1d8cb1820 ##### Scan Results @@ -91,7 +91,7 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/double-take:v1.9.0@sha256:a98a67a48e4bbe623d7db6fa0bfdb810d6dd6ba6c5fd28862c4e4692f975b7c2 (ubuntu 20.04) +#### Container: tccr.io/truecharts/double-take:v1.10.0@sha256:775e0b3a7f223c145eeb0f799d4371bb93266877ae1f7fc74d5a4fa1d8cb1820 (ubuntu 20.04) **ubuntu** @@ -206,68 +206,67 @@ hide: | libss2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| | libstdc++-9-dev | CVE-2020-13844 | MEDIUM | 9.4.0-1ubuntu1~20.04.1 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://access.redhat.com/security/cve/CVE-2020-13844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| | libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| -| linux-libc-dev | CVE-2022-1015 | HIGH | 5.4.0-110.124 | |
Expand...http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
https://access.redhat.com/security/cve/CVE-2022-1015
https://bugzilla.redhat.com/show_bug.cgi?id=2065323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015
https://nvd.nist.gov/vuln/detail/CVE-2022-1015
https://seclists.org/oss-sec/2022/q1/205
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5390-1
https://ubuntu.com/security/notices/USN-5390-2
https://www.openwall.com/lists/oss-security/2022/03/28/5
| -| linux-libc-dev | CVE-2022-1116 | HIGH | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1116
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/io_uring.c?h=v5.4.189&id=1a623d361ffe5cecd4244a02f449528416360038
https://kernel.dance/#1a623d361ffe5cecd4244a02f449528416360038
| -| linux-libc-dev | CVE-2013-7445 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-7445
https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| -| linux-libc-dev | CVE-2015-8553 | MEDIUM | 5.4.0-110.124 | |
Expand...http://thread.gmane.org/gmane.linux.kernel/1924087/focus=1930758 (regression mention)
http://xenbits.xen.org/xsa/advisory-120.html
https://access.redhat.com/security/cve/CVE-2015-8553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
https://seclists.org/bugtraq/2019/Aug/18
https://www.debian.org/security/2019/dsa-4497
| -| linux-libc-dev | CVE-2016-8660 | MEDIUM | 5.4.0-110.124 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://access.redhat.com/security/cve/CVE-2016-8660
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
| -| linux-libc-dev | CVE-2018-17977 | MEDIUM | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/105539
https://access.redhat.com/security/cve/CVE-2018-17977
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
| -| linux-libc-dev | CVE-2020-12362 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362
https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| -| linux-libc-dev | CVE-2020-24504 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-24504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504
https://linux.oracle.com/cve/CVE-2020-24504.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
| -| linux-libc-dev | CVE-2020-27835 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27835
https://bugzilla.redhat.com/show_bug.cgi?id=1901709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835
https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79
https://linux.oracle.com/cve/CVE-2020-27835.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://ubuntu.com/security/notices/USN-4751-1
| -| linux-libc-dev | CVE-2020-36310 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-36310
https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
https://linux.oracle.com/cve/CVE-2020-36310.html
https://linux.oracle.com/errata/ELSA-2021-9307.html
https://www.debian.org/security/2022/dsa-5095
| -| linux-libc-dev | CVE-2021-20320 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20320
https://bugzilla.redhat.com/show_bug.cgi?id=2010090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320
https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-20320
| -| linux-libc-dev | CVE-2021-33061 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33061
https://security.netapp.com/advisory/ntap-20220210-0010/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00571.html
| -| linux-libc-dev | CVE-2021-3864 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864
https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com
https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/
https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com
https://www.openwall.com/lists/oss-security/2021/10/20/2
| -| linux-libc-dev | CVE-2021-39800 | MEDIUM | 5.4.0-110.124 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39800
https://source.android.com/security/bulletin/2022-04-01
| -| linux-libc-dev | CVE-2021-39801 | MEDIUM | 5.4.0-110.124 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39801
https://source.android.com/security/bulletin/2022-04-01
| -| linux-libc-dev | CVE-2021-39802 | MEDIUM | 5.4.0-110.124 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39802
https://source.android.com/security/bulletin/2022-04-01
| -| linux-libc-dev | CVE-2021-4001 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4001
https://bugzilla.redhat.com/show_bug.cgi?id=2025645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4001
https://git.kernel.org/linus/353050be4c19e102178ccc05988101887c25ae53
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53
https://nvd.nist.gov/vuln/detail/CVE-2021-4001
https://ubuntu.com/security/notices/USN-5207-1
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5278-1
| -| linux-libc-dev | CVE-2021-4148 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4148
https://bugzilla.redhat.com/show_bug.cgi?id=2026487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148
https://lkml.org/lkml/2021/9/12/323
https://lkml.org/lkml/2021/9/17/1037
https://lore.kernel.org/linux-mm/a07564a3-b2fc-9ffe-3ace-3f276075ea5c@google.com/
https://lore.kernel.org/lkml/CACkBjsYwLYLRmX8GpsDpMthagWOjWWrNxqY6ZLNQVr6yx+f5vA@mail.gmail.com/
https://lore.kernel.org/lkml/CAHbLzkrdGva2dzO36r62LKv_ip5trbMK0BO3vCeSBk2_7OE-zA@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-4148
| -| linux-libc-dev | CVE-2021-4150 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4150
https://bugzilla.redhat.com/show_bug.cgi?id=2025938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4150
https://git.kernel.org/linus/9fbfabfda25d8774c5a08634fdd2da000a924890 (5.15-rc7)
https://lkml.org/lkml/2021/10/18/485
https://lkml.org/lkml/2021/9/6/781
https://nvd.nist.gov/vuln/detail/CVE-2021-4150
| -| linux-libc-dev | CVE-2021-4159 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159
| -| linux-libc-dev | CVE-2021-4197 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4197
https://bugzilla.redhat.com/show_bug.cgi?id=2035652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-4197.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-4197
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5368-1
https://www.debian.org/security/2022/dsa-5127
| -| linux-libc-dev | CVE-2021-4218 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4218
| -| linux-libc-dev | CVE-2021-44879 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-44879
https://bugzilla.kernel.org/show_bug.cgi?id=215231
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f
https://lkml.org/lkml/2022/1/24/4067
https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-44879
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5383-1
https://www.openwall.com/lists/oss-security/2022/02/12/1
| -| linux-libc-dev | CVE-2022-0382 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0382
https://github.com/torvalds/linux/commit/d6d86830705f173fca6087a3e67ceaf68db80523
https://nvd.nist.gov/vuln/detail/CVE-2022-0382
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5368-1
| -| linux-libc-dev | CVE-2022-0400 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0400
https://bugzilla.redhat.com/show_bug.cgi?id=2040604
https://bugzilla.redhat.com/show_bug.cgi?id=2040604 (not public)
https://bugzilla.redhat.com/show_bug.cgi?id=2044575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0400
| -| linux-libc-dev | CVE-2022-0480 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0480
https://bugzilla.redhat.com/show_bug.cgi?id=2049700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480
https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)
https://github.com/kata-containers/kata-containers/issues/3373
https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
| -| linux-libc-dev | CVE-2022-0494 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0494
https://bugzilla.redhat.com/show_bug.cgi?id=2039448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
https://git.kernel.org/linus/cc8f7fe1f5eab010191aa4570f27641876fa1267 (5.17-rc5)
https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-0494
https://ubuntu.com/security/notices/USN-5381-1
| -| linux-libc-dev | CVE-2022-0998 | MEDIUM | 5.4.0-110.124 | |
Expand...http://www.openwall.com/lists/oss-security/2022/04/02/1
https://access.redhat.com/security/cve/CVE-2022-0998
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-0998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0998
https://git.kernel.org/linus/870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0 (5.17-rc1)
https://lore.kernel.org/netdev/20220123001216.2460383-13-sashal@kernel.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-0998
https://security.netapp.com/advisory/ntap-20220513-0003/
| -| linux-libc-dev | CVE-2022-1011 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1011
https://bugzilla.redhat.com/show_bug.cgi?id=2064855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/0c4bcfdecb1ac0967619ee7ff44871d93c08c909 (5.17-rc8)
https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next
https://linux.oracle.com/cve/CVE-2022-1011.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-1011
https://ubuntu.com/security/notices/USN-5381-1
| -| linux-libc-dev | CVE-2022-1048 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1048
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3
https://nvd.nist.gov/vuln/detail/CVE-2022-1048
https://ubuntu.com/security/notices/USN-5381-1
https://www.debian.org/security/2022/dsa-5127
https://www.openwall.com/lists/oss-security/2022/03/28/4
| -| linux-libc-dev | CVE-2022-1195 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1195
https://bugzilla.redhat.com/show_bug.cgi?id=2056381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b9111922b1f399aba6ed1e1b8f2079c3da1aed8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e0588c291d6ce225f2b891753ca41d45ba42469
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b2f37aead1b82a770c48b5d583f35ec22aabb61e
https://nvd.nist.gov/vuln/detail/CVE-2022-1195
https://www.debian.org/security/2022/dsa-5127
| -| linux-libc-dev | CVE-2022-1198 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
https://github.com/torvalds/linux/commit/efe4186e6a1b54bf38b9e05450d43b0da1fd7739
https://marc.info/?i=c012878.3292f.17fe9417790.Coremail.duoming@zju.edu.cn
| -| linux-libc-dev | CVE-2022-1199 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809
https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac
https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10
https://marc.info/?l=oss-security&m=164888973827435
| -| linux-libc-dev | CVE-2022-1204 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
https://github.com/torvalds/linux/commit/5352a761308397a0e6250fdc629bb3f615b94747
https://github.com/torvalds/linux/commit/87563a043cef044fed5db7967a75741cc16ad2b1
https://github.com/torvalds/linux/commit/9fd75b66b8f68498454d685dc4ba13192ae069b0
https://github.com/torvalds/linux/commit/d01ffb9eee4af165d83b08dd73ebdf9fe94a519b
https://github.com/torvalds/linux/commit/feef318c855a361a1eccd880f33e88c460eb63b4
https://marc.info/?i=20c5f3a.325bc.17fe90c96f4.Coremail.duoming@zju.edu.cn
| -| linux-libc-dev | CVE-2022-1205 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
https://github.com/torvalds/linux/commit/82e31755e55fbcea6a9dfaae5fe4860ade17cbc0
https://github.com/torvalds/linux/commit/fc6d01ff9ef03b66d4a3a23b46fc3c3d8cf92009
https://marc.info/?i=56c38247.32aa9.17fe95728b3.Coremail.duoming@zju.edu.cn
| -| linux-libc-dev | CVE-2022-1508 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1508
https://git.kernel.org/linus/89c2b3b74918200e46699338d7bcc19b1ea12110 (5.15-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110
| -| linux-libc-dev | CVE-2022-28388 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-28388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
https://git.kernel.org/linus/3d3925ff6433f98992685a9679613a2cc97f3ce2 (5.18-rc1)
https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28388
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5416-1
https://www.debian.org/security/2022/dsa-5127
| -| linux-libc-dev | CVE-2022-28893 | MEDIUM | 5.4.0-110.124 | |
Expand...http://www.openwall.com/lists/oss-security/2022/04/11/3
http://www.openwall.com/lists/oss-security/2022/04/11/4
http://www.openwall.com/lists/oss-security/2022/04/11/5
https://access.redhat.com/security/cve/CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a
https://github.com/torvalds/linux/commit/f00432063db1a0db484e85193eccc6845435b80e
https://nvd.nist.gov/vuln/detail/CVE-2022-28893
https://www.openwall.com/lists/oss-security/2022/04/11/3
https://www.openwall.com/lists/oss-security/2022/04/11/5
| -| linux-libc-dev | CVE-2017-0537 | LOW | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/96831
http://www.securitytracker.com/id/1037968
https://android.googlesource.com/kernel/tegra.git/+/389b185cb2f17fff994dbdf8d4bac003d4b2b6b3%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0537
https://lore.kernel.org/lkml/1484647168-30135-1-git-send-email-jilin@nvidia.com/#t
https://source.android.com/security/bulletin/2017-01-01.html
https://source.android.com/security/bulletin/2017-03-01
https://source.android.com/security/bulletin/2017-03-01.html
| -| linux-libc-dev | CVE-2017-13165 | LOW | 5.4.0-110.124 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13165
https://github.com/aosp-mirror/platform_system_core/commit/15ffc53f6d57a46e3041453865311035a18e047a
https://source.android.com/security/bulletin/pixel/2017-12-01
| -| linux-libc-dev | CVE-2017-13693 | LOW | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/100502
https://access.redhat.com/security/cve/CVE-2017-13693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| -| linux-libc-dev | CVE-2018-1121 | LOW | 5.4.0-110.124 | |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1121
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| -| linux-libc-dev | CVE-2018-12928 | LOW | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/104593
https://access.redhat.com/security/cve/CVE-2018-12928
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
| -| linux-libc-dev | CVE-2018-12929 | LOW | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12929
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12929
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| -| linux-libc-dev | CVE-2018-12930 | LOW | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12930
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12930
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| -| linux-libc-dev | CVE-2018-12931 | LOW | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12931
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12931
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| -| linux-libc-dev | CVE-2019-14899 | LOW | 5.4.0-110.124 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Jul/23
http://seclists.org/fulldisclosure/2020/Jul/24
http://seclists.org/fulldisclosure/2020/Jul/25
http://seclists.org/fulldisclosure/2020/Nov/20
http://www.openwall.com/lists/oss-security/2020/08/13/2
http://www.openwall.com/lists/oss-security/2020/10/07/3
https://access.redhat.com/security/cve/CVE-2019-14899
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14899
https://openvpn.net/security-advisory/no-flaws-found-in-openvpn-software/
https://support.apple.com/kb/HT211288
https://support.apple.com/kb/HT211289
https://support.apple.com/kb/HT211290
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://www.openwall.com/lists/oss-security/2019/12/05/1
| -| linux-libc-dev | CVE-2019-15213 | LOW | 5.4.0-110.124 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://access.redhat.com/security/cve/CVE-2019-15213
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| -| linux-libc-dev | CVE-2019-16230 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-16230
https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
| -| linux-libc-dev | CVE-2019-19378 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
| -| linux-libc-dev | CVE-2019-19814 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
| -| linux-libc-dev | CVE-2020-11725 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-11725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725
https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
https://nvd.nist.gov/vuln/detail/CVE-2020-11725
https://twitter.com/yabbadabbadrew/status/1248632267028582400
| -| linux-libc-dev | CVE-2020-12363 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| -| linux-libc-dev | CVE-2020-12364 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| -| linux-libc-dev | CVE-2020-14304 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-14304
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
| -| linux-libc-dev | CVE-2020-35501 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35501
https://bugzilla.redhat.com/show_bug.cgi?id=1908577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://nvd.nist.gov/vuln/detail/CVE-2020-35501
https://www.openwall.com/lists/oss-security/2021/02/18/1
| -| linux-libc-dev | CVE-2021-26934 | LOW | 5.4.0-110.124 | |
Expand...http://xenbits.xen.org/xsa/advisory-363.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
https://nvd.nist.gov/vuln/detail/CVE-2021-26934
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/2
https://xenbits.xen.org/xsa/advisory-363.html
| -| linux-libc-dev | CVE-2021-32078 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-32078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://nvd.nist.gov/vuln/detail/CVE-2021-32078
https://security.netapp.com/advisory/ntap-20210813-0002/
| -| linux-libc-dev | CVE-2021-34981 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-34981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981
https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479
https://www.zerodayinitiative.com/advisories/ZDI-21-1223/
| -| linux-libc-dev | CVE-2021-3669 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3669.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
| -| linux-libc-dev | CVE-2021-3772 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3772
https://bugzilla.redhat.com/show_bug.cgi?id=2000694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://linux.oracle.com/cve/CVE-2021-3772.html
https://linux.oracle.com/errata/ELSA-2022-9260.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3772
https://ubuntu.com/security/CVE-2021-3772
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5265-1
https://www.debian.org/security/2022/dsa-5096
| -| linux-libc-dev | CVE-2022-0854 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
https://nvd.nist.gov/vuln/detail/CVE-2022-0854
https://ubuntu.com/security/notices/USN-5381-1
| +| linux-libc-dev | CVE-2022-1015 | HIGH | 5.4.0-113.127 | |
Expand...http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
https://access.redhat.com/security/cve/CVE-2022-1015
https://bugzilla.redhat.com/show_bug.cgi?id=2065323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015
https://nvd.nist.gov/vuln/detail/CVE-2022-1015
https://seclists.org/oss-sec/2022/q1/205
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5390-1
https://ubuntu.com/security/notices/USN-5390-2
https://www.openwall.com/lists/oss-security/2022/03/28/5
| +| linux-libc-dev | CVE-2013-7445 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-7445
https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| +| linux-libc-dev | CVE-2015-8553 | MEDIUM | 5.4.0-113.127 | |
Expand...http://thread.gmane.org/gmane.linux.kernel/1924087/focus=1930758 (regression mention)
http://xenbits.xen.org/xsa/advisory-120.html
https://access.redhat.com/security/cve/CVE-2015-8553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
https://seclists.org/bugtraq/2019/Aug/18
https://www.debian.org/security/2019/dsa-4497
| +| linux-libc-dev | CVE-2016-8660 | MEDIUM | 5.4.0-113.127 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://access.redhat.com/security/cve/CVE-2016-8660
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
| +| linux-libc-dev | CVE-2018-17977 | MEDIUM | 5.4.0-113.127 | |
Expand...http://www.securityfocus.com/bid/105539
https://access.redhat.com/security/cve/CVE-2018-17977
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
| +| linux-libc-dev | CVE-2020-12362 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362
https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-24504 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-24504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504
https://linux.oracle.com/cve/CVE-2020-24504.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
| +| linux-libc-dev | CVE-2020-27835 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27835
https://bugzilla.redhat.com/show_bug.cgi?id=1901709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835
https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79
https://linux.oracle.com/cve/CVE-2020-27835.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://ubuntu.com/security/notices/USN-4751-1
| +| linux-libc-dev | CVE-2020-36310 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-36310
https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
https://linux.oracle.com/cve/CVE-2020-36310.html
https://linux.oracle.com/errata/ELSA-2021-9307.html
https://www.debian.org/security/2022/dsa-5095
| +| linux-libc-dev | CVE-2021-20320 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20320
https://bugzilla.redhat.com/show_bug.cgi?id=2010090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320
https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-20320
| +| linux-libc-dev | CVE-2021-33061 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33061
https://security.netapp.com/advisory/ntap-20220210-0010/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00571.html
| +| linux-libc-dev | CVE-2021-3864 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864
https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com
https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/
https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com
https://www.openwall.com/lists/oss-security/2021/10/20/2
| +| linux-libc-dev | CVE-2021-39800 | MEDIUM | 5.4.0-113.127 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39800
https://source.android.com/security/bulletin/2022-04-01
| +| linux-libc-dev | CVE-2021-39801 | MEDIUM | 5.4.0-113.127 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39801
https://source.android.com/security/bulletin/2022-04-01
| +| linux-libc-dev | CVE-2021-39802 | MEDIUM | 5.4.0-113.127 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39802
https://source.android.com/security/bulletin/2022-04-01
| +| linux-libc-dev | CVE-2021-4001 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4001
https://bugzilla.redhat.com/show_bug.cgi?id=2025645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4001
https://git.kernel.org/linus/353050be4c19e102178ccc05988101887c25ae53
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53
https://nvd.nist.gov/vuln/detail/CVE-2021-4001
https://ubuntu.com/security/notices/USN-5207-1
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5278-1
| +| linux-libc-dev | CVE-2021-4148 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4148
https://bugzilla.redhat.com/show_bug.cgi?id=2026487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148
https://lkml.org/lkml/2021/9/12/323
https://lkml.org/lkml/2021/9/17/1037
https://lore.kernel.org/linux-mm/a07564a3-b2fc-9ffe-3ace-3f276075ea5c@google.com/
https://lore.kernel.org/lkml/CACkBjsYwLYLRmX8GpsDpMthagWOjWWrNxqY6ZLNQVr6yx+f5vA@mail.gmail.com/
https://lore.kernel.org/lkml/CAHbLzkrdGva2dzO36r62LKv_ip5trbMK0BO3vCeSBk2_7OE-zA@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-4148
| +| linux-libc-dev | CVE-2021-4150 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4150
https://bugzilla.redhat.com/show_bug.cgi?id=2025938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4150
https://git.kernel.org/linus/9fbfabfda25d8774c5a08634fdd2da000a924890 (5.15-rc7)
https://lkml.org/lkml/2021/10/18/485
https://lkml.org/lkml/2021/9/6/781
https://nvd.nist.gov/vuln/detail/CVE-2021-4150
| +| linux-libc-dev | CVE-2021-4159 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159
| +| linux-libc-dev | CVE-2021-4197 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4197
https://bugzilla.redhat.com/show_bug.cgi?id=2035652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-4197.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-4197
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5368-1
https://www.debian.org/security/2022/dsa-5127
| +| linux-libc-dev | CVE-2021-4218 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4218
| +| linux-libc-dev | CVE-2021-44879 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-44879
https://bugzilla.kernel.org/show_bug.cgi?id=215231
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f
https://lkml.org/lkml/2022/1/24/4067
https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-44879
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5383-1
https://www.openwall.com/lists/oss-security/2022/02/12/1
| +| linux-libc-dev | CVE-2022-0382 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0382
https://github.com/torvalds/linux/commit/d6d86830705f173fca6087a3e67ceaf68db80523
https://nvd.nist.gov/vuln/detail/CVE-2022-0382
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5368-1
| +| linux-libc-dev | CVE-2022-0400 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0400
https://bugzilla.redhat.com/show_bug.cgi?id=2040604
https://bugzilla.redhat.com/show_bug.cgi?id=2040604 (not public)
https://bugzilla.redhat.com/show_bug.cgi?id=2044575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0400
| +| linux-libc-dev | CVE-2022-0480 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0480
https://bugzilla.redhat.com/show_bug.cgi?id=2049700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480
https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)
https://github.com/kata-containers/kata-containers/issues/3373
https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
| +| linux-libc-dev | CVE-2022-0494 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0494
https://bugzilla.redhat.com/show_bug.cgi?id=2039448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
https://git.kernel.org/linus/cc8f7fe1f5eab010191aa4570f27641876fa1267 (5.17-rc5)
https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-0494
https://ubuntu.com/security/notices/USN-5381-1
| +| linux-libc-dev | CVE-2022-0998 | MEDIUM | 5.4.0-113.127 | |
Expand...http://www.openwall.com/lists/oss-security/2022/04/02/1
https://access.redhat.com/security/cve/CVE-2022-0998
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-0998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0998
https://git.kernel.org/linus/870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0 (5.17-rc1)
https://lore.kernel.org/netdev/20220123001216.2460383-13-sashal@kernel.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-0998
https://security.netapp.com/advisory/ntap-20220513-0003/
| +| linux-libc-dev | CVE-2022-1011 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1011
https://bugzilla.redhat.com/show_bug.cgi?id=2064855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/0c4bcfdecb1ac0967619ee7ff44871d93c08c909 (5.17-rc8)
https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next
https://linux.oracle.com/cve/CVE-2022-1011.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-1011
https://ubuntu.com/security/notices/USN-5381-1
| +| linux-libc-dev | CVE-2022-1048 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1048
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3
https://nvd.nist.gov/vuln/detail/CVE-2022-1048
https://ubuntu.com/security/notices/USN-5381-1
https://www.debian.org/security/2022/dsa-5127
https://www.openwall.com/lists/oss-security/2022/03/28/4
| +| linux-libc-dev | CVE-2022-1195 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1195
https://bugzilla.redhat.com/show_bug.cgi?id=2056381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b9111922b1f399aba6ed1e1b8f2079c3da1aed8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e0588c291d6ce225f2b891753ca41d45ba42469
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b2f37aead1b82a770c48b5d583f35ec22aabb61e
https://nvd.nist.gov/vuln/detail/CVE-2022-1195
https://www.debian.org/security/2022/dsa-5127
| +| linux-libc-dev | CVE-2022-1198 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
https://github.com/torvalds/linux/commit/efe4186e6a1b54bf38b9e05450d43b0da1fd7739
https://marc.info/?i=c012878.3292f.17fe9417790.Coremail.duoming@zju.edu.cn
| +| linux-libc-dev | CVE-2022-1199 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809
https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac
https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10
https://marc.info/?l=oss-security&m=164888973827435
| +| linux-libc-dev | CVE-2022-1204 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
https://github.com/torvalds/linux/commit/5352a761308397a0e6250fdc629bb3f615b94747
https://github.com/torvalds/linux/commit/87563a043cef044fed5db7967a75741cc16ad2b1
https://github.com/torvalds/linux/commit/9fd75b66b8f68498454d685dc4ba13192ae069b0
https://github.com/torvalds/linux/commit/d01ffb9eee4af165d83b08dd73ebdf9fe94a519b
https://github.com/torvalds/linux/commit/feef318c855a361a1eccd880f33e88c460eb63b4
https://marc.info/?i=20c5f3a.325bc.17fe90c96f4.Coremail.duoming@zju.edu.cn
| +| linux-libc-dev | CVE-2022-1205 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
https://github.com/torvalds/linux/commit/82e31755e55fbcea6a9dfaae5fe4860ade17cbc0
https://github.com/torvalds/linux/commit/fc6d01ff9ef03b66d4a3a23b46fc3c3d8cf92009
https://marc.info/?i=56c38247.32aa9.17fe95728b3.Coremail.duoming@zju.edu.cn
| +| linux-libc-dev | CVE-2022-1508 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1508
https://git.kernel.org/linus/89c2b3b74918200e46699338d7bcc19b1ea12110 (5.15-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110
| +| linux-libc-dev | CVE-2022-28388 | MEDIUM | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-28388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
https://git.kernel.org/linus/3d3925ff6433f98992685a9679613a2cc97f3ce2 (5.18-rc1)
https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28388
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5416-1
https://www.debian.org/security/2022/dsa-5127
| +| linux-libc-dev | CVE-2022-28893 | MEDIUM | 5.4.0-113.127 | |
Expand...http://www.openwall.com/lists/oss-security/2022/04/11/3
http://www.openwall.com/lists/oss-security/2022/04/11/4
http://www.openwall.com/lists/oss-security/2022/04/11/5
https://access.redhat.com/security/cve/CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a
https://github.com/torvalds/linux/commit/f00432063db1a0db484e85193eccc6845435b80e
https://nvd.nist.gov/vuln/detail/CVE-2022-28893
https://www.openwall.com/lists/oss-security/2022/04/11/3
https://www.openwall.com/lists/oss-security/2022/04/11/5
| +| linux-libc-dev | CVE-2017-0537 | LOW | 5.4.0-113.127 | |
Expand...http://www.securityfocus.com/bid/96831
http://www.securitytracker.com/id/1037968
https://android.googlesource.com/kernel/tegra.git/+/389b185cb2f17fff994dbdf8d4bac003d4b2b6b3%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0537
https://lore.kernel.org/lkml/1484647168-30135-1-git-send-email-jilin@nvidia.com/#t
https://source.android.com/security/bulletin/2017-01-01.html
https://source.android.com/security/bulletin/2017-03-01
https://source.android.com/security/bulletin/2017-03-01.html
| +| linux-libc-dev | CVE-2017-13165 | LOW | 5.4.0-113.127 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13165
https://github.com/aosp-mirror/platform_system_core/commit/15ffc53f6d57a46e3041453865311035a18e047a
https://source.android.com/security/bulletin/pixel/2017-12-01
| +| linux-libc-dev | CVE-2017-13693 | LOW | 5.4.0-113.127 | |
Expand...http://www.securityfocus.com/bid/100502
https://access.redhat.com/security/cve/CVE-2017-13693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| +| linux-libc-dev | CVE-2018-1121 | LOW | 5.4.0-113.127 | |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1121
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| +| linux-libc-dev | CVE-2018-12928 | LOW | 5.4.0-113.127 | |
Expand...http://www.securityfocus.com/bid/104593
https://access.redhat.com/security/cve/CVE-2018-12928
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
| +| linux-libc-dev | CVE-2018-12929 | LOW | 5.4.0-113.127 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12929
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12929
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| +| linux-libc-dev | CVE-2018-12930 | LOW | 5.4.0-113.127 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12930
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12930
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| +| linux-libc-dev | CVE-2018-12931 | LOW | 5.4.0-113.127 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12931
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12931
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| +| linux-libc-dev | CVE-2019-14899 | LOW | 5.4.0-113.127 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Jul/23
http://seclists.org/fulldisclosure/2020/Jul/24
http://seclists.org/fulldisclosure/2020/Jul/25
http://seclists.org/fulldisclosure/2020/Nov/20
http://www.openwall.com/lists/oss-security/2020/08/13/2
http://www.openwall.com/lists/oss-security/2020/10/07/3
https://access.redhat.com/security/cve/CVE-2019-14899
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14899
https://openvpn.net/security-advisory/no-flaws-found-in-openvpn-software/
https://support.apple.com/kb/HT211288
https://support.apple.com/kb/HT211289
https://support.apple.com/kb/HT211290
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://www.openwall.com/lists/oss-security/2019/12/05/1
| +| linux-libc-dev | CVE-2019-15213 | LOW | 5.4.0-113.127 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://access.redhat.com/security/cve/CVE-2019-15213
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| +| linux-libc-dev | CVE-2019-16230 | LOW | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-16230
https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| linux-libc-dev | CVE-2019-19378 | LOW | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2019-19814 | LOW | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2020-11725 | LOW | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-11725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725
https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
https://nvd.nist.gov/vuln/detail/CVE-2020-11725
https://twitter.com/yabbadabbadrew/status/1248632267028582400
| +| linux-libc-dev | CVE-2020-12363 | LOW | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-12364 | LOW | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-14304 | LOW | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-14304
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
| +| linux-libc-dev | CVE-2020-35501 | LOW | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35501
https://bugzilla.redhat.com/show_bug.cgi?id=1908577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://nvd.nist.gov/vuln/detail/CVE-2020-35501
https://www.openwall.com/lists/oss-security/2021/02/18/1
| +| linux-libc-dev | CVE-2021-26934 | LOW | 5.4.0-113.127 | |
Expand...http://xenbits.xen.org/xsa/advisory-363.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
https://nvd.nist.gov/vuln/detail/CVE-2021-26934
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/2
https://xenbits.xen.org/xsa/advisory-363.html
| +| linux-libc-dev | CVE-2021-32078 | LOW | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-32078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://nvd.nist.gov/vuln/detail/CVE-2021-32078
https://security.netapp.com/advisory/ntap-20210813-0002/
| +| linux-libc-dev | CVE-2021-34981 | LOW | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-34981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981
https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479
https://www.zerodayinitiative.com/advisories/ZDI-21-1223/
| +| linux-libc-dev | CVE-2021-3669 | LOW | 5.4.0-113.127 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3669.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
| +| linux-libc-dev | CVE-2021-3772 | LOW | 5.4.0-113.127 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3772
https://bugzilla.redhat.com/show_bug.cgi?id=2000694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://linux.oracle.com/cve/CVE-2021-3772.html
https://linux.oracle.com/errata/ELSA-2022-9260.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3772
https://ubuntu.com/security/CVE-2021-3772
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5265-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2022-0854 | LOW | 5.4.0-113.127 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
https://nvd.nist.gov/vuln/detail/CVE-2022-0854
https://ubuntu.com/security/notices/USN-5381-1
| | login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | logsave | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| | passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| diff --git a/stable/double-take/1.0.14/templates/common.yaml b/stable/double-take/1.0.15/templates/common.yaml similarity index 100% rename from stable/double-take/1.0.14/templates/common.yaml rename to stable/double-take/1.0.15/templates/common.yaml diff --git a/stable/double-take/1.0.14/values.yaml b/stable/double-take/1.0.15/values.yaml similarity index 100% rename from stable/double-take/1.0.14/values.yaml rename to stable/double-take/1.0.15/values.yaml diff --git a/stable/esphome/10.0.24/CHANGELOG.md b/stable/esphome/10.0.24/CHANGELOG.md new file mode 100644 index 00000000000..b524b48c67d --- /dev/null +++ b/stable/esphome/10.0.24/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [esphome-10.0.24](https://github.com/truecharts/apps/compare/esphome-10.0.23...esphome-10.0.24) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + + +### [esphome-10.0.23](https://github.com/truecharts/apps/compare/esphome-10.0.22...esphome-10.0.23) (2022-05-24) + +#### Chore + +* update helm general non-major helm releases + + + + +### [esphome-10.0.22](https://github.com/truecharts/apps/compare/esphome-10.0.20...esphome-10.0.22) (2022-05-18) + +#### Chore + +* Auto-update chart README [skip ci] +* update docker general non-major ([#2706](https://github.com/truecharts/apps/issues/2706)) +* update helm general non-major helm releases + + + + +### [esphome-10.0.21](https://github.com/truecharts/apps/compare/esphome-10.0.20...esphome-10.0.21) (2022-05-17) + +#### Chore + +* update helm general non-major helm releases + + + + +### [esphome-10.0.20](https://github.com/truecharts/apps/compare/esphome-10.0.19...esphome-10.0.20) (2022-05-17) + +#### Chore + +* update helm general non-major helm releases + + + + +### [esphome-10.0.19](https://github.com/truecharts/apps/compare/esphome-10.0.18...esphome-10.0.19) (2022-05-10) + +#### Chore + +* update helm general non-major helm releases ([#2649](https://github.com/truecharts/apps/issues/2649)) + + + + +### [esphome-10.0.18](https://github.com/truecharts/apps/compare/esphome-10.0.17...esphome-10.0.18) (2022-05-05) + +#### Chore + +* update helm general non-major helm releases ([#2612](https://github.com/truecharts/apps/issues/2612)) + + + + +### [esphome-10.0.17](https://github.com/truecharts/apps/compare/esphome-10.0.16...esphome-10.0.17) (2022-04-26) + +#### Chore + +* update helm general non-major helm releases ([#2573](https://github.com/truecharts/apps/issues/2573)) + + + + +### [esphome-10.0.16](https://github.com/truecharts/apps/compare/esphome-10.0.15...esphome-10.0.16) (2022-04-26) + +#### Chore + +* update docker general non-major ([#2571](https://github.com/truecharts/apps/issues/2571)) + + + + +### [esphome-10.0.15](https://github.com/truecharts/apps/compare/esphome-10.0.14...esphome-10.0.15) (2022-04-20) + +#### Chore + +* add missing quote on description ([#2515](https://github.com/truecharts/apps/issues/2515)) +* update helm general non-major helm releases ([#2524](https://github.com/truecharts/apps/issues/2524)) + + + + +### [esphome-10.0.14](https://github.com/truecharts/apps/compare/esphome-10.0.13...esphome-10.0.14) (2022-04-12) + diff --git a/stable/hyperion-ng/5.0.19/CONFIG.md b/stable/esphome/10.0.24/CONFIG.md similarity index 100% rename from stable/hyperion-ng/5.0.19/CONFIG.md rename to stable/esphome/10.0.24/CONFIG.md diff --git a/stable/esphome/10.0.24/Chart.lock b/stable/esphome/10.0.24/Chart.lock new file mode 100644 index 00000000000..81501ecf935 --- /dev/null +++ b/stable/esphome/10.0.24/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.17 +digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc +generated: "2022-05-25T06:56:49.568734425Z" diff --git a/stable/esphome/10.0.24/Chart.yaml b/stable/esphome/10.0.24/Chart.yaml new file mode 100644 index 00000000000..c8b68c5889d --- /dev/null +++ b/stable/esphome/10.0.24/Chart.yaml @@ -0,0 +1,29 @@ +apiVersion: v2 +appVersion: "2022.5.1" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.17 +deprecated: false +description: ESPHome is a system to control your ESP8266/ESP32 by simple yet powerful + configuration files and control them remotely through Home Automation systems. +home: https://github.com/truecharts/apps/tree/master/charts/stable/esphome +icon: https://truecharts.org/_static/img/appicons/esphome.png +keywords: +- esphome +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: esphome +sources: +- https://github.com/esphome/esphome +- https://hub.docker.com/u/esphome +type: application +version: 10.0.24 +annotations: + truecharts.org/catagories: | + - tools + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/esphome/10.0.24/README.md b/stable/esphome/10.0.24/README.md new file mode 100644 index 00000000000..f8ad963f846 --- /dev/null +++ b/stable/esphome/10.0.24/README.md @@ -0,0 +1,38 @@ +# Introduction + +ESPHome is a system to control your ESP8266/ESP32 by simple yet powerful configuration files and control them remotely through Home Automation systems. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 9.3.17 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/esphome/10.0.24/app-readme.md b/stable/esphome/10.0.24/app-readme.md new file mode 100644 index 00000000000..7af883926b8 --- /dev/null +++ b/stable/esphome/10.0.24/app-readme.md @@ -0,0 +1,3 @@ +ESPHome is a system to control your ESP8266/ESP32 by simple yet powerful configuration files and control them remotely through Home Automation systems. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/hyperion-ng/5.0.19/charts/common-9.3.17.tgz b/stable/esphome/10.0.24/charts/common-9.3.17.tgz similarity index 100% rename from stable/hyperion-ng/5.0.19/charts/common-9.3.17.tgz rename to stable/esphome/10.0.24/charts/common-9.3.17.tgz diff --git a/stable/esphome/10.0.24/helm-values.md b/stable/esphome/10.0.24/helm-values.md new file mode 100644 index 00000000000..95588b4ba1a --- /dev/null +++ b/stable/esphome/10.0.24/helm-values.md @@ -0,0 +1,31 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env | object | `{}` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/esphome"` | | +| image.tag | string | `"v2022.3.2@sha256:fb52d7eb5db02ea36bff326774690277c67343ca3ecb5ec918b52b28af773593"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/config"` | | +| persistence.platformio.enabled | bool | `true` | | +| persistence.platformio.mountPath | string | `"/.platformio"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| securityContext.allowPrivilegeEscalation | bool | `true` | | +| securityContext.privileged | bool | `true` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `6052` | | +| service.main.ports.main.targetPort | int | `6052` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/esphome/10.0.24/ix_values.yaml b/stable/esphome/10.0.24/ix_values.yaml new file mode 100644 index 00000000000..07f4886e0fe --- /dev/null +++ b/stable/esphome/10.0.24/ix_values.yaml @@ -0,0 +1,39 @@ +image: + repository: tccr.io/truecharts/esphome + pullPolicy: IfNotPresent + tag: v2022.5.1@sha256:cf3df2c898a518f29b6dcba58d94b78916c61e86ba97c861c3bd33e013cf917d + +# App needs to run as root because of this: https://github.com/esphome/issues/issues/2752 +securityContext: + runAsNonRoot: false + readOnlyRootFilesystem: false + privileged: true + allowPrivilegeEscalation: true + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +service: + main: + ports: + main: + port: 6052 + targetPort: 6052 + +env: {} + # ESPHOME_DASHBOARD_USE_PING: true + # ESPHOME_DASHBOARD_RELATIVE_URL: "/" + # ESPHOME_QUICKWIZARD: + # ESPHOME_IS_HASSIO: + # DISABLE_HA_AUTHENTICATION: + # USERNAME: + # PASSWORD: + +persistence: + config: + enabled: true + mountPath: "/config" + platformio: + enabled: true + mountPath: "/.platformio" diff --git a/stable/esphome/10.0.24/questions.yaml b/stable/esphome/10.0.24/questions.yaml new file mode 100644 index 00000000000..e3768dc95e7 --- /dev/null +++ b/stable/esphome/10.0.24/questions.yaml @@ -0,0 +1,2570 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 6052 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 6052 + + + # Configure app volumes + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: platformio + label: "Platformio Storage" + description: "Stores the Application Configuration." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: true + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: true + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: "The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/esphome/10.0.24/security.md b/stable/esphome/10.0.24/security.md new file mode 100644 index 00000000000..95e5bcdf4e3 --- /dev/null +++ b/stable/esphome/10.0.24/security.md @@ -0,0 +1,322 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: esphome/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'RELEASE-NAME-esphome' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-esphome' of Deployment 'RELEASE-NAME-esphome' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-esphome' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-esphome' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-esphome' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-esphome' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-esphome' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-esphome' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'RELEASE-NAME-esphome' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-esphome' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-esphome' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-esphome' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-esphome' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-esphome' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-esphome' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/esphome:v2022.5.1@sha256:cf3df2c898a518f29b6dcba58d94b78916c61e86ba97c861c3bd33e013cf917d + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/esphome:v2022.5.1@sha256:cf3df2c898a518f29b6dcba58d94b78916c61e86ba97c861c3bd33e013cf917d (debian 11.3) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bsdutils | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.32-4 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| coreutils | CVE-2017-18018 | LOW | 8.32-4 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
| +| curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-22576 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27781 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27782 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-27775 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| e2fsprogs | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| git | CVE-2022-24765 | HIGH | 1:2.30.2-1 | |
Expand...http://seclists.org/fulldisclosure/2022/May/31
http://www.openwall.com/lists/oss-security/2022/04/12/7
https://access.redhat.com/security/cve/CVE-2022-24765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash
https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode
https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/
https://support.apple.com/kb/HT213261
https://ubuntu.com/security/notices/USN-5376-1
https://ubuntu.com/security/notices/USN-5376-2
https://ubuntu.com/security/notices/USN-5376-3
| +| git | CVE-2018-1000021 | LOW | 1:2.30.2-1 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://access.redhat.com/security/cve/CVE-2018-1000021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| +| git | CVE-2022-24975 | LOW | 1:2.30.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-24975
https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191
https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/
| +| git-man | CVE-2022-24765 | HIGH | 1:2.30.2-1 | |
Expand...http://seclists.org/fulldisclosure/2022/May/31
http://www.openwall.com/lists/oss-security/2022/04/12/7
https://access.redhat.com/security/cve/CVE-2022-24765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash
https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode
https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/
https://support.apple.com/kb/HT213261
https://ubuntu.com/security/notices/USN-5376-1
https://ubuntu.com/security/notices/USN-5376-2
https://ubuntu.com/security/notices/USN-5376-3
| +| git-man | CVE-2018-1000021 | LOW | 1:2.30.2-1 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://access.redhat.com/security/cve/CVE-2018-1000021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| +| git-man | CVE-2022-24975 | LOW | 1:2.30.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-24975
https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191
https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/
| +| gzip | CVE-2022-1271 | HIGH | 1.10-4 | 1.10-4+deb11u1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-2191.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
| +| libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libc-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc6 | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc6 | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libcom-err2 | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libcurl3-gnutls | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2022-22576 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl3-gnutls | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl3-gnutls | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl3-gnutls | CVE-2022-27781 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl3-gnutls | CVE-2022-27782 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl3-gnutls | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl3-gnutls | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2022-27775 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-22576 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27781 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27782 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-27775 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| +| libexpat1 | CVE-2013-0340 | LOW | 2.2.10-2+deb11u3 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://access.redhat.com/security/cve/CVE-2013-0340
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-0340
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| +| libext2fs2 | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libfreetype6 | CVE-2022-27404 | CRITICAL | 2.10.4+dfsg-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27404
| +| libfreetype6 | CVE-2022-27405 | HIGH | 2.10.4+dfsg-1 | |
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27405
| +| libfreetype6 | CVE-2022-27406 | HIGH | 2.10.4+dfsg-1 | |
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27406
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.7.1-5 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.7.1-5 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://access.redhat.com/security/cve/CVE-2017-9937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.57+dfsg-3 | 2.4.57+dfsg-3+deb11u1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| liblzma5 | CVE-2022-1271 | HIGH | 5.2.5-2 | 5.2.5-2.1~deb11u1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-2191.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
| +| libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libpcre2-8-0 | CVE-2022-1586 | HIGH | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
| +| libpcre2-8-0 | CVE-2022-1587 | HIGH | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-13 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libperl5.32 | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| libperl5.32 | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| libpng16-16 | CVE-2019-6129 | LOW | 1.6.37-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-6129
https://github.com/glennrp/libpng/issues/269
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
| +| libpng16-16 | CVE-2021-4214 | LOW | 1.6.37-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4214
| +| libpython3.9-minimal | CVE-2015-20107 | CRITICAL | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| libpython3.9-minimal | CVE-2021-29921 | CRITICAL | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-29921
https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.9-minimal | CVE-2021-3737 | HIGH | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737
https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3737
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://security.netapp.com/advisory/ntap-20220407-0009/
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| libpython3.9-minimal | CVE-2022-0391 | HIGH | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391
https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://linux.oracle.com/cve/CVE-2022-0391.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://nvd.nist.gov/vuln/detail/CVE-2022-0391
https://security.netapp.com/advisory/ntap-20220225-0009/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libpython3.9-minimal | CVE-2021-3426 | MEDIUM | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3426
https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.9-minimal | CVE-2021-3733 | MEDIUM | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3733
https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://security.netapp.com/advisory/ntap-20220407-0001/
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
| +| libpython3.9-minimal | CVE-2021-4189 | MEDIUM | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
| +| libpython3.9-minimal | CVE-2020-27619 | LOW | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27619
https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://nvd.nist.gov/vuln/detail/CVE-2020-27619
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
| +| libpython3.9-stdlib | CVE-2015-20107 | CRITICAL | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| libpython3.9-stdlib | CVE-2021-29921 | CRITICAL | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-29921
https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.9-stdlib | CVE-2021-3737 | HIGH | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737
https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3737
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://security.netapp.com/advisory/ntap-20220407-0009/
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| libpython3.9-stdlib | CVE-2022-0391 | HIGH | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391
https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://linux.oracle.com/cve/CVE-2022-0391.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://nvd.nist.gov/vuln/detail/CVE-2022-0391
https://security.netapp.com/advisory/ntap-20220225-0009/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libpython3.9-stdlib | CVE-2021-3426 | MEDIUM | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3426
https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.9-stdlib | CVE-2021-3733 | MEDIUM | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3733
https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://security.netapp.com/advisory/ntap-20220407-0001/
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
| +| libpython3.9-stdlib | CVE-2021-4189 | MEDIUM | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
| +| libpython3.9-stdlib | CVE-2020-27619 | LOW | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27619
https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://nvd.nist.gov/vuln/detail/CVE-2020-27619
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
| +| libsepol1 | CVE-2021-36084 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.34.1-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.34.1-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libss2 | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libssl1.1 | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://ubuntu.com/security/notices/USN-5402-1
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libtiff5 | CVE-2022-1210 | MEDIUM | 4.2.0-1+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1210
https://gitlab.com/libtiff/libtiff/-/issues/402
https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff
https://nvd.nist.gov/vuln/detail/CVE-2022-1210
https://security.netapp.com/advisory/ntap-20220513-0005/
https://vuldb.com/?id.196363
| +| libtiff5 | CVE-2022-1354 | MEDIUM | 4.2.0-1+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354
https://gitlab.com/libtiff/libtiff/-/issues/319
| +| libtiff5 | CVE-2022-1355 | MEDIUM | 4.2.0-1+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1355
| +| libtiff5 | CVE-2022-1622 | MEDIUM | 4.2.0-1+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1622
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1622.json
https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
https://gitlab.com/libtiff/libtiff/-/issues/410
https://nvd.nist.gov/vuln/detail/CVE-2022-1622
| +| libtiff5 | CVE-2022-1623 | MEDIUM | 4.2.0-1+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1623
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json
https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
https://gitlab.com/libtiff/libtiff/-/issues/410
https://nvd.nist.gov/vuln/detail/CVE-2022-1623
| +| libtiff5 | CVE-2014-8130 | LOW | 4.2.0-1+deb11u1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://openwall.com/lists/oss-security/2015/01/24/15
http://rhn.redhat.com/errata/RHSA-2016-1546.html
http://rhn.redhat.com/errata/RHSA-2016-1547.html
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
http://www.securityfocus.com/bid/72353
http://www.securitytracker.com/id/1032760
https://access.redhat.com/security/cve/CVE-2014-8130
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
https://linux.oracle.com/cve/CVE-2014-8130.html
https://linux.oracle.com/errata/ELSA-2016-1547.html
https://security.gentoo.org/glsa/201701-16
https://ubuntu.com/security/notices/USN-2553-1
| +| libtiff5 | CVE-2017-16232 | LOW | 4.2.0-1+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
https://access.redhat.com/security/cve/CVE-2017-16232
| +| libtiff5 | CVE-2017-17973 | LOW | 4.2.0-1+deb11u1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769
http://www.securityfocus.com/bid/102331
https://access.redhat.com/security/cve/CVE-2017-17973
https://bugzilla.novell.com/show_bug.cgi?id=1074318
https://bugzilla.redhat.com/show_bug.cgi?id=1530912
| +| libtiff5 | CVE-2017-5563 | LOW | 4.2.0-1+deb11u1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664
http://www.securityfocus.com/bid/95705
https://access.redhat.com/security/cve/CVE-2017-5563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
https://security.gentoo.org/glsa/201709-27
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5 | CVE-2017-9117 | LOW | 4.2.0-1+deb11u1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690
http://www.securityfocus.com/bid/98581
https://access.redhat.com/security/cve/CVE-2017-9117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5 | CVE-2018-10126 | LOW | 4.2.0-1+deb11u1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://access.redhat.com/security/cve/CVE-2018-10126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtiff5 | CVE-2022-1056 | LOW | 4.2.0-1+deb11u1 | |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json
https://gitlab.com/libtiff/libtiff/-/issues/391
https://gitlab.com/libtiff/libtiff/-/merge_requests/307
https://nvd.nist.gov/vuln/detail/CVE-2022-1056
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libwebp6 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://access.redhat.com/security/cve/CVE-2016-9085
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libwebpdemux2 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://access.redhat.com/security/cve/CVE-2016-9085
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libwebpmux3 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://access.redhat.com/security/cve/CVE-2016-9085
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| login | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| logsave | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-bin | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| openssh-client | CVE-2021-41617 | HIGH | 1:8.4p1-5 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json
https://access.redhat.com/security/cve/CVE-2021-41617
https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://errata.almalinux.org/8/ALSA-2022-2013.html
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2022-2013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://nvd.nist.gov/vuln/detail/CVE-2021-41617
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| openssh-client | CVE-2007-2243 | LOW | 1:8.4p1-5 | |
Expand...http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053906.html
http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053951.html
http://securityreason.com/securityalert/2631
http://www.osvdb.org/34600
http://www.securityfocus.com/bid/23601
https://exchange.xforce.ibmcloud.com/vulnerabilities/33794
https://security.netapp.com/advisory/ntap-20191107-0003/
| +| openssh-client | CVE-2007-2768 | LOW | 1:8.4p1-5 | |
Expand...http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html
http://www.osvdb.org/34601
https://nvd.nist.gov/vuln/detail/CVE-2007-2768
https://security.netapp.com/advisory/ntap-20191107-0002/
| +| openssh-client | CVE-2008-3234 | LOW | 1:8.4p1-5 | |
Expand...http://www.securityfocus.com/bid/30276
https://exchange.xforce.ibmcloud.com/vulnerabilities/44037
https://www.exploit-db.com/exploits/6094
| +| openssh-client | CVE-2016-20012 | LOW | 1:8.4p1-5 | |
Expand...https://access.redhat.com/security/cve/CVE-2016-20012
https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265
https://github.com/openssh/openssh-portable/pull/270
https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097
https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185
https://nvd.nist.gov/vuln/detail/CVE-2016-20012
https://rushter.com/blog/public-ssh-keys/
https://security.netapp.com/advisory/ntap-20211014-0005/
https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak
https://www.openwall.com/lists/oss-security/2018/08/24/1
| +| openssh-client | CVE-2018-15919 | LOW | 1:8.4p1-5 | |
Expand...http://seclists.org/oss-sec/2018/q3/180
http://www.securityfocus.com/bid/105163
https://access.redhat.com/security/cve/CVE-2018-15919
https://security.netapp.com/advisory/ntap-20181221-0001/
| +| openssh-client | CVE-2019-6110 | LOW | 1:8.4p1-5 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-6110
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://www.exploit-db.com/exploits/46193/
| +| openssh-client | CVE-2020-14145 | LOW | 1:8.4p1-5 | |
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://access.redhat.com/security/cve/CVE-2020-14145
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14145
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
| +| openssh-client | CVE-2020-15778 | LOW | 1:8.4p1-5 | |
Expand...https://access.redhat.com/articles/5284081
https://access.redhat.com/security/cve/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778/
https://news.ycombinator.com/item?id=25005567
https://nvd.nist.gov/vuln/detail/CVE-2020-15778
https://security.netapp.com/advisory/ntap-20200731-0007/
https://www.openssh.com/security.html
| +| openssh-client | CVE-2021-36368 | LOW | 1:8.4p1-5 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36368
https://bugzilla.mindrot.org/show_bug.cgi?id=3316
https://docs.ssh-mitm.at/trivialauth.html
https://github.com/openssh/openssh-portable/pull/258
https://nvd.nist.gov/vuln/detail/CVE-2021-36368
https://security-tracker.debian.org/tracker/CVE-2021-36368
https://www.openssh.com/security.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| perl-base | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| perl-modules-5.32 | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-modules-5.32 | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| python-pip-whl | CVE-2018-20225 | LOW | 20.3.4-4+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-20225
https://bugzilla.redhat.com/show_bug.cgi?id=1835736
https://cowlicks.website/posts/arbitrary-code-execution-from-pips-extra-index-url.html
https://lists.apache.org/thread.html/rb1adce798445facd032870d644eb39c4baaf9c4a7dd5477d12bb6ab2@%3Cgithub.arrow.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-20225
https://pip.pypa.io/en/stable/news/
| +| python3-pil | CVE-2022-24303 | CRITICAL | 8.1.2+dfsg-0.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-24303
https://github.com/advisories/GHSA-9j59-75qj-795w
https://github.com/python-pillow/Pillow/commit/427221ef5f19157001bf8b1ad7cfe0b905ca8c26
https://github.com/python-pillow/Pillow/pull/3450
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W4ZUXPKEX72O3E5IHBPVY5ZCPMJ4GHHV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XR6UP2XONXOVXI4446VY72R63YRO2YTP/
https://nvd.nist.gov/vuln/detail/CVE-2022-24303
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security
| +| python3-pil | CVE-2021-23437 | HIGH | 8.1.2+dfsg-0.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-23437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23437
https://github.com/advisories/GHSA-98vv-pw6r-q6q4
https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/
https://nvd.nist.gov/vuln/detail/CVE-2021-23437
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html
https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443
https://ubuntu.com/security/notices/USN-5227-1
https://ubuntu.com/security/notices/USN-5227-2
| +| python3-pip | CVE-2018-20225 | LOW | 20.3.4-4+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-20225
https://bugzilla.redhat.com/show_bug.cgi?id=1835736
https://cowlicks.website/posts/arbitrary-code-execution-from-pips-extra-index-url.html
https://lists.apache.org/thread.html/rb1adce798445facd032870d644eb39c4baaf9c4a7dd5477d12bb6ab2@%3Cgithub.arrow.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-20225
https://pip.pypa.io/en/stable/news/
| +| python3.9 | CVE-2015-20107 | CRITICAL | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| python3.9 | CVE-2021-29921 | CRITICAL | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-29921
https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.9 | CVE-2021-3737 | HIGH | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737
https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3737
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://security.netapp.com/advisory/ntap-20220407-0009/
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| python3.9 | CVE-2022-0391 | HIGH | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391
https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://linux.oracle.com/cve/CVE-2022-0391.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://nvd.nist.gov/vuln/detail/CVE-2022-0391
https://security.netapp.com/advisory/ntap-20220225-0009/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| python3.9 | CVE-2021-3426 | MEDIUM | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3426
https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.9 | CVE-2021-3733 | MEDIUM | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3733
https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://security.netapp.com/advisory/ntap-20220407-0001/
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
| +| python3.9 | CVE-2021-4189 | MEDIUM | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
| +| python3.9 | CVE-2020-27619 | LOW | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27619
https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://nvd.nist.gov/vuln/detail/CVE-2020-27619
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
| +| python3.9-minimal | CVE-2015-20107 | CRITICAL | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| python3.9-minimal | CVE-2021-29921 | CRITICAL | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-29921
https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.9-minimal | CVE-2021-3737 | HIGH | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3737
https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3737
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://security.netapp.com/advisory/ntap-20220407-0009/
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| python3.9-minimal | CVE-2022-0391 | HIGH | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0391
https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://linux.oracle.com/cve/CVE-2022-0391.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://nvd.nist.gov/vuln/detail/CVE-2022-0391
https://security.netapp.com/advisory/ntap-20220225-0009/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| python3.9-minimal | CVE-2021-3426 | MEDIUM | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3426
https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.9-minimal | CVE-2021-3733 | MEDIUM | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3733
https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://security.netapp.com/advisory/ntap-20220407-0001/
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
| +| python3.9-minimal | CVE-2021-4189 | MEDIUM | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
| +| python3.9-minimal | CVE-2020-27619 | LOW | 3.9.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27619
https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://nvd.nist.gov/vuln/detail/CVE-2020-27619
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
| +| tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| util-linux | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| zlib1g | CVE-2018-25032 | HIGH | 1:1.2.11.dfsg-2 | 1:1.2.11.dfsg-2+deb11u1 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + +**python-pkg** + + +| No Vulnerabilities found | +|:---------------------------------| diff --git a/stable/hyperion-ng/5.0.19/templates/common.yaml b/stable/esphome/10.0.24/templates/common.yaml similarity index 100% rename from stable/hyperion-ng/5.0.19/templates/common.yaml rename to stable/esphome/10.0.24/templates/common.yaml diff --git a/stable/hyperion-ng/5.0.19/values.yaml b/stable/esphome/10.0.24/values.yaml similarity index 100% rename from stable/hyperion-ng/5.0.19/values.yaml rename to stable/esphome/10.0.24/values.yaml diff --git a/stable/hyperion-ng/5.0.19/Chart.lock b/stable/hyperion-ng/5.0.19/Chart.lock deleted file mode 100644 index 87da069ea6d..00000000000 --- a/stable/hyperion-ng/5.0.19/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 9.3.17 -digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc -generated: "2022-05-24T18:24:10.216100815Z" diff --git a/stable/hyperion-ng/5.0.19/CHANGELOG.md b/stable/hyperion-ng/5.0.20/CHANGELOG.md similarity index 90% rename from stable/hyperion-ng/5.0.19/CHANGELOG.md rename to stable/hyperion-ng/5.0.20/CHANGELOG.md index 3821bc3a3c7..0dc7280fbbd 100644 --- a/stable/hyperion-ng/5.0.19/CHANGELOG.md +++ b/stable/hyperion-ng/5.0.20/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [hyperion-ng-5.0.20](https://github.com/truecharts/apps/compare/hyperion-ng-5.0.19...hyperion-ng-5.0.20) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [hyperion-ng-5.0.19](https://github.com/truecharts/apps/compare/hyperion-ng-5.0.18...hyperion-ng-5.0.19) (2022-05-24) @@ -88,12 +97,3 @@ ### [hyperion-ng-5.0.11](https://github.com/truecharts/apps/compare/hyperion-ng-5.0.10...hyperion-ng-5.0.11) (2022-04-12) #### Chore - -* update helm general non-major helm releases ([#2480](https://github.com/truecharts/apps/issues/2480)) - - - - -### [hyperion-ng-5.0.10](https://github.com/truecharts/apps/compare/hyperion-ng-5.0.9...hyperion-ng-5.0.10) (2022-04-09) - -#### Chore diff --git a/stable/logitech-media-server/3.0.31/CONFIG.md b/stable/hyperion-ng/5.0.20/CONFIG.md similarity index 100% rename from stable/logitech-media-server/3.0.31/CONFIG.md rename to stable/hyperion-ng/5.0.20/CONFIG.md diff --git a/stable/hyperion-ng/5.0.20/Chart.lock b/stable/hyperion-ng/5.0.20/Chart.lock new file mode 100644 index 00000000000..0b98abe0f4e --- /dev/null +++ b/stable/hyperion-ng/5.0.20/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.17 +digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc +generated: "2022-05-25T06:57:03.218381173Z" diff --git a/stable/hyperion-ng/5.0.19/Chart.yaml b/stable/hyperion-ng/5.0.20/Chart.yaml similarity index 97% rename from stable/hyperion-ng/5.0.19/Chart.yaml rename to stable/hyperion-ng/5.0.20/Chart.yaml index 7f6fd2d71ee..01fc1d589e9 100644 --- a/stable/hyperion-ng/5.0.19/Chart.yaml +++ b/stable/hyperion-ng/5.0.20/Chart.yaml @@ -19,7 +19,7 @@ name: hyperion-ng sources: - https://github.com/hyperion-project/hyperion.ng - https://hub.docker.com/r/sirfragalot/hyperion.ng -version: 5.0.19 +version: 5.0.20 annotations: truecharts.org/catagories: | - media diff --git a/stable/hyperion-ng/5.0.19/README.md b/stable/hyperion-ng/5.0.20/README.md similarity index 100% rename from stable/hyperion-ng/5.0.19/README.md rename to stable/hyperion-ng/5.0.20/README.md diff --git a/stable/hyperion-ng/5.0.19/app-readme.md b/stable/hyperion-ng/5.0.20/app-readme.md similarity index 100% rename from stable/hyperion-ng/5.0.19/app-readme.md rename to stable/hyperion-ng/5.0.20/app-readme.md diff --git a/stable/logitech-media-server/3.0.31/charts/common-9.3.17.tgz b/stable/hyperion-ng/5.0.20/charts/common-9.3.17.tgz similarity index 100% rename from stable/logitech-media-server/3.0.31/charts/common-9.3.17.tgz rename to stable/hyperion-ng/5.0.20/charts/common-9.3.17.tgz diff --git a/stable/hyperion-ng/5.0.19/helm-values.md b/stable/hyperion-ng/5.0.20/helm-values.md similarity index 100% rename from stable/hyperion-ng/5.0.19/helm-values.md rename to stable/hyperion-ng/5.0.20/helm-values.md diff --git a/stable/hyperion-ng/5.0.19/ix_values.yaml b/stable/hyperion-ng/5.0.20/ix_values.yaml similarity index 92% rename from stable/hyperion-ng/5.0.19/ix_values.yaml rename to stable/hyperion-ng/5.0.20/ix_values.yaml index 96e8a5ec714..ac0e540b09c 100644 --- a/stable/hyperion-ng/5.0.19/ix_values.yaml +++ b/stable/hyperion-ng/5.0.20/ix_values.yaml @@ -2,7 +2,7 @@ image: # -- image repository repository: tccr.io/truecharts/hyperion.ng # -- image tag - tag: v2.0.13@sha256:09a50c1d484a94bf07b691b9b1341615b04ae73a1fd7ddeb4a2844624a6e6cd8 + tag: v2.0.13@sha256:1480feaaa3e9f9969254828427de061384dc6a29940aa8d5df1fce907d795e61 # -- image pull policy pullPolicy: IfNotPresent diff --git a/stable/hyperion-ng/5.0.19/questions.yaml b/stable/hyperion-ng/5.0.20/questions.yaml similarity index 100% rename from stable/hyperion-ng/5.0.19/questions.yaml rename to stable/hyperion-ng/5.0.20/questions.yaml diff --git a/stable/hyperion-ng/5.0.19/security.md b/stable/hyperion-ng/5.0.20/security.md similarity index 99% rename from stable/hyperion-ng/5.0.19/security.md rename to stable/hyperion-ng/5.0.20/security.md index 9316cd5cc89..5eb4db30b0b 100644 --- a/stable/hyperion-ng/5.0.19/security.md +++ b/stable/hyperion-ng/5.0.20/security.md @@ -45,7 +45,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/hyperion.ng:v2.0.13@sha256:09a50c1d484a94bf07b691b9b1341615b04ae73a1fd7ddeb4a2844624a6e6cd8 + tccr.io/truecharts/hyperion.ng:v2.0.13@sha256:1480feaaa3e9f9969254828427de061384dc6a29940aa8d5df1fce907d795e61 ##### Scan Results @@ -92,7 +92,7 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/hyperion.ng:v2.0.13@sha256:09a50c1d484a94bf07b691b9b1341615b04ae73a1fd7ddeb4a2844624a6e6cd8 (debian 10.12) +#### Container: tccr.io/truecharts/hyperion.ng:v2.0.13@sha256:1480feaaa3e9f9969254828427de061384dc6a29940aa8d5df1fce907d795e61 (debian 10.12) **debian** @@ -516,8 +516,8 @@ hide: | linux-libc-dev | CVE-2022-28388 | HIGH | 4.19.235-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-28388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
https://git.kernel.org/linus/3d3925ff6433f98992685a9679613a2cc97f3ce2 (5.18-rc1)
https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28388
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5416-1
https://www.debian.org/security/2022/dsa-5127
| | linux-libc-dev | CVE-2022-28389 | HIGH | 4.19.235-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-28389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
https://git.kernel.org/linus/04c9b00ba83594a29813d6b1fb8fdc93a3915174 (5.18-rc1)
https://github.com/torvalds/linux/commit/04c9b00ba83594a29813d6b1fb8fdc93a3915174
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28389
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5416-1
https://www.debian.org/security/2022/dsa-5127
| | linux-libc-dev | CVE-2022-28390 | HIGH | 4.19.235-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://git.kernel.org/linus/c70222752228a62135cee3409dccefd494a24646 (5.18-rc1)
https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28390
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5413-1
https://ubuntu.com/security/notices/USN-5416-1
https://www.debian.org/security/2022/dsa-5127
| -| linux-libc-dev | CVE-2022-29581 | HIGH | 4.19.235-1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/05/18/2
https://access.redhat.com/security/cve/CVE-2022-29581
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8
https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8
| -| linux-libc-dev | CVE-2022-30594 | HIGH | 4.19.235-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-30594
https://bugs.chromium.org/p/project-zero/issues/detail?id=2276
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee1fee900537b5d9560e9f937402de5ddc8412f3
https://github.com/torvalds/linux/commit/ee1fee900537b5d9560e9f937402de5ddc8412f3
https://nvd.nist.gov/vuln/detail/CVE-2022-30594
| +| linux-libc-dev | CVE-2022-29581 | HIGH | 4.19.235-1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/05/18/2
https://access.redhat.com/security/cve/CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8
https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8
https://ubuntu.com/security/notices/USN-5442-1
https://ubuntu.com/security/notices/USN-5443-1
https://ubuntu.com/security/notices/USN-5444-1
| +| linux-libc-dev | CVE-2022-30594 | HIGH | 4.19.235-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-30594
https://bugs.chromium.org/p/project-zero/issues/detail?id=2276
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee1fee900537b5d9560e9f937402de5ddc8412f3
https://git.kernel.org/linus/ee1fee900537b5d9560e9f937402de5ddc8412f3 (5.18-rc1)
https://github.com/torvalds/linux/commit/ee1fee900537b5d9560e9f937402de5ddc8412f3
https://nvd.nist.gov/vuln/detail/CVE-2022-30594
https://ubuntu.com/security/notices/USN-5442-1
https://ubuntu.com/security/notices/USN-5443-1
| | linux-libc-dev | CVE-2019-15213 | MEDIUM | 4.19.235-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://access.redhat.com/security/cve/CVE-2019-15213
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| | linux-libc-dev | CVE-2019-15794 | MEDIUM | 4.19.235-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-15794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4209-1
https://usn.ubuntu.com/usn/usn-4208-1
https://usn.ubuntu.com/usn/usn-4209-1
| | linux-libc-dev | CVE-2019-16089 | MEDIUM | 4.19.235-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-16089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089
https://linux.oracle.com/cve/CVE-2019-16089.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lore.kernel.org/lkml/20190911164013.27364-1-navid.emamdoost@gmail.com/
https://lore.kernel.org/patchwork/patch/1106884/
https://lore.kernel.org/patchwork/patch/1126650/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K03814795?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4425-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4425-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
| diff --git a/stable/logitech-media-server/3.0.31/templates/common.yaml b/stable/hyperion-ng/5.0.20/templates/common.yaml similarity index 100% rename from stable/logitech-media-server/3.0.31/templates/common.yaml rename to stable/hyperion-ng/5.0.20/templates/common.yaml diff --git a/stable/logitech-media-server/3.0.31/values.yaml b/stable/hyperion-ng/5.0.20/values.yaml similarity index 100% rename from stable/logitech-media-server/3.0.31/values.yaml rename to stable/hyperion-ng/5.0.20/values.yaml diff --git a/stable/logitech-media-server/3.0.31/Chart.lock b/stable/logitech-media-server/3.0.31/Chart.lock deleted file mode 100644 index 1134ea2ecf4..00000000000 --- a/stable/logitech-media-server/3.0.31/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 9.3.17 -digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc -generated: "2022-05-24T06:59:15.467753463Z" diff --git a/stable/logitech-media-server/3.0.31/CHANGELOG.md b/stable/logitech-media-server/3.0.32/CHANGELOG.md similarity index 91% rename from stable/logitech-media-server/3.0.31/CHANGELOG.md rename to stable/logitech-media-server/3.0.32/CHANGELOG.md index d7b7c728acb..085e157b043 100644 --- a/stable/logitech-media-server/3.0.31/CHANGELOG.md +++ b/stable/logitech-media-server/3.0.32/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [logitech-media-server-3.0.32](https://github.com/truecharts/apps/compare/logitech-media-server-3.0.31...logitech-media-server-3.0.32) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [logitech-media-server-3.0.31](https://github.com/truecharts/apps/compare/logitech-media-server-3.0.30...logitech-media-server-3.0.31) (2022-05-24) @@ -88,12 +97,3 @@ ### [logitech-media-server-3.0.22](https://github.com/truecharts/apps/compare/logitech-media-server-3.0.21...logitech-media-server-3.0.22) (2022-05-04) -#### Chore - -* update docker general non-major ([#2606](https://github.com/truecharts/apps/issues/2606)) - - - - -### [logitech-media-server-3.0.21](https://github.com/truecharts/apps/compare/logitech-media-server-3.0.20...logitech-media-server-3.0.21) (2022-04-28) - diff --git a/stable/matomo/1.0.61/CONFIG.md b/stable/logitech-media-server/3.0.32/CONFIG.md similarity index 100% rename from stable/matomo/1.0.61/CONFIG.md rename to stable/logitech-media-server/3.0.32/CONFIG.md diff --git a/dependency/postgresql/7.0.78/Chart.lock b/stable/logitech-media-server/3.0.32/Chart.lock similarity index 80% rename from dependency/postgresql/7.0.78/Chart.lock rename to stable/logitech-media-server/3.0.32/Chart.lock index df88203d0b8..94d9bb17c98 100644 --- a/dependency/postgresql/7.0.78/Chart.lock +++ b/stable/logitech-media-server/3.0.32/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 9.3.17 digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc -generated: "2022-05-24T18:21:15.74841761Z" +generated: "2022-05-25T06:57:07.81327155Z" diff --git a/stable/logitech-media-server/3.0.31/Chart.yaml b/stable/logitech-media-server/3.0.32/Chart.yaml similarity index 98% rename from stable/logitech-media-server/3.0.31/Chart.yaml rename to stable/logitech-media-server/3.0.32/Chart.yaml index 73ad5b469c5..6fd0d25a162 100644 --- a/stable/logitech-media-server/3.0.31/Chart.yaml +++ b/stable/logitech-media-server/3.0.32/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/Logitech/slimserver - https://hub.docker.com/r/lmscommunity/logitechmediaserver type: application -version: 3.0.31 +version: 3.0.32 annotations: truecharts.org/catagories: | - media diff --git a/stable/logitech-media-server/3.0.31/README.md b/stable/logitech-media-server/3.0.32/README.md similarity index 100% rename from stable/logitech-media-server/3.0.31/README.md rename to stable/logitech-media-server/3.0.32/README.md diff --git a/stable/logitech-media-server/3.0.31/app-readme.md b/stable/logitech-media-server/3.0.32/app-readme.md similarity index 100% rename from stable/logitech-media-server/3.0.31/app-readme.md rename to stable/logitech-media-server/3.0.32/app-readme.md diff --git a/stable/matomo/1.0.61/charts/common-9.3.17.tgz b/stable/logitech-media-server/3.0.32/charts/common-9.3.17.tgz similarity index 100% rename from stable/matomo/1.0.61/charts/common-9.3.17.tgz rename to stable/logitech-media-server/3.0.32/charts/common-9.3.17.tgz diff --git a/stable/logitech-media-server/3.0.31/helm-values.md b/stable/logitech-media-server/3.0.32/helm-values.md similarity index 100% rename from stable/logitech-media-server/3.0.31/helm-values.md rename to stable/logitech-media-server/3.0.32/helm-values.md diff --git a/stable/logitech-media-server/3.0.31/ix_values.yaml b/stable/logitech-media-server/3.0.32/ix_values.yaml similarity index 95% rename from stable/logitech-media-server/3.0.31/ix_values.yaml rename to stable/logitech-media-server/3.0.32/ix_values.yaml index 718b669de8c..7d7f226db92 100644 --- a/stable/logitech-media-server/3.0.31/ix_values.yaml +++ b/stable/logitech-media-server/3.0.32/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/logitechmediaserver pullPolicy: IfNotPresent - tag: v8.3.0@sha256:bfa7276e5e6a14810bd66135836fbca08b816b012295da34ddc3c734f4dc4dc1 + tag: v8.3.0@sha256:1b683926418a71627c333633c422820be47e7427dbfb492f6a2bd3443f204a47 env: # Permissions Settings HTTP_PORT: "{{ .Values.service.main.ports.main.port }}" diff --git a/stable/logitech-media-server/3.0.31/questions.yaml b/stable/logitech-media-server/3.0.32/questions.yaml similarity index 100% rename from stable/logitech-media-server/3.0.31/questions.yaml rename to stable/logitech-media-server/3.0.32/questions.yaml diff --git a/stable/logitech-media-server/3.0.31/security.md b/stable/logitech-media-server/3.0.32/security.md similarity index 99% rename from stable/logitech-media-server/3.0.31/security.md rename to stable/logitech-media-server/3.0.32/security.md index 1ad8a6659a7..6cba4e7939b 100644 --- a/stable/logitech-media-server/3.0.31/security.md +++ b/stable/logitech-media-server/3.0.32/security.md @@ -46,7 +46,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/logitechmediaserver:v8.3.0@sha256:bfa7276e5e6a14810bd66135836fbca08b816b012295da34ddc3c734f4dc4dc1 + tccr.io/truecharts/logitechmediaserver:v8.3.0@sha256:1b683926418a71627c333633c422820be47e7427dbfb492f6a2bd3443f204a47 ##### Scan Results @@ -93,7 +93,7 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/logitechmediaserver:v8.3.0@sha256:bfa7276e5e6a14810bd66135836fbca08b816b012295da34ddc3c734f4dc4dc1 (debian 11.3) +#### Container: tccr.io/truecharts/logitechmediaserver:v8.3.0@sha256:1b683926418a71627c333633c422820be47e7427dbfb492f6a2bd3443f204a47 (debian 11.3) **debian** @@ -168,7 +168,7 @@ hide: | libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.57+dfsg-3 | 2.4.57+dfsg-3+deb11u1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.57+dfsg-3 | 2.4.57+dfsg-3+deb11u1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| diff --git a/stable/matomo/1.0.61/templates/common.yaml b/stable/logitech-media-server/3.0.32/templates/common.yaml similarity index 100% rename from stable/matomo/1.0.61/templates/common.yaml rename to stable/logitech-media-server/3.0.32/templates/common.yaml diff --git a/stable/matomo/1.0.61/values.yaml b/stable/logitech-media-server/3.0.32/values.yaml similarity index 100% rename from stable/matomo/1.0.61/values.yaml rename to stable/logitech-media-server/3.0.32/values.yaml diff --git a/stable/matomo/1.0.61/CHANGELOG.md b/stable/matomo/1.0.62/CHANGELOG.md similarity index 87% rename from stable/matomo/1.0.61/CHANGELOG.md rename to stable/matomo/1.0.62/CHANGELOG.md index c5591885465..553f363def2 100644 --- a/stable/matomo/1.0.61/CHANGELOG.md +++ b/stable/matomo/1.0.62/CHANGELOG.md @@ -1,6 +1,16 @@ # Changelog
+ +### [matomo-1.0.62](https://github.com/truecharts/apps/compare/matomo-1.0.61...matomo-1.0.62) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) +* update docker general non-major ([#2740](https://github.com/truecharts/apps/issues/2740)) + + + ### [matomo-1.0.61](https://github.com/truecharts/apps/compare/matomo-1.0.60...matomo-1.0.61) (2022-05-24) @@ -87,13 +97,3 @@ -### [matomo-1.0.51](https://github.com/truecharts/apps/compare/matomo-1.0.50...matomo-1.0.51) (2022-05-14) - -#### Chore - -* update docker general non-major ([#2679](https://github.com/truecharts/apps/issues/2679)) - - - - -### [matomo-1.0.50](https://github.com/truecharts/apps/compare/matomo-1.0.49...matomo-1.0.50) (2022-05-13) diff --git a/stable/n8n/2.0.33/CONFIG.md b/stable/matomo/1.0.62/CONFIG.md similarity index 100% rename from stable/n8n/2.0.33/CONFIG.md rename to stable/matomo/1.0.62/CONFIG.md diff --git a/stable/matomo/1.0.61/Chart.lock b/stable/matomo/1.0.62/Chart.lock similarity index 85% rename from stable/matomo/1.0.61/Chart.lock rename to stable/matomo/1.0.62/Chart.lock index 9d5a9a6ef6a..0c56c01c7af 100644 --- a/stable/matomo/1.0.61/Chart.lock +++ b/stable/matomo/1.0.62/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://charts.truecharts.org/ version: 2.0.76 digest: sha256:4311425693cdc848834dc4ef11ec4559ac7e90135d81767b5a64a7661e5d6e52 -generated: "2022-05-24T06:59:45.37587635Z" +generated: "2022-05-25T06:57:28.175937469Z" diff --git a/stable/matomo/1.0.61/Chart.yaml b/stable/matomo/1.0.62/Chart.yaml similarity index 95% rename from stable/matomo/1.0.61/Chart.yaml rename to stable/matomo/1.0.62/Chart.yaml index d72635698d4..891b0698d38 100644 --- a/stable/matomo/1.0.61/Chart.yaml +++ b/stable/matomo/1.0.62/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "4.10.0" +appVersion: "4.10.1" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -23,7 +23,7 @@ sources: - https://hub.docker.com/r/bitnami/matomo - https://github.com/bitnami/bitnami-docker-matomo - https://github.com/matomo-org/matomo -version: 1.0.61 +version: 1.0.62 annotations: truecharts.org/catagories: | - productivity diff --git a/stable/matomo/1.0.61/README.md b/stable/matomo/1.0.62/README.md similarity index 100% rename from stable/matomo/1.0.61/README.md rename to stable/matomo/1.0.62/README.md diff --git a/stable/matomo/1.0.61/app-readme.md b/stable/matomo/1.0.62/app-readme.md similarity index 100% rename from stable/matomo/1.0.61/app-readme.md rename to stable/matomo/1.0.62/app-readme.md diff --git a/stable/n8n/2.0.33/charts/common-9.3.17.tgz b/stable/matomo/1.0.62/charts/common-9.3.17.tgz similarity index 100% rename from stable/n8n/2.0.33/charts/common-9.3.17.tgz rename to stable/matomo/1.0.62/charts/common-9.3.17.tgz diff --git a/stable/matomo/1.0.61/charts/mariadb-2.0.76.tgz b/stable/matomo/1.0.62/charts/mariadb-2.0.76.tgz similarity index 100% rename from stable/matomo/1.0.61/charts/mariadb-2.0.76.tgz rename to stable/matomo/1.0.62/charts/mariadb-2.0.76.tgz diff --git a/stable/matomo/1.0.61/helm-values.md b/stable/matomo/1.0.62/helm-values.md similarity index 100% rename from stable/matomo/1.0.61/helm-values.md rename to stable/matomo/1.0.62/helm-values.md diff --git a/stable/matomo/1.0.61/ix_values.yaml b/stable/matomo/1.0.62/ix_values.yaml similarity index 96% rename from stable/matomo/1.0.61/ix_values.yaml rename to stable/matomo/1.0.62/ix_values.yaml index ab36726eeb3..6d1f31bb5a3 100644 --- a/stable/matomo/1.0.61/ix_values.yaml +++ b/stable/matomo/1.0.62/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/matomo - tag: v4.10.0@sha256:7c68d80b72370cae8f7780417477f56f314a7cc66bda8b34015c26f320001139 + tag: v4.10.1@sha256:512caf52b682cc4944bd560ce01fda3f6af46972c9077e469870cac6dd73411f pullPolicy: IfNotPresent securityContext: diff --git a/stable/matomo/1.0.61/questions.yaml b/stable/matomo/1.0.62/questions.yaml similarity index 100% rename from stable/matomo/1.0.61/questions.yaml rename to stable/matomo/1.0.62/questions.yaml diff --git a/stable/matomo/1.0.61/security.md b/stable/matomo/1.0.62/security.md similarity index 99% rename from stable/matomo/1.0.61/security.md rename to stable/matomo/1.0.62/security.md index 9456711028e..5d6ec01b514 100644 --- a/stable/matomo/1.0.61/security.md +++ b/stable/matomo/1.0.62/security.md @@ -80,7 +80,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/mariadb:v10.7.3@sha256:7e6cda19aa5edae8cfef06f3e5370bfd38a23ece5651c17961a05d7ff9cb8f90 - tccr.io/truecharts/matomo:v4.10.0@sha256:7c68d80b72370cae8f7780417477f56f314a7cc66bda8b34015c26f320001139 + tccr.io/truecharts/matomo:v4.10.1@sha256:512caf52b682cc4944bd560ce01fda3f6af46972c9077e469870cac6dd73411f ##### Scan Results @@ -235,12 +235,12 @@ hide: | libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| @@ -475,12 +475,12 @@ hide: | libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| @@ -573,7 +573,7 @@ hide: -#### Container: tccr.io/truecharts/matomo:v4.10.0@sha256:7c68d80b72370cae8f7780417477f56f314a7cc66bda8b34015c26f320001139 (debian 10.12) +#### Container: tccr.io/truecharts/matomo:v4.10.1@sha256:512caf52b682cc4944bd560ce01fda3f6af46972c9077e469870cac6dd73411f (debian 10.12) **debian** diff --git a/stable/xwiki/1.0.16/templates/common.yaml b/stable/matomo/1.0.62/templates/common.yaml similarity index 100% rename from stable/xwiki/1.0.16/templates/common.yaml rename to stable/matomo/1.0.62/templates/common.yaml diff --git a/stable/n8n/2.0.33/values.yaml b/stable/matomo/1.0.62/values.yaml similarity index 100% rename from stable/n8n/2.0.33/values.yaml rename to stable/matomo/1.0.62/values.yaml diff --git a/stable/n8n/2.0.33/CHANGELOG.md b/stable/n8n/2.0.34/CHANGELOG.md similarity index 91% rename from stable/n8n/2.0.33/CHANGELOG.md rename to stable/n8n/2.0.34/CHANGELOG.md index a6265a6950d..d6c87305036 100644 --- a/stable/n8n/2.0.33/CHANGELOG.md +++ b/stable/n8n/2.0.34/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [n8n-2.0.34](https://github.com/truecharts/apps/compare/n8n-2.0.33...n8n-2.0.34) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [n8n-2.0.33](https://github.com/truecharts/apps/compare/n8n-2.0.32...n8n-2.0.33) (2022-05-24) @@ -88,12 +97,3 @@ ### [n8n-2.0.25](https://github.com/truecharts/apps/compare/n8n-2.0.24...n8n-2.0.25) (2022-04-28) #### Chore - -* update docker general non-major ([#2577](https://github.com/truecharts/apps/issues/2577)) - - - - -### [n8n-2.0.24](https://github.com/truecharts/apps/compare/n8n-2.0.23...n8n-2.0.24) (2022-04-26) - -#### Chore diff --git a/stable/outline/1.0.25/CONFIG.md b/stable/n8n/2.0.34/CONFIG.md similarity index 100% rename from stable/outline/1.0.25/CONFIG.md rename to stable/n8n/2.0.34/CONFIG.md diff --git a/stable/outline/1.0.25/Chart.lock b/stable/n8n/2.0.34/Chart.lock similarity index 88% rename from stable/outline/1.0.25/Chart.lock rename to stable/n8n/2.0.34/Chart.lock index 1f7ecbc1b31..c58f8b383a5 100644 --- a/stable/outline/1.0.25/Chart.lock +++ b/stable/n8n/2.0.34/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://charts.truecharts.org version: 2.0.69 digest: sha256:3349c5454020cc7a4dde58f8eedc6a15e27044966df28216bc1daa69a31620c2 -generated: "2022-05-24T18:26:09.40358462Z" +generated: "2022-05-25T06:57:41.03546043Z" diff --git a/stable/n8n/2.0.33/Chart.yaml b/stable/n8n/2.0.34/Chart.yaml similarity index 95% rename from stable/n8n/2.0.33/Chart.yaml rename to stable/n8n/2.0.34/Chart.yaml index 36144c1a458..3d1a2b9aeee 100644 --- a/stable/n8n/2.0.33/Chart.yaml +++ b/stable/n8n/2.0.34/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "0.177.0" +appVersion: "0.178.1" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -28,7 +28,7 @@ sources: - https://docs.n8n.io/ - https://github.com/n8n-io/n8n - https://hub.docker.com/r/n8nio/n8n -version: 2.0.33 +version: 2.0.34 annotations: truecharts.org/catagories: | - media diff --git a/stable/n8n/2.0.33/README.md b/stable/n8n/2.0.34/README.md similarity index 100% rename from stable/n8n/2.0.33/README.md rename to stable/n8n/2.0.34/README.md diff --git a/stable/n8n/2.0.33/app-readme.md b/stable/n8n/2.0.34/app-readme.md similarity index 100% rename from stable/n8n/2.0.33/app-readme.md rename to stable/n8n/2.0.34/app-readme.md diff --git a/stable/outline/1.0.25/charts/common-9.3.17.tgz b/stable/n8n/2.0.34/charts/common-9.3.17.tgz similarity index 100% rename from stable/outline/1.0.25/charts/common-9.3.17.tgz rename to stable/n8n/2.0.34/charts/common-9.3.17.tgz diff --git a/stable/n8n/2.0.33/charts/postgresql-7.0.77.tgz b/stable/n8n/2.0.34/charts/postgresql-7.0.77.tgz similarity index 100% rename from stable/n8n/2.0.33/charts/postgresql-7.0.77.tgz rename to stable/n8n/2.0.34/charts/postgresql-7.0.77.tgz diff --git a/stable/n8n/2.0.33/charts/redis-2.0.69.tgz b/stable/n8n/2.0.34/charts/redis-2.0.69.tgz similarity index 100% rename from stable/n8n/2.0.33/charts/redis-2.0.69.tgz rename to stable/n8n/2.0.34/charts/redis-2.0.69.tgz diff --git a/stable/n8n/2.0.33/helm-values.md b/stable/n8n/2.0.34/helm-values.md similarity index 100% rename from stable/n8n/2.0.33/helm-values.md rename to stable/n8n/2.0.34/helm-values.md diff --git a/stable/n8n/2.0.33/ix_values.yaml b/stable/n8n/2.0.34/ix_values.yaml similarity index 97% rename from stable/n8n/2.0.33/ix_values.yaml rename to stable/n8n/2.0.34/ix_values.yaml index 236d9a57894..44fbf807d1e 100644 --- a/stable/n8n/2.0.33/ix_values.yaml +++ b/stable/n8n/2.0.34/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/n8n - tag: v0.177.0@sha256:9e4cfa452f29f7fc0bdbcd6ae38e95eb488b748ceb4867f92492ade7333ce3a2 + tag: v0.178.1@sha256:ab80787fb1d1f53c2af7fe028eb4b85e22f6b084b869061a1d44207e41218e0d pullPolicy: IfNotPresent securityContext: diff --git a/stable/n8n/2.0.33/questions.yaml b/stable/n8n/2.0.34/questions.yaml similarity index 100% rename from stable/n8n/2.0.33/questions.yaml rename to stable/n8n/2.0.34/questions.yaml diff --git a/stable/n8n/2.0.33/security.md b/stable/n8n/2.0.34/security.md similarity index 100% rename from stable/n8n/2.0.33/security.md rename to stable/n8n/2.0.34/security.md diff --git a/stable/n8n/2.0.33/templates/_configmap.tpl b/stable/n8n/2.0.34/templates/_configmap.tpl similarity index 100% rename from stable/n8n/2.0.33/templates/_configmap.tpl rename to stable/n8n/2.0.34/templates/_configmap.tpl diff --git a/stable/n8n/2.0.33/templates/common.yaml b/stable/n8n/2.0.34/templates/common.yaml similarity index 100% rename from stable/n8n/2.0.33/templates/common.yaml rename to stable/n8n/2.0.34/templates/common.yaml diff --git a/stable/outline/1.0.25/values.yaml b/stable/n8n/2.0.34/values.yaml similarity index 100% rename from stable/outline/1.0.25/values.yaml rename to stable/n8n/2.0.34/values.yaml diff --git a/stable/outline/1.0.25/CHANGELOG.md b/stable/outline/1.0.26/CHANGELOG.md similarity index 87% rename from stable/outline/1.0.25/CHANGELOG.md rename to stable/outline/1.0.26/CHANGELOG.md index 4ce5f78e898..0297c4602d6 100644 --- a/stable/outline/1.0.25/CHANGELOG.md +++ b/stable/outline/1.0.26/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [outline-1.0.26](https://github.com/truecharts/apps/compare/outline-1.0.25...outline-1.0.26) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [outline-1.0.25](https://github.com/truecharts/apps/compare/outline-1.0.24...outline-1.0.25) (2022-05-24) @@ -88,12 +97,3 @@ #### Chore -* add missing quote on description ([#2515](https://github.com/truecharts/apps/issues/2515)) -* update helm general non-major helm releases ([#2524](https://github.com/truecharts/apps/issues/2524)) - - - - -### [outline-1.0.16](https://github.com/truecharts/apps/compare/outline-1.0.15...outline-1.0.16) (2022-04-17) - -#### Chore diff --git a/stable/snipe-it/2.0.24/CONFIG.md b/stable/outline/1.0.26/CONFIG.md similarity index 100% rename from stable/snipe-it/2.0.24/CONFIG.md rename to stable/outline/1.0.26/CONFIG.md diff --git a/stable/n8n/2.0.33/Chart.lock b/stable/outline/1.0.26/Chart.lock similarity index 88% rename from stable/n8n/2.0.33/Chart.lock rename to stable/outline/1.0.26/Chart.lock index ff7232bd37f..6bccb149203 100644 --- a/stable/n8n/2.0.33/Chart.lock +++ b/stable/outline/1.0.26/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://charts.truecharts.org version: 2.0.69 digest: sha256:3349c5454020cc7a4dde58f8eedc6a15e27044966df28216bc1daa69a31620c2 -generated: "2022-05-24T07:03:57.721538366Z" +generated: "2022-05-25T06:57:52.062483659Z" diff --git a/stable/outline/1.0.25/Chart.yaml b/stable/outline/1.0.26/Chart.yaml similarity index 96% rename from stable/outline/1.0.25/Chart.yaml rename to stable/outline/1.0.26/Chart.yaml index b2a17c16284..41f7917952f 100644 --- a/stable/outline/1.0.25/Chart.yaml +++ b/stable/outline/1.0.26/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "0.64.2" +appVersion: "0.64.3" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -28,7 +28,7 @@ name: outline sources: - https://github.com/outline/outline type: application -version: 1.0.25 +version: 1.0.26 annotations: truecharts.org/catagories: | - productivity diff --git a/stable/outline/1.0.25/README.md b/stable/outline/1.0.26/README.md similarity index 100% rename from stable/outline/1.0.25/README.md rename to stable/outline/1.0.26/README.md diff --git a/stable/outline/1.0.25/app-readme.md b/stable/outline/1.0.26/app-readme.md similarity index 100% rename from stable/outline/1.0.25/app-readme.md rename to stable/outline/1.0.26/app-readme.md diff --git a/stable/snipe-it/2.0.24/charts/common-9.3.17.tgz b/stable/outline/1.0.26/charts/common-9.3.17.tgz similarity index 100% rename from stable/snipe-it/2.0.24/charts/common-9.3.17.tgz rename to stable/outline/1.0.26/charts/common-9.3.17.tgz diff --git a/stable/outline/1.0.25/charts/postgresql-7.0.77.tgz b/stable/outline/1.0.26/charts/postgresql-7.0.77.tgz similarity index 100% rename from stable/outline/1.0.25/charts/postgresql-7.0.77.tgz rename to stable/outline/1.0.26/charts/postgresql-7.0.77.tgz diff --git a/stable/outline/1.0.25/charts/redis-2.0.69.tgz b/stable/outline/1.0.26/charts/redis-2.0.69.tgz similarity index 100% rename from stable/outline/1.0.25/charts/redis-2.0.69.tgz rename to stable/outline/1.0.26/charts/redis-2.0.69.tgz diff --git a/stable/outline/1.0.25/helm-values.md b/stable/outline/1.0.26/helm-values.md similarity index 100% rename from stable/outline/1.0.25/helm-values.md rename to stable/outline/1.0.26/helm-values.md diff --git a/stable/outline/1.0.25/ix_values.yaml b/stable/outline/1.0.26/ix_values.yaml similarity index 96% rename from stable/outline/1.0.25/ix_values.yaml rename to stable/outline/1.0.26/ix_values.yaml index 3da1c1a4418..82536af6a4b 100644 --- a/stable/outline/1.0.25/ix_values.yaml +++ b/stable/outline/1.0.26/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/outline pullPolicy: IfNotPresent - tag: v0.64.2@sha256:d5878bb0f1c3ac6a2cd93055dd21e38a26ecf40052822e123d0cbd5a80f7dcb8 + tag: v0.64.3@sha256:0d85803c9619d1ce1e9eeb7722d0537540c9c6c8fbd72523e0f42819d7f2c3a3 securityContext: readOnlyRootFilesystem: false diff --git a/stable/outline/1.0.25/questions.yaml b/stable/outline/1.0.26/questions.yaml similarity index 100% rename from stable/outline/1.0.25/questions.yaml rename to stable/outline/1.0.26/questions.yaml diff --git a/stable/outline/1.0.25/security.md b/stable/outline/1.0.26/security.md similarity index 99% rename from stable/outline/1.0.25/security.md rename to stable/outline/1.0.26/security.md index 77b8b7708c3..d4b896ab2eb 100644 --- a/stable/outline/1.0.25/security.md +++ b/stable/outline/1.0.26/security.md @@ -118,8 +118,8 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/postgresql:v14.3.0@sha256:cc117e963834a2b4f6db986b9a0d2b42009b73ce2805ea29ac9c526107c7e99e - 'tccr.io/truecharts/outline:v0.64.2@sha256:d5878bb0f1c3ac6a2cd93055dd21e38a26ecf40052822e123d0cbd5a80f7dcb8' - tccr.io/truecharts/outline:v0.64.2@sha256:d5878bb0f1c3ac6a2cd93055dd21e38a26ecf40052822e123d0cbd5a80f7dcb8 + 'tccr.io/truecharts/outline:v0.64.3@sha256:0d85803c9619d1ce1e9eeb7722d0537540c9c6c8fbd72523e0f42819d7f2c3a3' + tccr.io/truecharts/outline:v0.64.3@sha256:0d85803c9619d1ce1e9eeb7722d0537540c9c6c8fbd72523e0f42819d7f2c3a3 ##### Scan Results @@ -296,12 +296,12 @@ hide: | libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| @@ -575,12 +575,12 @@ hide: | libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| @@ -842,12 +842,12 @@ hide: | libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| @@ -973,7 +973,7 @@ hide: -#### Container: tccr.io/truecharts/outline:v0.64.2@sha256:d5878bb0f1c3ac6a2cd93055dd21e38a26ecf40052822e123d0cbd5a80f7dcb8 (alpine 3.15.4) +#### Container: tccr.io/truecharts/outline:v0.64.3@sha256:0d85803c9619d1ce1e9eeb7722d0537540c9c6c8fbd72523e0f42819d7f2c3a3 (alpine 3.15.4) **alpine** diff --git a/stable/outline/1.0.25/templates/_secrets.tpl b/stable/outline/1.0.26/templates/_secrets.tpl similarity index 100% rename from stable/outline/1.0.25/templates/_secrets.tpl rename to stable/outline/1.0.26/templates/_secrets.tpl diff --git a/stable/outline/1.0.25/templates/common.yaml b/stable/outline/1.0.26/templates/common.yaml similarity index 100% rename from stable/outline/1.0.25/templates/common.yaml rename to stable/outline/1.0.26/templates/common.yaml diff --git a/stable/snipe-it/2.0.24/values.yaml b/stable/outline/1.0.26/values.yaml similarity index 100% rename from stable/snipe-it/2.0.24/values.yaml rename to stable/outline/1.0.26/values.yaml diff --git a/stable/snipe-it/2.0.24/CHANGELOG.md b/stable/snipe-it/2.0.25/CHANGELOG.md similarity index 90% rename from stable/snipe-it/2.0.24/CHANGELOG.md rename to stable/snipe-it/2.0.25/CHANGELOG.md index 72e26f30823..df0a43a3b48 100644 --- a/stable/snipe-it/2.0.24/CHANGELOG.md +++ b/stable/snipe-it/2.0.25/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [snipe-it-2.0.25](https://github.com/truecharts/apps/compare/snipe-it-2.0.24...snipe-it-2.0.25) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [snipe-it-2.0.24](https://github.com/truecharts/apps/compare/snipe-it-2.0.23...snipe-it-2.0.24) (2022-05-24) @@ -88,12 +97,3 @@ ### [snipe-it-2.0.16](https://github.com/truecharts/apps/compare/snipe-it-2.0.15...snipe-it-2.0.16) (2022-04-26) #### Chore - -* update helm general non-major helm releases ([#2573](https://github.com/truecharts/apps/issues/2573)) - - - - -### [snipe-it-2.0.15](https://github.com/truecharts/apps/compare/snipe-it-2.0.14...snipe-it-2.0.15) (2022-04-20) - -#### Chore diff --git a/stable/xwiki/1.0.16/CONFIG.md b/stable/snipe-it/2.0.25/CONFIG.md similarity index 100% rename from stable/xwiki/1.0.16/CONFIG.md rename to stable/snipe-it/2.0.25/CONFIG.md diff --git a/stable/snipe-it/2.0.24/Chart.lock b/stable/snipe-it/2.0.25/Chart.lock similarity index 88% rename from stable/snipe-it/2.0.24/Chart.lock rename to stable/snipe-it/2.0.25/Chart.lock index cfad067d743..59d01971e57 100644 --- a/stable/snipe-it/2.0.24/Chart.lock +++ b/stable/snipe-it/2.0.25/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://charts.truecharts.org version: 2.0.69 digest: sha256:c1f5cccc7a63ebd049a71a620636ac37359e542ce13a17c37872a9aa675959f5 -generated: "2022-05-24T07:16:42.215134934Z" +generated: "2022-05-25T06:57:54.992952252Z" diff --git a/stable/snipe-it/2.0.24/Chart.yaml b/stable/snipe-it/2.0.25/Chart.yaml similarity index 96% rename from stable/snipe-it/2.0.24/Chart.yaml rename to stable/snipe-it/2.0.25/Chart.yaml index 342e51c936a..c3c646a43c8 100644 --- a/stable/snipe-it/2.0.24/Chart.yaml +++ b/stable/snipe-it/2.0.25/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "6.0.1" +appVersion: "6.0.2" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -29,7 +29,7 @@ name: snipe-it sources: - https://snipeitapp.com/ - https://hub.docker.com/r/linuxserver/ -version: 2.0.24 +version: 2.0.25 annotations: truecharts.org/catagories: | - management diff --git a/stable/snipe-it/2.0.24/README.md b/stable/snipe-it/2.0.25/README.md similarity index 100% rename from stable/snipe-it/2.0.24/README.md rename to stable/snipe-it/2.0.25/README.md diff --git a/stable/snipe-it/2.0.24/app-readme.md b/stable/snipe-it/2.0.25/app-readme.md similarity index 100% rename from stable/snipe-it/2.0.24/app-readme.md rename to stable/snipe-it/2.0.25/app-readme.md diff --git a/stable/xwiki/1.0.16/charts/common-9.3.17.tgz b/stable/snipe-it/2.0.25/charts/common-9.3.17.tgz similarity index 100% rename from stable/xwiki/1.0.16/charts/common-9.3.17.tgz rename to stable/snipe-it/2.0.25/charts/common-9.3.17.tgz diff --git a/stable/snipe-it/2.0.24/charts/mariadb-2.0.76.tgz b/stable/snipe-it/2.0.25/charts/mariadb-2.0.76.tgz similarity index 100% rename from stable/snipe-it/2.0.24/charts/mariadb-2.0.76.tgz rename to stable/snipe-it/2.0.25/charts/mariadb-2.0.76.tgz diff --git a/stable/snipe-it/2.0.24/charts/redis-2.0.69.tgz b/stable/snipe-it/2.0.25/charts/redis-2.0.69.tgz similarity index 100% rename from stable/snipe-it/2.0.24/charts/redis-2.0.69.tgz rename to stable/snipe-it/2.0.25/charts/redis-2.0.69.tgz diff --git a/stable/snipe-it/2.0.24/helm-values.md b/stable/snipe-it/2.0.25/helm-values.md similarity index 100% rename from stable/snipe-it/2.0.24/helm-values.md rename to stable/snipe-it/2.0.25/helm-values.md diff --git a/stable/snipe-it/2.0.24/ix_values.yaml b/stable/snipe-it/2.0.25/ix_values.yaml similarity index 95% rename from stable/snipe-it/2.0.24/ix_values.yaml rename to stable/snipe-it/2.0.25/ix_values.yaml index 0e332b9a7f5..431825b17a1 100644 --- a/stable/snipe-it/2.0.24/ix_values.yaml +++ b/stable/snipe-it/2.0.25/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/snipe-it pullPolicy: IfNotPresent - tag: v6.0.1@sha256:94b1ae777f9875ef2ac02b19346861770e8d47e889972a91d9c98b04089c25a9 + tag: v6.0.2@sha256:3acd046042d62cc699ae9b8498eb88a9464b4767341e89bc7ca86dcc6a860625 securityContext: runAsNonRoot: false diff --git a/stable/snipe-it/2.0.24/questions.yaml b/stable/snipe-it/2.0.25/questions.yaml similarity index 100% rename from stable/snipe-it/2.0.24/questions.yaml rename to stable/snipe-it/2.0.25/questions.yaml diff --git a/stable/snipe-it/2.0.24/security.md b/stable/snipe-it/2.0.25/security.md similarity index 99% rename from stable/snipe-it/2.0.24/security.md rename to stable/snipe-it/2.0.25/security.md index edaa0f71135..8e52eaa0934 100644 --- a/stable/snipe-it/2.0.24/security.md +++ b/stable/snipe-it/2.0.25/security.md @@ -108,7 +108,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/mariadb:v10.7.3@sha256:7e6cda19aa5edae8cfef06f3e5370bfd38a23ece5651c17961a05d7ff9cb8f90 - tccr.io/truecharts/snipe-it:v6.0.1@sha256:94b1ae777f9875ef2ac02b19346861770e8d47e889972a91d9c98b04089c25a9 + tccr.io/truecharts/snipe-it:v6.0.2@sha256:3acd046042d62cc699ae9b8498eb88a9464b4767341e89bc7ca86dcc6a860625 ##### Scan Results @@ -263,12 +263,12 @@ hide: | libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| @@ -508,12 +508,12 @@ hide: | libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| @@ -748,12 +748,12 @@ hide: | libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| @@ -846,7 +846,7 @@ hide: -#### Container: tccr.io/truecharts/snipe-it:v6.0.1@sha256:94b1ae777f9875ef2ac02b19346861770e8d47e889972a91d9c98b04089c25a9 (ubuntu 20.04) +#### Container: tccr.io/truecharts/snipe-it:v6.0.2@sha256:3acd046042d62cc699ae9b8498eb88a9464b4767341e89bc7ca86dcc6a860625 (ubuntu 20.04) **ubuntu** @@ -919,8 +919,8 @@ hide: | libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| | libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| -| libldap-2.4-2 | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| -| libldap-common | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libpcre2-16-0 | CVE-2022-1586 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
| | libpcre2-16-0 | CVE-2022-1587 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
| | libpcre2-32-0 | CVE-2022-1586 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
| @@ -959,7 +959,8 @@ hide: | libxml2 | CVE-2022-29824 | MEDIUM | 2.9.10+dfsg-5ubuntu0.20.04.2 | 2.9.10+dfsg-5ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
https://www.debian.org/security/2022/dsa-5142
| | libxslt1.1 | CVE-2015-9019 | LOW | 1.1.34-4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| | linux-libc-dev | CVE-2022-1015 | HIGH | 5.4.0-110.124 | |
Expand...http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
https://access.redhat.com/security/cve/CVE-2022-1015
https://bugzilla.redhat.com/show_bug.cgi?id=2065323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015
https://nvd.nist.gov/vuln/detail/CVE-2022-1015
https://seclists.org/oss-sec/2022/q1/205
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5390-1
https://ubuntu.com/security/notices/USN-5390-2
https://www.openwall.com/lists/oss-security/2022/03/28/5
| -| linux-libc-dev | CVE-2022-1116 | HIGH | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1116
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/io_uring.c?h=v5.4.189&id=1a623d361ffe5cecd4244a02f449528416360038
https://kernel.dance/#1a623d361ffe5cecd4244a02f449528416360038
| +| linux-libc-dev | CVE-2022-1116 | HIGH | 5.4.0-110.124 | 5.4.0-113.127 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1116
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/io_uring.c?h=v5.4.189&id=1a623d361ffe5cecd4244a02f449528416360038
https://kernel.dance/#1a623d361ffe5cecd4244a02f449528416360038
https://ubuntu.com/security/notices/USN-5442-1
| +| linux-libc-dev | CVE-2022-29581 | HIGH | 5.4.0-110.124 | 5.4.0-113.127 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/18/2
https://access.redhat.com/security/cve/CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8
https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8
https://ubuntu.com/security/notices/USN-5442-1
https://ubuntu.com/security/notices/USN-5443-1
https://ubuntu.com/security/notices/USN-5444-1
| | linux-libc-dev | CVE-2013-7445 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-7445
https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| | linux-libc-dev | CVE-2015-8553 | MEDIUM | 5.4.0-110.124 | |
Expand...http://thread.gmane.org/gmane.linux.kernel/1924087/focus=1930758 (regression mention)
http://xenbits.xen.org/xsa/advisory-120.html
https://access.redhat.com/security/cve/CVE-2015-8553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
https://seclists.org/bugtraq/2019/Aug/18
https://www.debian.org/security/2019/dsa-4497
| | linux-libc-dev | CVE-2016-8660 | MEDIUM | 5.4.0-110.124 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://access.redhat.com/security/cve/CVE-2016-8660
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
| @@ -996,6 +997,7 @@ hide: | linux-libc-dev | CVE-2022-1508 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1508
https://git.kernel.org/linus/89c2b3b74918200e46699338d7bcc19b1ea12110 (5.15-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110
| | linux-libc-dev | CVE-2022-28388 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-28388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
https://git.kernel.org/linus/3d3925ff6433f98992685a9679613a2cc97f3ce2 (5.18-rc1)
https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28388
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5416-1
https://www.debian.org/security/2022/dsa-5127
| | linux-libc-dev | CVE-2022-28893 | MEDIUM | 5.4.0-110.124 | |
Expand...http://www.openwall.com/lists/oss-security/2022/04/11/3
http://www.openwall.com/lists/oss-security/2022/04/11/4
http://www.openwall.com/lists/oss-security/2022/04/11/5
https://access.redhat.com/security/cve/CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a
https://github.com/torvalds/linux/commit/f00432063db1a0db484e85193eccc6845435b80e
https://nvd.nist.gov/vuln/detail/CVE-2022-28893
https://www.openwall.com/lists/oss-security/2022/04/11/3
https://www.openwall.com/lists/oss-security/2022/04/11/5
| +| linux-libc-dev | CVE-2022-30594 | MEDIUM | 5.4.0-110.124 | 5.4.0-113.127 |
Expand...https://access.redhat.com/security/cve/CVE-2022-30594
https://bugs.chromium.org/p/project-zero/issues/detail?id=2276
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee1fee900537b5d9560e9f937402de5ddc8412f3
https://git.kernel.org/linus/ee1fee900537b5d9560e9f937402de5ddc8412f3 (5.18-rc1)
https://github.com/torvalds/linux/commit/ee1fee900537b5d9560e9f937402de5ddc8412f3
https://nvd.nist.gov/vuln/detail/CVE-2022-30594
https://ubuntu.com/security/notices/USN-5442-1
https://ubuntu.com/security/notices/USN-5443-1
| | linux-libc-dev | CVE-2017-0537 | LOW | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/96831
http://www.securitytracker.com/id/1037968
https://android.googlesource.com/kernel/tegra.git/+/389b185cb2f17fff994dbdf8d4bac003d4b2b6b3%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0537
https://lore.kernel.org/lkml/1484647168-30135-1-git-send-email-jilin@nvidia.com/#t
https://source.android.com/security/bulletin/2017-01-01.html
https://source.android.com/security/bulletin/2017-03-01
https://source.android.com/security/bulletin/2017-03-01.html
| | linux-libc-dev | CVE-2017-13165 | LOW | 5.4.0-110.124 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13165
https://github.com/aosp-mirror/platform_system_core/commit/15ffc53f6d57a46e3041453865311035a18e047a
https://source.android.com/security/bulletin/pixel/2017-12-01
| | linux-libc-dev | CVE-2017-13693 | LOW | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/100502
https://access.redhat.com/security/cve/CVE-2017-13693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| diff --git a/stable/snipe-it/2.0.24/templates/_secrets.tpl b/stable/snipe-it/2.0.25/templates/_secrets.tpl similarity index 100% rename from stable/snipe-it/2.0.24/templates/_secrets.tpl rename to stable/snipe-it/2.0.25/templates/_secrets.tpl diff --git a/stable/snipe-it/2.0.24/templates/common.yaml b/stable/snipe-it/2.0.25/templates/common.yaml similarity index 100% rename from stable/snipe-it/2.0.24/templates/common.yaml rename to stable/snipe-it/2.0.25/templates/common.yaml diff --git a/stable/xwiki/1.0.16/values.yaml b/stable/snipe-it/2.0.25/values.yaml similarity index 100% rename from stable/xwiki/1.0.16/values.yaml rename to stable/snipe-it/2.0.25/values.yaml diff --git a/stable/xwiki/1.0.16/CHANGELOG.md b/stable/xwiki/1.0.17/CHANGELOG.md similarity index 90% rename from stable/xwiki/1.0.16/CHANGELOG.md rename to stable/xwiki/1.0.17/CHANGELOG.md index 8b8a5a614db..b1e025743e0 100644 --- a/stable/xwiki/1.0.16/CHANGELOG.md +++ b/stable/xwiki/1.0.17/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [xwiki-1.0.17](https://github.com/truecharts/apps/compare/xwiki-1.0.16...xwiki-1.0.17) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + ### [xwiki-1.0.16](https://github.com/truecharts/apps/compare/xwiki-1.0.15...xwiki-1.0.16) (2022-05-24) @@ -88,12 +97,3 @@ #### Chore -* update helm general non-major helm releases ([#2605](https://github.com/truecharts/apps/issues/2605)) - - - - -### [xwiki-1.0.7](https://github.com/truecharts/apps/compare/xwiki-1.0.6...xwiki-1.0.7) (2022-04-29) - -#### Chore - diff --git a/stable/xwiki/1.0.17/CONFIG.md b/stable/xwiki/1.0.17/CONFIG.md new file mode 100644 index 00000000000..c147b7c819c --- /dev/null +++ b/stable/xwiki/1.0.17/CONFIG.md @@ -0,0 +1,7 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide. + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/xwiki/1.0.16/Chart.lock b/stable/xwiki/1.0.17/Chart.lock similarity index 85% rename from stable/xwiki/1.0.16/Chart.lock rename to stable/xwiki/1.0.17/Chart.lock index b772c05c294..0364bc439f7 100644 --- a/stable/xwiki/1.0.16/Chart.lock +++ b/stable/xwiki/1.0.17/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://charts.truecharts.org/ version: 7.0.77 digest: sha256:dfeb7589afa894b9769b687d8183007f043c7827c7ecfc24d6db87d973a99b1a -generated: "2022-05-24T07:24:11.937201386Z" +generated: "2022-05-25T06:58:17.031054837Z" diff --git a/stable/xwiki/1.0.16/Chart.yaml b/stable/xwiki/1.0.17/Chart.yaml similarity index 95% rename from stable/xwiki/1.0.16/Chart.yaml rename to stable/xwiki/1.0.17/Chart.yaml index 100b15583d8..a6897828768 100644 --- a/stable/xwiki/1.0.16/Chart.yaml +++ b/stable/xwiki/1.0.17/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "14.3.1" +appVersion: "14.4.0" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -23,7 +23,7 @@ name: xwiki sources: - https://hub.docker.com/_/xwiki - https://github.com/xwiki/xwiki-docker -version: 1.0.16 +version: 1.0.17 annotations: truecharts.org/catagories: | - productivity diff --git a/stable/xwiki/1.0.16/README.md b/stable/xwiki/1.0.17/README.md similarity index 100% rename from stable/xwiki/1.0.16/README.md rename to stable/xwiki/1.0.17/README.md diff --git a/stable/xwiki/1.0.16/app-readme.md b/stable/xwiki/1.0.17/app-readme.md similarity index 100% rename from stable/xwiki/1.0.16/app-readme.md rename to stable/xwiki/1.0.17/app-readme.md diff --git a/stable/xwiki/1.0.17/charts/common-9.3.17.tgz b/stable/xwiki/1.0.17/charts/common-9.3.17.tgz new file mode 100644 index 0000000000000000000000000000000000000000..d58e7afbc7b74ca2ac474c2873b4e4128a36ea80 GIT binary patch literal 44145 zcmV)zK#{*6iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UC_aDdQ{XC@+jd{;X~yNCXge>TQOo0#Tl3HzF(w~_zNU>LLps&DWTwkE|6p( z)|!zy8iN_<85{R{SD4QhlWs)jJx&)Wl4W`@%UF+7gnDzxIHEoMUa?{eN1`DE0xltk zlyw!T1w%9WJeK;BrZV=(Q=7p)G^&0H@g$aeLc z|9COz4o2O6r~gfB4spsMP7#&B&>Z4q3~)Ln|Cs~s5_;7FAcdm84gmmI&?HB{P(c;f z81Pkw#suND-Fx!!sP{xe2XxJbAte2x&9poHACNQTm7mY&Yx6&kky zkg(1rj1}NB1atuqB^ad~U{SCI07V&Lm=n4hgR5CYyO_B0LD%Z2T20{s4#kAz@XAQ8 z|70^b+#ii6(JtH{O@`6nXdmuP_9C<&jSi-hel+YKO?MCbyQBT#08QfE!6=>%;Xyn) zoa_zvCr8oV;bgbp7=vt)Bp@RRj#e!of1Sx6V{kfsOZXW@OmwIvq5X_0`e6ZSyeZXh zFhy6QVl~}!*bPZ;VK#u~5_&o4_PfLWaL_**>{)srK(seK><Wq>(hd9}k(xzTD zp)KTwbT;MJ!}6#+?Cy8_hP($uG>s18gV7*9gu8oi0!O3a{_a6P9`pwXeY6`5VlKV}y3&Xfm9jX&(;y132mLPY3+a<&JlLHa9`uj) zqUrExcQW1EA08aW=;#ndlfzv!+3!zx3qr=hU2=?RQWN+B-A59K+ zBQ!kh?;|)og3(d5KO7DE2hjmKItq?(srijaJ%<#-c(N&-b+u|D8@LTAtc$OOEYz?aJqLC9rh>i z5bhuBPy3_EKAghce!Lq^5Bk#>^^Xn@C$Jw4W3(F|#0Sw3_WOr}y=Z;YP3d}-kO@q3 zsvr(v3dj;sien@l3d$rwQ~Vi_sr)rvB#Br&>m~O)UD|^p%Au5FiewoOqbW|Y94BA_ zxHU05KRJH=Y7C|@VW`!LNXjWm5=1Rrl)_1Zw1P2TyDgwU#AE4eC}NQp1!9rkmES+Y z1jm3#M+yUw3Iwx+tmY`?J0ON=PEv+AAQUhTIhrmKhJ-Dn`~-Pnk8*J=dk7N%)0A+i zpp#VMk=N-tAbYm07I165#*B}_-~O)PYu5%NbEFCX3;-bg1nRB))5YcP7>vP}uNA#Z z-~=U`fK?Ul+NWDK>vrVrVm?7sFmj9-rYHs(iJ6-7363BegFy`gEwU>LV+0tdkfW=W zEc!j6;H5=|?T9|$SoK8l)_W9D1UUj*T0m_Bn8x5eNfMl1eaK?SHD3x?=ejrNCJTGRz0UO3&)XSmB~BTzv8%Swy)YD5JPik6sRl7bm#Lac)X&oP&yu0H&z z-oF;F$6&YB!k)5FGBsBVzK-xqZ8DV@!@yus9&k{5iL{q>Zh!%{KIXFF&bw$}R7#t0|gVAAkH0q9mAmM`WIpjEk zNwNZ0kk62inm85qF_Zn1_4JD~LiresMk9xy^=dIAaVsP7aX|G2ltfTPw4OPQHEBU= zgdl>xiqSP+``W8HT4BZIL3L1hi8!KjoFWEpW=Ie^pEYWFh^l}tQU-1?pMi^u|2Evz zZE?P`w$tsvF&^VI2Pl8~Amv;IKN5=nDIg`_jKtu0!3m3Cf@r}4|MwU(3F|*vP?y1} z6pN)Pz#+Xtd@L9#*A?0-nB(-lRnFj<)X#JH*?-sXTPP=IA3kuL;D5@oK0`D@DHqaQ z6g5<_s3EEq@hJxP>((r!h{iDhW>~ zFtX%+B{_@<`(1M(lejd1Ut&+!9y~6K7YBqGul$!g!7HuU%GxDy)ffxY5g(p@yD3sR zRm!mHP<+3T2tolxb3rfNWwDfHUGOf`BdAsQ4nX=}{i36O3#(ODypT&^F?WN| zk+BRC9ARm;s5iYzpkoS^Weyo0P5%I*@^4zVzv?h9ndy*T)#UQ_ItyY+J2Bpo-kh{ng+6JW&U1efo=a&DD(mzs9N>g+ymbGFLCsv`)Bpalw35iz< z0T@Msv-H$)0xQ52C#c&}$XXA<+41@L&+p#99E16)BUt2y&{%i(4V2c=5>t}OrL48g zyWm1=w%mGp2F_P0ho6m)Y211Sj<kjCKn>{L`1;@JfHTrVbwridff#iSRLi1j#R*Q|$A zp$|GSEyjFR|0n&y*EzB!W%I582rDT$GwLaSwl)vPYma`6q!WPMfJL@S9eojJ@pdg0O0 z6RuQLy|%?V;6$zeGKvYsdsC>bcd8hbGf2+?Q|94PDrd z-9a(7dKweXw9Eo?xB?V0k}MHOSwhJ5A_JJQg|h6#N*DZOr<#De$e6@MsVc$xR{SZg zqgYe6(ozCUFPqzgwq6#fZDXT)8G<%;EG(d`yKfapVZ==z_gxO7Y5fUTW23mUv7(@3HbyV%H%RDSqTlc5YtjnSQHwA{n23yfDdnu z&wm<&et&2zUziFrXu*)QmIQm7x+f&%=riv|FoP4EU@q3FWWgDZ?eg%452s?#eK(kz z&L>VafksS8riTy4uA4A7zNNoTw+?jk)&@UQ4w7>pJL#)lq{mFq#Pm|W_<@o|X5LKw zpKOt32@!^E7$Wu z5scrZ$x5{QJx-94r*3<)VPLN!=f*WC0iIrPn$00}5 z?{oX&3f1z}fl4v?6SwP__G!Q>@M;OZPjB#qe^4Ep+OhA5Uww(wp^NV4Ge!@hn$g*aJI zbTOld353O$e6KZz_*T4br&*ZU?dJ#Kb_@N9-8W%(pKSNc?_uD-H-jW*SaLk z?92sv&#bOtKQa0yjP4Tcp4mJE`aYPv$jn3i{@F9-`JN+~GJrXl2|F3g;b%Nw%mr5a z-|qHb4EFnCRVeC8HWFBZMFu9y(Tcg86)ZfXswd8<-)bp~6?!o`{?bE^E#%;4h9l)W zo?-=25bFsOayjTdvkRimU|X!OG#1j+X9dP-8skVTGG^qac}MacVdG$rtKt_wiPhsL z=|1}OJxr1bjIJ-pYjVZjrLQO@^wV!d1{39^8-Jk}fN6f$ACom6q3i1Fy|?k`sVsf)ci*j=-r> z8f-_XBe{veqi(mm?FeVND{86tDhj_jk|n zJWJ5lYXaj5Okf%zy1fI$&+qil9pgDZJ=+0qNsP`^c$ZP+_N($D1*4TKVtXs2dvyoS zC|Qb5R|JbG1u%yz>E=PdEHG7~Fc{ww2spkaTDJ;2uI`csRnwcqi_a*jNe7m8BFhjw z;A~K7(Xh^>5Y=)5IX!mH6yQv6`FC9|O0N=h&S7-D1J0zVeYt>%e(_#)#=enoarQl& z<78#LtPY5lZ=c}|Ohr*F1qXCPqNIl?N8|Ktxwj+!J93-Aa-#tJJxDv{y=_1=N2W?D z-CCdu9pwnrMnhuEyj--d6|b3@r4{mZjf|DFSR-H^IJcCsisF?5wnE5y+#x}vGJ-#^ zLnt2?$_l9^`oT#=lCJaZe33~QPN2ajvC8%d<~zb+sT7pY+ls zgEuLFVttcG&!sWALOhrIG8#p&(ueo2$gkI>9b<^e&UIsDBt`^pQ zYB$$Y2eQ{H0APlIvtuQ{bp6r&l!N{xMob^KLa|=lIKyBy98T>~3FQHHRy;Um9Kjfn zsnd=q{V9`8$kFJE5!T@xftF@YrVlYOPs|DpK z8SUq3ROV9ZuKR~}t586e8|b2g`AjpIj!R~t4vrGSd%aaCef8B6Onr6)mj+(2{{Hs& zmeXpbv8u~7u~ze9tEc6_4i%MZw%VU_$sT4-I1i0f`0lD6b8>1t+g@dR?Zy-TEiyU=vJj zh!~jTI8JULMeYcGk3XaMjrfA(rxIo4Y$8)tTa__VjZ=uG_}cw)eaKX>LIxvbLa+tG z_N;`4tRkD`mSk?I<`i&Y3M#=YLt;fN;EUh7>AWo)%a+$vA9Z{Au^2m&-j=<^HJ^!F zCYoT|Lr369797YhC>Ln6MA#UlS2+D#QIsdF10xx{FD6j?55C;G=Y^VChHHY#P`M_e^_f{X zF*l$}=0Q7B>l+844U%iifzm_p>{&q<&j{nW9(Hw_{E|;nh5C<#$&*kLDSwyVXlNNT z?O0su2$|II9UYt5O-KZj+)64Ul|eqskrDuM`&WF*S3EgpXOPdjpczWQ`u=;~JLQ9w zx*`_#vM?!~q;uduUVuS&u-ECAAgO5gGkE~s`{=mAN-Y^R>AAm@rnAn;oE1bf1t=<7 zu`y(6k~f3wESL%g+{NqjBD-|KcS2#SP*NGOE5xJXEHMI^4pW2v=&14F33H@@4OCU^ z>v2toC(Oaf90t;nT>0h@(2FNpMCx~)y_snO18x0>~;-Z0@ z30`4bP`JkQ{-ERQ^cg9bx?)B20jY2_q2?6!0?wQ)QZAJ2hx6}1jMRCAJK6CLwq;vh zwNPowH|yy`Ay;TUh@p*;Zm`mD%HDRVp+I~Ch&)eJz1Fbjdf~18xSwCu%Xa|Q9ToKJhAagMz!n2BLBhCuHLS{+^S^V+RguL85t4NfGgbQM9-_3<6bRIdBWG{n6r;3 zn(zOF?snVh#Llilf2-`g@*p{TE~V|+v0%q6L1!ONcJ!Y=p6v*Z*a2vs@zqOAceKLW z$*0_oR8}%2fM7ToY2fU~WJ`BhH6=8%SsXH%B1H7XA^p!dNu=o`*G=il=Jlc44WO2D z0?u1|K-a?mS$ZlsQOZiiO^{?UM`p$5Z)qC>yJsLi_5NL;b4jL`e1xJUvrOeR5yX^7 zCYd9hy=u|~>HN?4=bv`G&=(5=(SQ>{_p1y~%xON8r*RU76v!*QL@8jZSE^Ix`ioS0 zj8P1>95l9fKuWx-(g>AdJaRi#OqLn3{)rI!su354T0C`J-quk)H&7jXr)VLM;sEp+ zGs%)s0`Yt&A7vfJW50`;=B-Jb9VJufM8J@ZugHRSBuEE`587oIk@O!Xv$u3veDVN% z>N?2;AYhA0M+HTt%sfH9mM5k4;r#PI*Gw&J{6s9k!UrMT165%_d4Rc%{!B zcyjPqo^p9Z+*DykBJu*SzR6vgL>uzbI#wq%=OjjU&g9Pii4I}Y!>7hIM)dz^pc^^i z6^vevVMk%e%yFHLz=A0kJhWXKgZBu=KU2)nJ7KWq-M^S20F^W(Q;VbNh0rvJBxpYw+DWs}89`o@8EHaXUPclKwBGqRlK50oM3Knx0oY>Wf z(Kd!N#9+)I6;=wrK_~?uvvuvwuAMIRyLBQwPl!2}H$8S0l7+s5TvIlUs&5Y4NZPcC`Vgp!=w5ZGM z-jY^A^1GZ>s$pN$$jz^F{7*7${ErL$JmY(u7>GTk^&d(w?aP#2t^!9ZKk-c}C>b6q+`* zBP~kba+vu%`yCFj9^F6R;6C2er;Bu4weoE+_30vg;)~{d(Q-Beq){n}k`b)TVtE=h z_f-mvLZ_%TTXB#{Nz4_{;+n;kc5sRsMvC5>&lmQ5$8H%pWQ6ElM+7;*HYOoRmnBne~awoQJD8PZjLUP4dwiwsW=<{=oiyr@s&9<$o!C)5;I8M&hFenW0E}dhg(m zG_pnc9n~+<0dEJ@ZV8R;D`33c%1OC5>^q;-*4up5F}a>9_{wZpH(@PP*5Aae<}Yu5 zxg3e@xY2Vo)XtmWkbIbAef8n3?pB@$?GMbq56!;85!XRA>xWzCk83v8s_^=O)~z=j z_1`CF$-Ejss z8gIVpTv4*fdh=Ds7HO^7_Hr(H(Oi~C0DN*{tZ*9RC5{&`5hHVLZcUKcmKcX=gt{$7 zVYz{3l65kjZ&608$kd6h_ei{zFWrrxwzm`1mfzLxjdY(pdj{T7Ah!-df*E&G#ZO># zy~s+fIIrzi9G{_c_4fwt4}ZYwm$%Ou%@E8w`dvqc_iC!Y6?~y~;RL}Wk}^&qmWj}W z-ImRyFm8co;AaFDY$2}-p(rBrIZ9(0aO9+<$+HOQn(D{}0SSUj?W~izNd(JBm@Jrp z9L)%JVg!W_>8gw-FkuAXROkYEnrtQnK2uSI4A4a?me5X0P@P>k!JH>ZfVPP20Jex` zqVYF4#bS87CNLx>Ha5ic!>P7NRbLeqrzA;M@5W5KvOLIW8{k&x+- zu2ep2od#VkFKDs?6Dkj#z$r%*e3R4oo32a`Cq_i+-6&g(!Ct@LpX&{VxxBUR@CPh& zYpGFmiVg||_xo>fo>fs_hOQ$pbrc2z3@s6biI^H4u?RK^7*)87&7Bv^ARZm)R2yXp zbC2 zP^Y7~cI<`MgaY@nXnQ-IF6f^7tG`rSm8(9Pt{cqPo@(-c{o$GxZua;a9c}DfGc%#XKKlvD(Ka21$2X!y8-RsUN^0zvb6hDWT6Vo|NUtV2k9m{ zBfm$yoIH>&(zHy8TxQ|?;<11i$Cr38UDYH|ci~&N=R=4I_rmqtNDHU_g9;6gc21-E zjznqy<@XpGkCa%kVZnOF-_(&_5p^*|jHx<4?}UpcMCa?^1Y}e-;thrY6v=$%s$=q| zMeCmFbl}3umkvlt>PUei0?wDVj-l^$mrS(Su1FT7mpMS9KZD$kt1upf{-2@LN12QH zp@Hce#$>Fx3bTe;W|Cd2XzjIv z(N{Qr>x#oX@kD-jqNpIcYc;Z;>`V$AhuiHzgF+%HW2CyNoXWyGFEj>&;qGwYybWOl zy!=2WpQ^?-&wJyv;}m%I>_IZ%NWc_L$9324+#&;x*MR#Y&xiwdM}z)>;sYnWONkFs zn~r1yM#w$uRp}GJCJ7V@XEFZXU?E04RIbKINR zWEmxM4sqfbWVub2kSpc(VKbZolUO7n*LVX%t=?WT?blgL7RRQh5@>EIS=d1{>6TWJ z1$rx+$ku*5i^!pH$R5hg6zABeVz3YIUyEM9Cf8Vg5X|8RTU^+D5|VeW?3qzz0q9yj zY~725m?MEUU4%ArM1|hBT~Q#oUe_IWE~4pgHZM}d*^H<&m}Xv3vJfmFU#IqJCwb4( z4dydxbDWX*-sXnEp>A$iJRf2iVS(T00kPHZmZb2KgjdtOYhs3R1P+;id?Jc4be%mKpDlUO2{+Iui?*#N`t4E zLkCgm#AA@=*U9I1vioLAxAkrB>(|zoFE)^LX4YTXwuttEgtPTwP$9+*`^ zamqNL1{whTydFSa#sRRa0U%Cse5{WD)p>-%-Hg?*zMI9?(OuaMKo8tSgYNOTFMvHP>Ohw4D!eRgu5A3wZ9KO5lX zb=CanXh~!K{;h@X@8~J(f0!h9(Dk8bjsEZN5Bt9UAM6cAPx}8+9;yHJJ@cHd)M?Ay zb?JE))GejpRPVD;B)tG)$twK;iQ1*L_iRp}FpIT=L}yWnja#5n{lg@2)qn3>@PkTR zZ@l_2ja^e;C)WSA=h_Sf{Uxu7)(R^Cm!i4eQ!r*sEi|!yJ$E7gkwr^+{@a5Q_a+6_ z%>Th~uv?h_`@8#lPxJpV9y$Nt%b8rr3~48WNndAzP4s2ORTJ3qPt`P5cP%(6GNIFk zH}fb=uMl`HD(ryg`H7wJ3u`3gFMZ=CFI`$HXp`R-P>=*rr-{zjuPs};_pM4c=4`^b znbb~|x9dU5anx8|3cN()C4Ad%#kQi7*GDUpT0wZA{Z07SbkeAIo;_pmRmLDU^%CVi0zrG;-hE!M9>6 z$nauE5t)-?I?aZI8Ul!S=s3B|5q5GPLZxT#}h=e4oNrVu7gK4o(`7AxkQo5 zc=;n{oY0ld?Bguqo%TXy6<~Y6phRL0c{F?N3{BnObWPpYfw3AX@P@B7c!yyCD3QCW zxe&>_f((9>hyI{@w9iORq>JQrFWhLP3`;=oJFpMGBV?CvcJ=O9HQfaloW-D&_6Z;pY$e zdo}nqc7zX6VdKI&7jGIs32cYu)P6EXpN!FeA!D>`|Czw@``ZItYya(*{6GEC=*j+j zj7K`RUH|{7KE6=v{RdS>oMxVS*MEKwZ$r<&Ia1;H{mrX_*WWO2h0kAqc0B$DPRQRM zn(kbe2CqL?v=>RWT$;Q97;o%i3ze68=lb35n19X`LkrjGx- zI`CW8!zsk*=N<5zC(aNQNyy709#28n-mT|;)cx|dP{uF77BGg`UzeS~F595Z6V<60 zeFi?AOT4pgTPD$iXq( zqk7KXPq0gMMp$@%sHJ5UU(mFa<*j%dwodo9Mo#6^FBd(}wd^>xQcA2a1YvF=o;sV! zr+jEiNT@mPhb@{pUYhX|7)4AhipDQMyWIr$a+?M0rO=x}_7hs=72Ae{+j;NIU=(_% z5qeROS8ID>c20GDFL2YsyhbY)=)$l1ux=T+58z)lM67K8>C-@GB*D?@UaY`+`)|-6 z4fYE5-)J~Gc(VT<CgHX1Y;&Se zeYP|5Q9A;a)6YZ7a}MSwe7o0&@_6iW;5i2G;ON`Tr)ZX!8HvvwS3+%Pow5~9yEWxi z4S~B}3|D&Y95I+M>pdyCIqv4s1hkjXKJ~vin&HM`+gTJ-425A4? z?QT=Zs0Q#W1NSz7HOig31`OsqAaARglB}3Y&O!;^(lwzps%S9>&K8mB^;T}mH)Mkzv+tYTjll%z%95fz=vLf-n=3|bYgO}VM6{vG(J zmO>kGP%WhU=A9BRd3K4)FrbS$nP)2PkWr-_ax10gx&NGeEbG*oSFZ!6l*~(-O}u>4 zZBM%GNw+nYOi#M)Nw@uxb=#w=HqX!aTl*Z#{y%%X?XlwjcSpNL|KI-JZvV;u_ZW}# z|DB_Vq%ou`_YkNMsm76?5Evs`JQpgrf-7Bq&M`@EGgxglOE~B=M>K`WY043u%KY=r zE^y^GW4T%zbb&J?`@lQssS`~FQug9$#s0HyNKs9OXbxy{^m^(y=9g*!>gEBZv(QKs?CXJYBWQwnA>av)J)ap zsF@mTQ2TCylQ=&SIEPt1Tj$5+y46ga1IvjyiOFwndT zQYb?U%}ar2b<*W%(~O{{1R|b?5*0hr^=$-yJ^5|3`T?%Kr$H z#L*8Q^ZQNj^&p@!IRha=k~0gDL2eX~{0V2%Fo@ApSV{eRFOKI#9*c(ndU;5=|m zzE(;G10BUaLYI^?DTnFZOfXpl3`(sL0ov+fL z9p8OmVgEM8lhOYO-& zvoFm&W?jdWb*KH#4NI;&>{r8!#lwDUn6Y%&&*JbvXZ;-1OHI}t^)vO{qkaXF{&q+G zY!9AJ`rYQK)c;T|wC=+USZDtql=go{d%I8hzaHgr?0PM1%YLEC$!G3t@|=Dl!Qv+nbUN`n zav|SW2EjVO_b7{gr%3?4+;w-!1o$p}i4ydHnE>6X)F2h$LN<54K|;W0+5OgK4D4o* zaxAY7)v$y4{%onr5v&LL1`KT@PE$0hk zu@ukm*_fea#NAbTsIJR-qI{~Ai4LwQtml`JYc2+Ag$g(X=#&`7z4y-mvIKPL1@uj! zZ%B;1!!zQIy^|3>+u&F5%YwLRK=W(cJkatYVDI91i4`Xl zUgbD<8UCl&-qF#~54as_B@~9KpegrI8*G74Op+ML_EkbAFlmG5rAXF4i!1&&c}n)b z3XbnNhb4NK&e@0CtO(ZG|HDBc|Ko5l+))>M5~b_!ek+}t2}A)^pT{x2zTUUsILm}QP|J_JC;7$l+Jz6}SehU( zIWeDXy2mg2mMC2#a4&2T->xmKwAYl9xm1zfF%$=;=ijvcV5g^L;IN z_boWpxT{T#EFr6(&`NLmYOgDrXME-LUhj}L>3RWXe#36=4KKvx=kUuxqoE!+W2);Z zm2SpT{ql!Tm)NKSDz5F^=2Na1MGd-s2;D$seHi8%t?Xus=G-=DbGkrn(4Lb;%FiI5 zwL!ZhUdx+y+tGq?GH-+S(!ot*uw6&8xI71pH{T&s?d+=B#RzYxt%XxTu=>rbc2On- z0Ni%Js^M-`xz$A)Y+zzmReEB%H0g|83X-ohdVX5s=ioyv;`h*+nMc(jkKn7VQqTfy1C#a z_r1ehsQUZ2wuAmvpN96owl8kCA+Rp~=ip#ewEqYFC;R_V9=reNnFu&W5iFR?GU+En zw00w~&LS4mTwi%_zqjyQIuqKS!_a&^6(744WrSf)=n8!OI<6_m;T8D$wXI;DEs{hf zeJXe({W_T~CLP)+T2Rba!rn%oWr8HSNRQbEhUggd%}*UR-EX0EIc_=X0j0~=n5|Jd zrclxOY-%ePlKmwYO{#FmaTj@owLF$Z{m-hl=ZyK{rJ=Dd>-L%4Kap-HJYC7AdaC-A zP-n~lN|%_DR9;}SgcJ))q+PX989F%-q=~7cNqM~ko-ZXK%YDBNba?4@GVB`C$y^L1 zhYLZ@>O#+Y9J8s_AW_RG;Upr-7+jp3wIID>E}v9`7A588mCCgh?otP|I~{2mh(GUy zYFoEd2|%aSeTk{-7ZA-7sufSzV3v{~eD6tkM62!9n5v_hEncVDO~>ALFt5|6PXCk7sW| zM3G<{3=^i^EX-Vbsk|R-}W$q4S=ZI1MIky{r=7+)UNq`Vw8?6C^51| zXZbLSdPQ3U@vR|h(yvv)PfNbv+0#h=D@FZq@_)Cu{_F1zp3Z+f%46lfc4u!in~56@#un^EKr7GvC&@{rqB0oPK@{-{rTl&kukI zW^jTN%&`fWf^lr3q&nd3tBcFymv2trwl?q&I>{*ih~7cVJ@@4sbm{T%o}=l z760Yt)qTw1uRO(Wb?8?qac?;A%XZ;GqP{|E?tx>za@y2Jd~IZmSIvKug<0BvI@jq# z*?)U`gVOqc|LOkkM|rIMXLEe3@!rtqYtwu?$*ij|wmB*1?R~a{Hk_z}c9gn>qYWH#9Qp9&J%ch}tZ={~ArVYwgmL?}c5M6+A(g^Ks$u$pBjryN!T4R8tj6-Dx;sbaG>FBi9p68W|Knf%S+D=?pgxrUXK=84 zQ1bsg<^Ow}r^^51UitKx{-6Bzrwx{mVgHZ2qP>6rPsq%9VE<1}n~hKW*=2e4S--qU zqdw8+MkL5!h^($!l2S4z4>(%Re`G3dYp9cQ_-C=3{ z*B?He|9F(AHvUI3?>z z(mUP5>H-Ng*lJ{PEVIRDmHzv_5a{tuW0`b z_nz+mdX%S1{+r`KYUqJc0??+gC@iTH%s3#^;L^GU(^%Gofzw4ok}Ci66tCZ0u#!2v z0uzN5n#{Uckdr$G- zkMfkxf8KTbHy|bR-CzANwE3$)t=aqaN;TQ~^(x#g*~12b-{#Hvf1h8zdH3?e>sK4> z8VlJJv8KYqZxdH+GKluCagv?o<*1kV||LW)C*RS2y+V9@Bog(kw zeYkjaIq*sh4u;*qsN3)MdxK#+e9^TcW(8AxR>630)gAKe^7L%E=VPXt{qjYcTRMyF zFhrM%A-6*kCP)Z_QC|JI`L1udXUmbglE#(@?!>R@TQ%$#0Bku4!~X5B%XY9_7i<^% zcrU~s1&BW?P=9b6>Q{3qpNwL!y6;(CMgA92usJ* zY!d7s$|iV;QpDI9B@@|@_o8XMLuXAZ4;f9-$o_lS{2%?%U|5R(d&>X&IL`y*|0u2< zI}dd`=yO-xG>z@$Bv8@rR2a$105l$A>#{3_M;0*ge0|#w z;Nf%n-1tn_y^epw`F|%5&|3db@&51OU~m6P|3AuO^?yFO?&<*w&Ys){WIuHUc*&mdzOU_@N9lt-mc=z7(82p>-QaC-kIR5VStMkk6 zj!%Ai_4cJ#GM)1FlY6P`Uiw4&mwq~Z{rddp(~FZIy)l*{gO#q9J?U!keM}GHciC&` zci9X3UCN!jeDz-^uRpwe_44hji=W@U|LOel^z7qaiJi*u3$*|9`>Yz$Zd9OMW2&rY z=0Aih2l2=;UT&`X|6)#^4W5$yr_=r4$GLy=tc(9R*xfJ0{~h#)PwT%&d1~)}g@xN+ zVPb;t-@xo%?|wCxOcc@wXfZlnB#F5nWW5i%Q#{k~24<#q4$3K2x?{HMA7aRDBz+@( zH+;{9dnDie-YuVr@LPUSbJu?$@X))QUxVB@En!J&mH?I~s+GWk;q*$~7k+a5`W5)$ z!|8hQU*@?yBD}Cyi)HhU%*LNzm1--ov!HTff{=u2Umvn=l;UobM$;}Pz2%^-WtKLL zk2#0YOe{EGBANdUlQba3@aK*YWW{U9JSh?jfu{d&Ss&*nS$=hL)duFW#N)zTzc& zzXPk!rApc6bH6sQ_#6bEXB5vNU7hQ@{>CrBm9qz8t^h1;xY!G7RQ19(%X7HkuaFDFIIkMP;;_tvBQoD`Fy_t1VO}=`^E*(#y8TMRZ_r$s<^^dQ7=9@# z=iUn|uGY~j%&}!ymKI`E>LyW5gDlk8cB#L`rCT6EEGPx@I$92@<()QUD;!d;kpJDe zqe{-EHm49x@wM%9&P`%XOUZ)EOBOj@Wdx_3wVgm@=6rB3`MW_Axh-z?SDQBDjI(aW z9r@BeaJ^q`14o)!T)X?(R%O=fvf^8hI@RjWlYWj?;$~=hQc9j`r5;b5i@M8I0q6jE zrF5R=)B$2E>uaZTMglU89nS={p8M1eh!a<)<}g_V6Lf;iWtISxZks8HH~0Sw%ZN5l z)P>VRV7Kw-2+13*LyhImllN$e#e@w?T|5Qd9GyxOB?+8zmKb5d8W>UggD#SMYfg{A zGC+PcVtMQGrtrWZ%s9{TVU@RmyUA>wO=opexHEe8tfgHKg{;(0xkjdK{(zP0-*)aX zMd{Z5AQmsI(6F!ULLn{V<6`7gmA}0OMgS*|a}~`qv-d1%F7x{a8Q#x61h#}3023Hpqck3SFV`ah%#HcQimrk(gf7(u@`C+xRRGe( ze1fQ|o?lg4>W6396fkgOSoja(=Is446&p&P|qAGv>Gm! zLletAwNeYRTrtidyo@u=xpX4bwoMU-INfkp-|3>RZW#T>m$Bh;2h zryQfsikcggzs&OxLW@kL;RulfBOdqgQET)?GK;we>}>w zvHmxEDi5LYHOtj%eRn~67mZ(B*lwilTki7rw^I3D`(-WeeyxO5v|!jWlIvT?4=tvjk}McU z^z^K~4YpJgHS=*>Yj-Z4MYdp>Nh0$}mA5}VZC@z#<%^r7#5g@Y)J&|~TS+Mg70L6u zlzfexlD^m9`B2`>3AT26)?QOGzz`L96(^HZ(a^zv=OG^|UgwfGoxPxNI>k|b@-HWl z_bEuJK;^nNT^!G)t@<9OS7uwR>g%{lnp8onWbuwaRO<$#sv8V3A#snV>h@bzrts1? zvqKf?fvP~wAZYceiYj3^O-NEHQEU+E8S@$B^la1E?ozk2#U#OO_Lgw5xLF;?v5?Y+ zC91x9)U5|m*Er6;hjW~)T>kan`TJgh;`Nl%HLyV@|6Lrub!3xvL1D*5D1{woBg3;a zy#9(;?%k4dm%#H!cU`Bnx^>WZSaEMiyL7<2wod`h1}W-&}U1Ux}K7FOJcb{Ak?bz zS}ENskxTW*?QPph^UCRhdFAN*un#0OAymLbiYoQ#cGYL00JpW2N>IcJ9fxF_`cyGX z{LfmNRG;stk}B>9Rok()wb%7#ZPl*J8cU$kD1Vj4D$?M-&GHgy*kZzvIgARe$h2qf zwXs>2?v}lctl3c7)X5vwbV%mp!sM{;ZhlqIq3{;&?SX-9#)z-P^o8e#2_IRY&4i-2Bi7TM0^iSljM2l?g4jj8o<n zyv7anzwN)W|84)Dwhe#~lCe5OmLeuZhzhG*M>D^}1)BNM?V?884A!- zp-H$20fo{x^*slig?Wuutbq8hV2UZ@)j{qKzSvAo z-#a)Mmd^k0Kl%S3-=1I|(|}H&9N!qM61qhrZnN`Jg)Y^W&Xn`C^V! zDc^sLK9>%WZAmFse5>V{14YIO3R(VKENd=t*3SE=JGZyD>-1YM-$WJZyLHM#K9lcz z`8(Zk0hHaYmwoWo&*Dwdp8euRuwKz(+^Jy#@%kc5T+3G2w6cdUz*Zg?DGEKWjPI1? z!!Qcpic6tFX`iGOp=Sp9QnY1G(idP$X&+T+Tg4ex!mL|Txp|?a>I@&l@dhIlgIum( zK713dyd79TJl8u1YWmIyxfT!;LarAXXfFqC(6&h&+HSk;yhc0kmlIMhI_Afc7x>JU zbZtZX@cT|3O5qmKdNjf3pWyK<}BoI^X*srRZG!! z)hgRdRA&)$$E_?qxgRZ4YK&DTtpoOcHtVS>aH$+l;~gxHt-}-rsT%WYlsw*^f~=PSm&-d~sFzb;j5o|&*f zpAHLA{v%0ZFVnFT$5U0yi#TH{PfaxaKE(~dOmKq zYt@TW@>N#u`YMJ<>6K0n+Ge`n_9Klpqi$Ows5+7NrgY$II~Z4`gHB3oHo=x~32~y1 zv{ZZ-u@2C4;ALlXqKNO=S0z#bjrcf_=1q0wIjvz+>Go7?-K~Y@2 z`BRY5PQYseT^5M?-4dd6zF_<%LfHw)R*u&!*J>tyR$(Dvz00J1w^Fz_IC?~y*k(NIUO1Oh-v;xE%hI+y~I^lOmO3-$& z6KrO6e@GeS6kSItrL;CDm80x_ceJ`CX*QV3c8UU=0{ruP(prbo{;N|HHlk9fYwsi%!?&TGFI zW8bi@8;o4S*v?ABbFzBZrDR#A=|XxEiMdxJ+@6fX-}4i;|7K7afR5|zA>)7gqhTrk z`)K%-|MyWIdB@g?I;Z6xrBEj|0E{Scl6_WQ{Nr%S4WZWwfpM2*NFU&C-Ip4X=H zm3g#8#p^@XT@Jh?zUCec+2lV6PCs8lt007 z)4rLh4xqxh#e(4roES!!Wt3zT3*#mC`^j*-V)o*VdgUgP%R8lx$F{Y|!Rb|32qcwB z-1l!YG+!cmLgtyw`1kLF?%=2$@W!pBXxC5WpfQ*r4!tIWOHC#4XDGV1#9&;tx7v&x zd3MoGVXwDYm%O}u+w~OGQSx*VN|5?wVc!0!lmGez!JR#T>*RmG?El*zKIQ*;l*hII z^m*mYOh2>7Ats;6epXb=m%W37qWwSGJ$Q=$c$7!VsaKyfsPEX8M>)t;rEd{zP$`~V z!QzApsQgE7-6)FUDHSKw<6|Lfk{8nv0QCZF*|WHT&t}=6K6$Ym+m+`=@>Pjc4^r;g zRt!WhEF{ph+%Kn#GyGjuJe_9L4Iobj-lkWF?3A z<=b;n7N=M8(%tQD>vRgJ(f|sGzQdVmZjkS=z6*YWz=8=p8GsUbjcq;4s7Yrp`EIboFcbw2+VWuJMpx3 z?DZiz&on5U2Gf{?%aj`ME9IHsWz@P4qv`1~yF^rTP*rO-6M>$I4vPzUsBK5V-jdDr zoKdBub+$%0YCE^!D{wmMNF4olZkbY)B{IJL|FuE;vc0){F}*5^b#1a9M-f@1T!;iA zLF#+LygF|Sv)6Ik`USfxDVR5UhF42Yf>H?Kb`{jrPbyhrU7MrGo~LLCsM2BLoscCN zqR9$GP%wpI5~DLo$|*?_L}jX#bqr!lU#zl#BgMIoRF~6n^D)X2vYOki*n%tQW$E)5 zKVeTbV2I`4a6;>rI9+Fkiyd;X;jroY7LI+gcJoaVDMmjYcO1sY8RS0t))H+Pc|#{R3b z{~6+oyWjr2-v2WgmhwODJ>CEJI8T6O<*+-E-@R|a8$_?vJV;0c6RiSupoCdE=xmSb zo0hx`eA~+d5ej^6&R2GU)70^TlPi=WDrR0r7{8*3{gQwTGIm2~%;foTgklue!H!Xe z(io)?mM2pTm@ZELA-ySetx^s;n1?~K3jlsri zDP(!JB%I#2Ko$fUiI4MOlGm7Vl|amYuSlOCmvz6r#1XeCb@EdBQXzX@v($_OFb{JL zfL049HONk-{6wz738pELw3QtTw;XICgozzbzr06k-R5=$UDYOvM^g2wL{0U&5h0zm zMUum>qNM}4F&Ps$DO0i3Y!Q474V}uMZMN`yGA3{mq+(t($fUu~K6QgdHl;Ld!n)Nh zH6wjqKg`HseCpb5Iwr7!zkQ6>3{a8Vi(jgSUjmWSSzcJ8E|bv|RudV~GEKjfZwAC1%_}atk!_Scz+Uc;1T!w(i(BT}J?ALj zwx4}M<}2W6-c7x$^jzm``TLi0@&#AK>0YY(sx!s?b)SYYTH^KOTSFuV$Qt^nlD~5b z}%hn@U_MkEr2lP{q|@OC*S-TF0AkLDem71c^m^FUOxZ9*7l}u1Fn~I+vZRi`Q zCIx1#B^HEvi?Q}@fheNusjJc`uTf2UfJ5e)*FuA#^#)c4VCKVVGLyN=3a3}MQdTbT z-?ySNJ!~L`1wth;Y^Y`d)rnwT*c(NAG^{xDbm5@rEq~i&?irk$&AW12_a$yCAm5*; z)eVHiY(?9*5V1}pn~PU7Q3|5fd;Q=;dvD^j4DVh+VZIV81@xJNn;A-7dlu`^0Y|cWo8_wZiK^Xo0GD=G19on;yeUGKIej(g zb}@{;L2Y?^&zS-7ibXJy)1d^*;dMzd2A2r1MV2LKj#3VjA1GO53~&PE-sMbX_A%#l zeHAptpHZwUj9&nuF2Mfi(CN2it}DMp{xwF+AF94xWsCARgLSsxV%TU0r5sT)%uWw< zb2tt5pkkym5}y|aJ3y6i$6nkPN`ZTivrN2^7bS{LUD=@s0NIR@^MWDjo1p`PJ{b1F zuzc;n?NOA6=6^W*ux_TAVj&LD`0ee1LI0oUM^rmE)(xS1BJG7A_%M`r$@>YV9 zdanLqc?d2znL~~vm?SIN%E|HB<=a;mm*1VfeR+BQ>ix&llUHSReFC%NI1VV>Xu&v{ zSALeVukvfWO5q$wmETR%FDc3D+OGI+8n5`Aw;nD~W6^mBA7LC<^!UXs02FiVHi8g~ z4pel!Ard}_Dl9C?tGe&;!;8lCHfXQVSDy)LTMTy5&QFS$Cgr@!uTzk9MG0CIh5B|5 zC(TUx3Nw}W*IvPz-$k|!w!k$`<5THV$g=_YWn55OrE|wGz@R_e6VlSk$RHFqm9Xvg z3uW?GND;kQ@zKv}5!YXDk8^fwY}ZOdi;%p>EeE^pBxRlv#^0)=%N`EC%+fNWU6i2Z zG|=_-raKj@EX`a@dS<46?FpU&mL3cv?216-dtY=EMWm<6OE1?hI6Z*_+G0Akb2t_1 zOgH6sW5bqU9Jei$@~Sp8%S+yDBba#crc?9_FwxL>o+aq)<4HS+Drj>V4c^X{QJFs~ z;r)2F2Ats3GstIt0{AXN{0z}KmKSNVa|x>gkYBXDu5L+K8w_e2$6p;``PAyYat)Uw;LvPpZrmVsn}0GD~%q=pA|Ld_@*w;8W4hx8I*H_rUSVYxe)i zPAXEWlz3tWUhaVBvrM`miwy2yE0|Bqfv;cH-7DF=t0a=TOof?@E`>f+V_k;w^=m!; zYZ|t_6Fi{oOx2UI>x6vpA=V72ru;HX6bgO)wzMQNaD6h@pWyW5sA*#2$ z>)7OHwwU-I^@|)psYC$#C+oH9S!@648~}*k{v1%f{Wlowj|%y}hW*{Wr~HqP@_bQe z1TTbL2XPAQaGN85F~Di@WV>@vu-c9j;7$xQWyLvyVg3C{hJjY@0Zp$ZlksCRX|&mU`y9l%W*Ww0oO+++ zn~J^_18S=62mBDB4-~?U+Nhs-PZoN>0#)KQhr9j9Kwh5SMM+H4CKxL-W;F*v>t>k zRtw|u{ME%B;hg)wc?Gy1-oN{BR!8AmfV>ZAA;DYRL!b!8@6u%To)9j~cD7<1 z%{{4Hsv?%dZ%HbufReF(KDvDW>iFg5ySK0Z`||y}cZIQP58B~yMSZjWRypjc)WqA5 zr!P;BFF&51pMLlH)#b}qA5TwSofq0!5*+7EIl{F7<>mX+kFVZeo*bVYe|P%&^y0Jx z2_{JZXA9@ze=0}n;(y9nI(@y7E&~gd>mBfXsqXOb76vwYJVN;y`F7Rku0*gjVm-)FrR` ze(a2mZ71)M2Sd%wVjuNmE?TUrD^L$sbtjIl7@5nF3y8b#*CFnf-4t=J?s~+FVzF`x z9#%7XiDfmTpmZq%1$`!Q&LnuwdHqTE*ZlG(i_1=4@c?HRAQWg&UVZ3PW$iPSOOs_N z!qb&(u%|#w2?Ze~5xR%m{*Zs8bZL0KykD$8`r8#iGoZsn9bjMO{Nr&?UMI*jF0+Cl zpLQy^)Nf@iclyK)3bcw`gaZ9${cY%v@EVt4TV@bSS03b^5FMD=)mhoXi!W)@lrK)m zp}3CZ9GKQUAuqGjO4T~74rxjzD2%m@Ywdm80xEfo+AF-E3-tE*9GssVzkUTw&Z!v4 z`22KAR3}Br@*a%P-Yww8G36i4u3cN^v6X?oB@_2oyR9aRx}jJ(ARASizpB^{3hx~~ zzx}4s@6-9b*8e*rjAxKXvxoBk_6Pg>#r^;O?$iCRkMlh8{{O|hm+!_PMhW5w#3Z^# z6hvg65r))TnMyT{5WxQ>mJYz|X#vce1P@ql^&QUk^>4n_&FKPdw12z>*os9w0i7E# zWnG*Sj;E{c9DcrBFhnnJM7I!ou|M1!9v<3l&NiZyP{0tEyUe;;dmH@U|GO5XxetQ9 z*dGiVLezV$pFvO1y0>6dc1aC!#|&`+Rzjj{0n0B{0rK|Xg8H%JZGpN-w_MXeeCR9~ z?U)aNdciv4jRlB`%t z;p+XrZmZD-U`Ap$|DWfyv%7TX(k7SIRPkNywnh1DRXIg@jbR_kXWp%FFa}Om%I2Ey z-c%g~^P8cVNPr1s%v`=xdf9wig+((IFA_uzEbm2gIPUp|uU}iv&&^<%g|+#+wzhk= zIA!^Ekp1B)aIc8JFsKYJ2E|`S+r|eX%P=dlouU_&2ahLti%U`{- zp`P>7oU^{xm&jkE6{~6HSFlL&FW^_e2<7s|;O)YGRUWBhu7$6L<~z%s?Tj3XA8`!I zQO9|E`Ywbr(9)(!fI=?-R7oBJ-<&o=E>Jz)vjl9Jt)dc)ZRtE*r+7=cCg+9^*%gH` z3Ub3jeXHPx^4D8(LmALrxSO7+e#wR3YoITU1mBDi_V}@qY7n7PYad`D;Vk?5S@rlzf-k4ReH0^ zpj1}}qR*mskN*Gcy=!~hHr6QG&;AwIN@q_z+mcC9SHIKQ+p*KsXVS#ScGB}sr%wZs zkc2TsumogB)AaoI{oqD|AR&pglcw`T9}-Ih7uLdM-LTdIw^8K*nhyUnN^&Wpzb@!7 zh!s?PofnC*2dJD_VFa-JT13N`gM!fSl=S#CBaDQkY}$)Z zUi6FcwDaA~&1FZ#>sEiiu6uBECfds=5cTT`xH-G5M5`1}IpS4>s^xRsKucoF5@4>s zckTb({9nX@JV*fS%KsmY`!@d{4Zhs}^hrLF|BE>WGM5UI1jJ;4!~M9v3KPon?b8ge zV75{IQ*Ec(%)X+&s|P*xy14YxhN-J=b&Bo;&n)+73LxV>WiOW-E4fiMCSpiwfv#*; z;PzAoBdMqI^k^@NI{I2H3y;IY+D-hm7~PvqD(|%xTqnPlQ3(gp`g!JbPRRc1C?|2eUm$kUshc&swbmw55k2vzyN;$Tl{xg4G(8sp8ZHr6cnS~# zStkVNXbT!xm|m0cb~_bYhqN^3hI&%dTRsLtolykTzPyu~=FrpKaO;+mhALtMV0?~Z zxXF*PjA`WCxL4B%Y#&w)o~xYe4BadwrvOw=B+01kjSkQIrii`KGW^kHsbwJssK(1@wzqTJWhh8)c0?*^zlOd`(Zf zVzY))>Y>O&FnpG>eF0$$=w1a{8GWJWl*(^EO^^wq)9oBeUw~C*#j3DUq`b)L=_Qm5 ztV?xO%&IHB9R~;o44oM(8|ZIMp-2KUlEQ^>^vZ_zuREZ+n5!+=i`7zdyP&H6$RI=W zbxaZKY&r6~3rnd=?t+tQHQa?PPfjgOjn*;lLRKkBUV5vpL3JgGjU}2E`>L{N_;csN z(S6#wxOmICZmLgrP1BZ%`r^HRoX?)}|3MC*9rAxL9FOh%4{!J-|KpQ*XaI4<;5O* z%!;$W!)kGY#6DN5I0qgBAxjZ;^=%LEoMh6gxDBD5Z`3KJMe3@4nY}I466v%H`JZ`+ zc-~|AkV5;%ti1&~XqB?fInK)aOaEFbzgpJxOi(Kn;dRARSRCf%;5xEpr$&3;-UG$| zMlbOS+oyW9o#c({`Vn7s+Y^i28jt3nI+7%-?iV?ld1`d$(A7jHHFru^+;iiMrVm%3iYrOpcg&Yo3G3*(osLB%B7N_2hzD8I|~S+IWt za;=wG4vleP`#8{3saV#UZYP@x0 zTE+kMSJ_*tb@ZZqO>X3>^-r2`(E&+{`)8S)Z~AogswA0K}sSj_q198AYT_7u!MIAKoFrAZcqgHAi5K@w(R^zVcir`dQY;* zmDT<^Rb2-^c4m++J4c|?MPcVBqtq!!<8KP3b;59*qqo}7Ut$=oa00q(PBQ2&J7525 z&hc*@&`pisN;B|V2c$SzfPdx?|L6aF44{-jwx<7;LyZWaF+wTm>)#@hpt{Po7xPzy zU1o@)gw@HH*6}|M{{Jr#kK9}a?BM^yp>O+t{PCCjKR(T;hX3ojJrqEY!6YIppqYa> zh0yW=Gp!j>0K<$>3f5^P77>atquQ?^!UmhlhJUH5&P6E9f-_2P&g7Q(UH4CSog#Nj zDDxc!q62iC%nr%Y?H<4szvYCG4FS<5(CLT=Y7=-l}o(2)pO^wAWC1(5+$z<6mq%I0f*oNn2iPz3XRMBivITjR+2Wa;$~6my(QeMrNTdc$vV|&Cs^Ob-`>7 z?qAU?v>=I}=r6HM@fTxUvj!e#lz3lVp;px)As>7K1QhT(6x5@Sh=g>JyiVaSYjp5y z?LC&-B-8VGnKPuP28)moa~8E5%#~siIVgi`>;pb!B_sL=!fsz zntt}!v@JVx5ccRDhGdn-h@o;{zaz_UhCbhvWz;_wyE5=i?5{ zHSzzcUe8Z&PM@7#KR0`>C072Q^D0Tqf2I>pmV1n5y=5cU4Q8p-lW{ePw`c#!|k0Q7tL|CA_x9RHsJw$uM-b-K%CSA$~- zP9y)H3&)S=|Er^RhyTw>*n|9k3T(+BR6hw}TDAyHtz>_Tu>96uPQa=Qa1TWPH>L46 zEL)@B17jA`78tXb{yrGHe1Rs?bt~a(p#Cbk><;(V~yNoplfF$K|ZsV}@Jy=JM7(dXM$)y5E~aH>1JfvwM8D@}KCkd(_V! z_Mfip+u8xR%m3FORs4T}_oe>VC;9B<|0}9HKaLBqQZ2f%l~+LMfT{=4fM4T8ES_%h zBNmOeyAthog*WlDcfct}Tc`HgnU3(gfpqaRrWu0K26W$mTDpxtb3yXkZ=k!B=_7JN zfBWsf3||`fFX2Y({0I5b{-~cu{J*6Ga0mY%`J<7=|NH*vOZ?v_`Fvjfzmi~R?E!Ai~jAN!JTyKUR$^a3)rUpY5Y1I1pSf)x?O$PZim*syO;N^n~+LanFjHBV_p~T zxbLXD10R0}T6Q|&wsP~w@f7X@(dGHH2EBf%Jl=rq;aoI~GlR00F2*`wsR=4)5)D8# z^fB7g)2^p|J&ljko6FzG*ThHc(&cpgINjEJ9zQ$g-VNxwVEcau{+IfXpXBp-+5cjxJ;d}E0BWs%3HtXk_(kszxA_Y& zJIwxQb|H+`lW+3-5jtMS8VvET5jOfr&H({-n*m>Lu*1l%LTh7I*L1nfT;5^t3TUQE zAb%JI<7r77Fot=D4vaIBa!0TUjp8t&cmHWR2U+#bTG#^p_ z`wp*8WDPhRBhJXbS@B^Bm*_+mgA_Me9b6%{&Jq9tC36N65}{Llv!GDw#C?tjHFxeC z3yHr)dmKQ1jmj{=~h7^|;>FA*=uFywwlw~M7 zUuQU3T+3VVak98rBqaa&`Fj+uMH%S>0J^F`CrU!3Pv%#Uh0Evf(+tULw#^fJk<9b! zub@}DAeDbe%2jESoq&tP_*s%^CJUJrqkRmwKTpdH#xb8Q=@Y43JDLs^0tqCHHG^OsI!wbf#PE8W%J&7+EJ-=fVC_*(2* zaTh>kz-^4wZQiOhzj&{f9aTC`v_GQ6H#t93qgLa&s6f^i1pl40+wy>L6NUHDP>wy` zZY)W)-)A=#V(-)K#^wUHTfgfbZ_iDDtGxKO4fpWvRlQrC8`)sf+ zTk6qv)2C52WKWNvX&AEb@e~bXOYhP%KDGU~&Hfj$xev7czuM#euaR%X|NEoiIQU}! ze~Qn3_P@y+*b;#>zQk)*icTr^C(juB@ zNpIv_EFt|n+T@^$cdNaYJFT=dEZ&+aEZ}UJLZi{goI$nx&q;WTG9VH^z!h3x%Ce0* zJ_JHAgQpQnGZaFGq7$&D2$UyDUJ8G?j$`>21vsG$!RTreNA73+ z!(!j*M)LbUo3Mn{BaR^A+5u#I4wWkf7H8FT%P>{O_R$B+RPJ{VPz^r6xA5N~|CN^h zvE{!v4D9>gN5j#V`Y)g4(?I_JJvSl%WiW}j(JhyVbLp!Uq?;S%zMKIRwVXrQRg4H8 zN)iyEG$tE)(XN(sra37BRp?zeTvs=^omTji|P zS67EBe61b`B)KXHdZnwt%%_DyN!Bb~GZj|VH3G_><|=OqNfS(QUA~T`Ds^IAANUmg z0y^DJxl!dBVujB)p!3hpKRcc3HGdk?_1Wpm=iPsNdu>4khL5Zav4{o1@4M=it{6pe z)g4e;U^zJCu!?~LyqkFYp0>R9tnq@pvPM?eJeM@nf0hHEm%hg`vE_|@Uu}%K7G?pgU12uqM`v1rq+wnia;EVqM zNj{C_KQ~~hycTbbVPzlT|Zlf{EQ z06X@-?*#*U|NBGl%l`iqp9cH?2e}*ooRKwCuIr4%v2bC-#kP%~uO!v}1}?U^|E~yP z+xB=ZG*d+vN5r-V_yfq$0=@qhClTm$vw!|G`d?pvpi9^vj!xwDxj&p7{=9>#x9cJ*zrEvf$6*5lDq%R&;km!_B74V9KT1AENu2a4twBr5^n%W#G4!?kfIF4 zI6=LG-ud;<*NkN7;0ZVrOBTF6y9N=?=s|CR*|GRnqJPkv{X07r|LPx>i(~$e{z~tX z;{wnOhPUff$Ub`Tmma-O5B}1d!P|qs^w^63O)|VV_{;x)@C3YtnaGE`IDbwLdTB=f zg+g}F!x4hVvUx`Sb8lsdU%r0PTSbrF$JYJtdqY34^FR8* zm;8@U^LYZ!mM~eMm@NJ}%l>w7aPU_sViUem+E#bk^LzfF^S8eq!@nIodGZAOSbFf& zQ>~3GFk7x?LJwit8i}-DdJNN)il94~p=0ySpx5h_ARU6IeXrl|dO^28Iy~TgaqRex zJ@|`CEe4T1F_t;XF-S<#UBQ2mOf~-&zvqovw&Cn-j^Be$gd?F4&bi`;-ltNV>vTH+ zClL-IBN=%56JZ$n>|6>AA@C+LAf7sPrDRA|=VgX)}_C)5F8|t9|Mill_pW8InnPNT%k9 zc-FlC05Jn|k^!7xCaLd_no-{$xhH($pl#BYwo#e3NiA*d7&eR|u+Czk3z9Vhzr+Ai zK*XPBnx$Lm@Jq9 zGL*^F1{cah2g>`2u^N;IWt4~8QQl`a`_ugvo1P+nI@xD8E7;BUia*`5S6uo{YxTy` zZcOFIAGRCIhWd%WO+Rs|C#|#-hA8U>y})LE!6OjuHC#X*UqG^>a}rX`Tb|)8dImGZ zxe64A78#zcx$4LH?`*vgy?K-UM4|4@n|Oy7PtVYb+#&FeWbdRIO|(%9v&DLa63M&# zQNzVM+Ol|E8e4mXtvrvWy5_ZG1m2(-z20C8y-t0tExoq3X40EmBHtp&#Bz#bat~G{ zL*Vkw#rg4@i*s?PBpfJolZ4Wt@q#~lad9rm51MH;UNCi&@6zL1s&Sq@-QHI6XX{le zqU%z~!ljz^uE?UI2&fXH`7qHX%uobys)k`d{!$D>;2H+cF$`Y2VVLy%ahYd(<#7nC zeg5p~`RU&;UcCU)a{|8SyI$xkD7ow2!Hfd3W)w#VkU9SiP$d2NVj%X^x$}YWz50QW zc-M@Ce9(F*3|mt|+BO#4%)a>tm?4}jz`Z)|kY_d#w`-JI!xxQWkC;)AS6HB6o{^Ot zybP@%7N<<7X-ef-dClaW=Q-q_B+NBdt(c{F)3?T|V3+-Ff6|6s`qO5Dh_~NDa~;2w z4_edgSv315%|mN_ge1#Q$oQg=>;Z^kZWikhbdUB^xN^EjgDrH|aR~XKCEcUSTze+n zg9@*VNqAdJEZ+-ZhWJ9@k0meVW?+6Ur^cg^iNo7F$7AGL2cy>OU}UX>QF$Ho?eRFJ z;<)qXAL7~=nUX96CIqoT!^scalRt7z{;2ij4^8_>LNbZp+Gnxvfj zGXik3$PlHH=6)kb7H{vQd01=3$Oo-y4oWl+4MV2i^;@}k{K>QtL+94m4B*eUSLToZ>r1bLkTWEGLuVHKE zHME%5u*AID**X4X)JVhS?e}$f_>*D7eKXv)Zyfw_*qT2MOqZ90WR7R!6CFwOpy3)C zOb=@raU!HEhB3eiVR*h#_KO_YW`bujbPJwAty@k$Xg#oH!80&CbA3Y_Z#J+&LxvQ% z8PdQdcm}Nn&%hEq14Hom-N0{5vw9#RtOWi2h8wl-FhwP@F8bRFp@AiY28Iwa>DOyq z`j6kedV6txar*Pyi|dPLFQ5N>{`~F5+4JiY(77Wx>L`y?Lcoj5Hvm%rDa8wJq=^yn z8*Vk<&8`P75jAKnq6U_T8WpmBW1TKC7$JGwR0IGz>2ZjNL2D5aSR!Izh=>wB2ItmDa{@Fm zG({nv<4{m?wu_L!#gc>8EIF`Pa$vAz-!OcdEyjk%?|6&x8@O0<(3&L&7E2CFEV~^Q9{%a&^C!tG{@2A?7PV?4D$|^72+4`qpOYmp4n_VgL~dr z6@qE6Kd{DgXpUz)g<#lF2^zYUAdaAm=9UV zOqy-F!DQQ}b16}KYQA+uT1u2}DpBt6B8$jzGq?3%>~vdC>$AA!g9mLzdwC985!y^W z9JsQZ1O}$6RQlaOteTJ{LepU!7iZ&UkUAsa=IrcBV%yLKFc`?ZHhFb+J$#rUP_Bt_ zckmYw#t0_sR9>Ww#m1G_1%&GivkgeOfeOJ4Go70u=@qF+EW?Wh%5(s}&L?zDL9?7B z-rlr$EMN@-w+4ghHek*4%E2Jm0<56{Kj@FQ0c(g^zl52Zs}lbft1v<-6@^LovRf=e znWvVJ`<`>nyVS#WS?u}dwoC-yR1s_T&?By_M;R5D0@*ILyo57@6pj|L=2HH&>XI9g;M^;l?wDfBUR1=~Yx?MpUERaaBOd^z_$jHBw z)Hl<#gKdsjr_#}uddnl_o76jU2ql3nd1(35R(;lxLK$m0Jr0xLBJ4MLsUnpc$4NJqF?GCgUIrOPfTYYL& z)~7~geac=MI8j0-DMBf#(qk+nRKzen&EWq@udLn}x8?#Q7GjoK3>!+Hp;P*d9NN>Ut@bo3Yfqz+_T)P=^eh4g&D7ao;8bTv4((~wR(rA% z^hYJ_$z6iTBCug9=0{9hh>v` zSTd<=(&&ZP7pzktZn(+oUiv{pQ!)^yq-&iwG|>ZTqUV^hiioQp%lh-9VcQtpVOa=StH{K#Bud?3sn*1L4OfY`WtH@smD%I% zZQreojF2}c3FnDyE3;8mP9IJdt|6|M@~w+nST!w%B`I&5rsi5aC4zmb@#SOqDD zB|%9#u!qHq}&%SguLj`vNSew9GVG*{>16Gb=8c+|QjL?#icbolYHCu}p&<<8c~Adis^y zfzv4~V!k9WdIn>dgeU{2d|VXy%~Zg?+fy320-J)?flYxG*c6z7O@7zg(_h#hHFJpe zM^1-m;0kvNT82A`H^&x{6O+h251jf9Lo@sC(9FOU;}o=xaSE&$r@)MHGKth7YK1ui zl87*I6zPlI&6SNPp(K?qQX>VlKWe5H^+!&_HE=~m1+Al^0xK#iFr%WpEjJ>l`=5>r zmE=Sej_`DdTZ9*gGCo41aWI|_MshS7o#@1Z_KWoZBnvpvkA)s!5l*EV26^XzcVtJef*NmhnTVYCt^cN#BY-Z8; zL#IU(I0CqWwgFs0&r)Eg<}g(K)!eeXgBj;3YFS8&hGht@Vw@ll&A>W~DS!)SNO$0f zhzi<9L|MW3fe{gzZ3u$*rJgs%-AO9ZPOD^q>3gP%Kx4 zt=0v$tom9(&s5b!Hhw)CF14t&R%9tf!G37C^nv#3KpBnxerPx)d0RAWIldnnE`ixn zUiR%t@%BN(Ri~(RnIfx7QNKJX11B2wlhV3ykX1LRU!D{<8ugRXzFdzz8s0u=)L&mR zX?uOiq-PfmDvyRM7TsCKr|oEXr5hb5#XTb1@$g)Bo!8o~^DMj0GweEVDg%5SsMPNl zueDL*Sw@X#7&SXksh=LNwaV?4Rc_Bvxwm6dukw2BR9@wm@XMNuSLnSQmx&XXdd1ai ztGIe)#nmemSB}QWiAKHR>a|r|t@>A9p}1~Gqh6hCUHr)K3KX(q4G zgE$&4Yr<6@sbzVje4P%;xCHy*;^HIi*+?0U{(flGOPbcDg{;a#ULk3=qv2v@4@trD z?N#FK#%0V=u3N40K^ttwmfVw&3{-skvey;7MLmslz-QyTtCewb&h7Vs~tdUH4@nB@=Dh?EHD^I({Cz#QC_jI3HW$d~Azz-;thi zk2ADb!z>c_fQh@o7Ko|)e`-TUWLGZiTWw$Qre|SqZs1BCh-7^$bN}96zEbgme0@R& z?h%Mc@@FOv44!TfI|O9S0GX>R^_?Wuae{GcrDj}KYR0xwQ=y2zA0vk1jlPI%ovbN} za_WTtKHqUD5tmh!TFgnt$HPToow77;t1OMn3d-2hlPcsXnn>)3EjMpmlVqrN$281v zTJIkpJM^7#TYYC-)_2C1zEd-4@}S}_P3*`W7ru3h(YUQ*G%hPfV@ok|lqVH$InZe3 z0pl+Y%4iI?4V&UUFi8j#=|V3tWpag!^b`42Zez}k(u{ zmywShI^(#l&NwdXjAKh@+|xNYZ5AFdmC*s^s?0dqnk+3(;^kmAi^rJCa17Dg#VXCn zorrJ}e<2Vha$@-wF|W#}n}oslSj}FeXuqi|*l+Amwa0B$ZT_OAIF$5;YJiL2a-s;l zbYL&nGvhi7KF}||JG%laoMmcihmDeFro)NjTHk1$#yI3lM{}Z3#Sn^AJWHc<4WCOb zX|I)(hp(iQc=jSKZYq_pSVKqF8CN|^_k)P{uh1OIWV^qpqit0lGlm;3{Ta~$GcPtI zw;AP%0mTstIT3O`8ij{UT^Cu69X8Imt&KA-+c;y(#;Fdbs5s6ADc6Lc2&=q=Y?;?- zk@9tpVmsbN!|EHiwfaWZWjJHY;w!2Zo6GbHQI@SkCW~H(#V+o?;k?oakS&I)SjrLBQmBF}Z+J&sUBr04&4ihK5SwWAf ztIDy$vYzs`Ar|sguS9xKwr4zN%}zxlLzESvOISwyPMcL8nYs#(ClTo@i4e7jC$9AJ!R8O%09lex*(=uAb>?P_q1MVbwWiEs#UC8&5R zZ*}M5SACxop@~31@e0Q<11V$-Wyuj>OHA`V?jZ%UHI9X7&X7pzSV5dHltA8HNGJm{ z#O@JFq~0aL3vU%y&6Ln**#^LHiP0TLaY10rag-O=pI`lVkMmA&B`=iX%#t1){Czz` zS%Mg%C*a-RzVXGy&t31GXnJl)kAs5`;0mRLVn(tJ_y9z(-Usj&W!xG79}Yfrjn9YD zfBY{2@gh%$6Lg4SIykuDgMlf4;5!trz)LkOGCTC(htsQ97q4ENfSd0wuEE)Nr&l-N z;u^eqeFMIKe){SL+`Ie7LE_W9A}jE4!YnPAwlksKj2&J>f!L93(gAE&M^&178R`{`9p89IA(9@<;{0L z+^~$l^g2ZefZ#_VpqhxX1l=EpOF}3*Jm_}22d8liuJB^XC|4~}c84O+1vlj-u7ZUB zAQDjV|0Rl7UFAA>bRn>n|NGv+AC4{l9|V5?3;+KVAI`&MoH6Gt-M3;192^+y8B>sE zcm*>YZv+#LI1?5M-~*s6 z;~f73c-MJzbJlqWK7eb)Kz_9;xWOy*Z;~Jm*)Uy;yHCLf<*MaCe*H~A5Vxdm08BQu z)-DB0l!^R5ZtU`h*#=;SRFDY^e5m;SIRm=5m+Y?%H#qP z2o;_7LJ~=So!R}H?$Qz#TJ^~BfI@%)2sp5=f+mp?E|oAul!7^q5nst{4+Os@nRH{~ zWKNE9vCF`Ze04@7RKk|aHWJdFVX6zMMb=qYFm5HflvSuO@2UYieqtbeSU)N~adqGa z5MwG9(2t#N7p~c|bJR&lf;vCx6=@74?@jCxoFD+Rh1j07#}_Td5i0KD>~_}_W!(re z*o|-|2CGQ7WgsT9o|)W=5`1ZpH6ZDAqz)3K^DzP+z>E++neXN>rif$yT=^x}Nm8A{ zVrk<JDa@_es?aghh8^&pE-rloOE8gBWm z`*kWgiIf9e<(K;ff)|*9tk9ch8&OO_6$XP`_6T3{_4Rjr*SLG`$&`P|oehR6xak$V z7Z5bGJs~}V6paQo@Z^IoO8A?R4Y~(@SfT{X2wNHx2j#7`M`D~ag%C$X7Dr1n6e4a* zAP4IzqjoLNbgQU6e~+oyF6z`*O+5d_9)TNeDFO686~}y7SXeV8H)6tao`t|W9Q~Y8 z_-+ex?crpRAxihyi!cGIvEeJX`KqfMmA+on4OisNUh-0b%{#d#*)2{M=Qt}5@^Qx$ zt{kRn2?TQ!@eyiIk`yHlHD=W3Ynyfhk{`NIzKySC^@}BH9XF`6YHJA6*aLwiK zHC%H&u_$c3`C3aMTT;0|79zoucO#jd1JEt55s4hso2!=`&`Z&xc=aw#_FnRqVUjQS zx0kPSS@Kya{(0bG_byEiEwXzO!EbSl$}6&?c0lKZOVgu{KGg1Nh&<5%>s$(1Ee&ZS18O?bWp-d?`yxyk9} z$M9vrT|%BC@xu~_OR>oG+Tw3&6L+TMZrOl!^`-m)Mt@>73|&DkmQs5dMO+1z3t)!k zd`+-Sv}8o~E_W7W%br-Ag*)2XgM7ECq9+w}>zPh-#vnrQn(+j_H}+%)3e!hoVjmw@ zuHDtJkHX?X35TeV4Xu@353I*cm=4!g6TSS08@YxvR*80MC@pht;~_jE#0}{BGMFBV3oUKl`W&g4l61)?|?V& zfwwTmkzVP-rqVAR0X-umGh(hqr}H^ZFx%AZf^#&-3AfI4laM4-T!_X%wieEuAAiiy z{HNmJ;5OfbJxm0LJ`PC|qLk5N8ZJ?^j&ZW+qC4qUJLcx>BI%|i>Lw&Y$4_)$U6@2& zm@wSczbGahr#L|uVktUSmu#|iaTP#%={k-tNsL3wHolm@BJ5I{dX+Ihm0idk!6ATD zfv})w=BbwfeX$HPK0@Z{ig;~%S2lPC7iGA2qE=G>|Ij7u4@W2cDT;!@#Dg9}gJ3>} z^U=hgqi7fn=3(C-4*e0F&HZrTBN(C4G?>i#qi7ON!+tm(PJ->&h~7CybvowjJCtQy zj0xk7x6pQ`HsFd~A%LtIp&^VVCHchuRWIScaaI>a0D|vGhX2jqjkyU0PSuMFPGP2Q zT_mO($h}Z3VC@!*Y2Mba7`vMWtHuDnN5^%YRoBp<*YA0H2~GN_A5FYI8ct{Z(R4WQ zrlVnh3ZXYalVFBsQQz|h5gd&MbA+aFHVUV{j|TH0|8p?e11r6bv?a22DXB(J>EVtA zRYVdxmcW_TLW|1#hQ~!Hv|NVv__8yc{ko;nWu;`DZ3>;&I5N0JoBa4*38Ozt5Pw!U z^~$&^^{H3Hrq>-`oElHL{TLbEO?`(zE!YS$SOc$kOEeIHy9u+-EmR0=AMfatAu!C}zkvK-#j-ljY8kkL#wp$cQJ=Qg!C}PJEL@Sa|#J2QOtECAu z)+jvs@E+YBJ{4=MMn$)`-**l#N42?xK8o`yz_Ywzpss5ufr# z1XK1>m@zD6iNRkJ9P5EFhy+*WtH5}5TMu-dEszU(F`5?e6?_lWo7;e|6L<%4EY?z+ zE=up0JK|a-LyL_IZh7f~b-Ku4gh2k)trh#t7GZuk;0EPnC2y6t1-r zmeSjBttR0b)dG5*oTC^qRDHbw-2>-hiEYLrzgx7+$A&~VOCt;75-Q2ChM3!}Qs<#^sMSn%PJWaRJ0~4c zt+jL15sR;L((yaL{dCl!2xj3D(R^O?aUnQ=b*;~T=~1q{>hL&O`&D)WR&WC{L`i&y zKtf|eZr7i|3#{+w6& z;Rg`bqX zwd$>|I_JU3;#fH#x-gYVQGBYqs^Rey>F?)uFk2%1^P!@#&K>nV#7RBgJ#bS|&#pyk zo8}cK;PepO{Nn_?xj6&R4#DN=_4NgoXzkNMkge+Fko1Mxx0-M1N8 zsc!)EdU`Iz?-lW`AKs*K4ITQa2pCfD*SC4kP?o^>B4H?-!w^;N%QqCMh$yUbk|ARv zG)EjTh)4>#@398b(@~s!Z{NcVod6LEHQS`J*!k^*=8Hh%k-^hC^H!Lm`~fZ)k5)yC zLln+5XB%yx^uT2vEv8wTM3M6=-rpi7GZ^>g>p132Avb)sh)I+%oFS26!TZ5Up*ARJ zm@4L5-7IFaeL92*Ai9aBK;Dd-AHOQp1!TUJMa6W-{F%>{Hm~l3LkY{U{Ph^I@R+xx zpbJ(oO*vW@m%Md`sCtz@7d-aidlyDgS9RZIM7X993%de??mcEp@n;uGypIoaN;T7} z8Rs90gc7r5QSf3z*0OSU&TSb1?;LFMUEXEI9jfN)G>*x=b_NTdIeO1I5oX0}I&_G` z!rQzX3TD0Q0&jCzl-@Mkl*?~>XUdRG$-lp$y-4=0(_AoNH-wG z;jK2$=OXb~pZ{`m{RrSyN-_o$=Gd7!B4ej7fxoI6qn+-AqG4Na!V2Q#&l*n8M775s z?XZ6Hqo#Vx^j;hSaphsg=TF4`M|GX78Q}uCZt0({8HxEbV_+nA*6}CeYAuqnBN-JW zeDmTWf4)lPjl$G?y9NO%`@Y5RQS?2Iq8M@RPHRl#TrD74Plrj)pTUa1t6r_|qLF_i zUo$qWc@@zjyf9osoOEZ9;!p+`3Kf{lC3flsb(GFBi01g#e8Odz;Djj*k>;v=f>w~> zP(+!X36+@&ojITFV%$w=A{{hMQ4&eWGE+o!TJ%EmSe*P#`OuJeYh6B}Y!GPtiuL!D zqLgcE=&*zc$BwK;G!~&s$6e`uQ4)zj%IZi9uKlC;llY^|I>eUjqW5r>#;6yQ5XOR$ za3-sTi|qnayHuzPbsHh?PMpr`Kk9;{F2%9sqkyj-uU-m~EZL%1VdTWc;d7%fz4KbDH$_;uIskwXiDq8Q|tNKzD5#OS0 znQdh}n+~AQJIR@p%9Wy~VI`8Jrd1rAzPK6&t=jI(n^*O0Mk}!z>K~ZNR7l>X$(GI& zq%O3ca~*caj8;05$sd~F~;Z?0Zm^QLQxjDSr}!1=SD+2htT=lq&g_kptsrrl|??xfya zE5UDY%&gwq(Oad5>e;gI^~SwGA1;rA@gSJ_9t?-0{%kTI1#lJx(H!;%qyBUfjz;52 zI7hQ78V`rla5U_XhV!8}8U>T#Je-eq;G+#l9r3$$c8YLf_wHlOozv=Lz(rP%e=AU;WTUh2%^~ zWO`z3&iaZ(Tn&%ag-J%d*rNxEB_fPPVj_KTD#UH;Cf_6S&;-+t1?yP5Fvf+O$=>dz zZW`=%^>gVe>*n*EDYdqH0y`{bO;BtL5POoXgr^JVc(n1gNYZ6hJ7E+qQD~!RUt!GxRzMrQ`FoXqmg@iwshk5zvzci8L69+M&WUlbXzmL@2j@ zR207)t_@jd`Gra<8$A0T&9<|A`?$cWt4hY|qp&XTpB_5LVtX(YH$BS%QI~Je@@DlQ zTQG8SHif?K0`>AT)6x1VWMibhyr;D&@Y0Jzj;(xr|M`Wf6mD(xrz+2 zSA)=;WFe|}Hl$z>&vaa!C;%*=i*A45#z7+U+Jq&fPkJ(KFFQJPdNcS`#d+}7?pYG2 z^_6S|HH<$9ORSU&pweHI-=b_=^h$@-?~ebE z1=NH-TeI@QFft6CbMVM63B9Wwy=4eSBC@?^d26WQFAYgeay+0uu?Z<;z9Q zH`j?c;zbd7YIJ=lwxk4_tmF6yB&2#bB3F3?dq?aDh|)beRHTLi_wcW0t_}G{IkiHP z{7YBD68^q-C6@TEr`90XV^Fs#N{rFWqY zuBx(f(Yz8}by8f6ex&~V?(ztvci|C0tCVfdadxB}VMj&m=}}SUl*@a0mR*nM3a0w- z!KFt$SC7eD)Me1&%&R{W(&9QHT{F9}^ z-uuEp_;c7E209;oml%DOH%q=iKF*d|)9jHngEh_m zklKM70he%6WIe`y)IDw06w3X5^o1^M(nhAGs)kl?L6qV3l&?TJrd6`scsv%tm4zCd zM^p-!E7LixdfU;Dblw|>V!w87(WZ0K(N!QiN1aqwURiCrqHh23YSYc1{`Qlln5%9j z-0e1>h01?`*Cj$i1v*tKW}ou+b&VgipWz3@J|((+(Wn2_rzfnwLp0 zT~tLM#NR|;5zeX#gv7SDLJ?lqo)hSxL)C&2(D@#%NVe$|>kR_7O6L?jy*mBAJA;Bp zii4#MWoUJ1`pv}LDd(sLxr7Yxx71NJiE8|=3QvmvjdYG|-H`?d@a`J_8%Z3W30$NZ zOy7Yyg5s)~1)l;@U`5p>*^sq3%b+^q3JABd$kh{ofTBu`Xca$(R_+x4)^jen6Y%Rp@^Hn^zekNp(&-uf;Wc-($LhEL?VuI^y;{^F8sy8;UaZ-MoNHv@3Gm z%i+TsIiRuAtKu>zAY(9gm24EM=5OW()p7aiz3QoL0d!l$h^n_zPBWJSE8rTHhy*;! z78#CD%&PAtN1MLhdx5V06z}kh|8C}(f+S$D{h_)+U-Q8_n zS2Y39rRrM#VB|*uoQ=lbJPZf^v>$}i{yYf0a2oWzNq;^X4Flu_K0@=z4@1B2_X8Ns z{JuB$!fJuG3RZcPU51I++1v7*&gAKpZVSRZh@!}vWn3nUDg>(Hs0!Cq;rlYB#kDN< zI0j>o-U{g~cfJVu%musgdyMZ;f++2Bix7*yMDg%-+Lbuyb2IU!r<=Pld#Rs`_H}Eu z45z10_iId9!CtU5@ugQ0tC%lLmqK+>Gq%xJ%4(>WqVu}$b{2G(2^J+H>fqQ3iJjw) z)B_;+?&juFy{RLPbcq|W2Ke)1{?Bz@CE?J>tkdt*^-8USQ~Q1s@qCVvyq}%VH7z_| z)zX2b;p*v#IvLi8BJfVm&50-;@=jftCZR7$98nER7fVp=+Jag~haFtfxjDP!<45z* z5;1(DnW$}_5T?Ah`AL0cZt?}}8lfu`LA=l6%ppDQ>de7bmS@r7UhA`<)IA8Fc7+z* zKJpSRkJ+QGQ5$S6DIaB(D(31MqHFbd#|l+Y9(R2zpq16BJKJk*(h>nRP(JCp)SW)^ zsx(LH(bi-cXblmMz8*zM`|bK?UZ{VI_GtoYse6{|`d2j1QV&h^PW9rh4y&D1HO_u- zP*eo=$3F5VQ5Z#jGzz`xY(Ae3reQD+(O^Cp4@a{pLY^P==aXnM7zO@xGMYo!?+3$C zAJ(LHSO{r#Gn+x@y47ACpz7OPkyvID8{ePdB+}JsIILb+Jlk!mm+f1#n>u)^uLpqL zhOK(G)ucbIdIR=^{s6EAycXFIO{PxN3U{D*C7x|Vj;_UPu6%<0u{tBIBGLmm3FEb{ z5&>uA4yhxxNV8)YhWY7dh9bO86~lD9SuWoHgcf;*C|PG=rL3cxbs`dbE5myq5Kpa%ZjMfk=iX$%}qs@ z0a`6wl?#Bv%*^YH>7(SzFz3bL7y&6s*RkX`s(oIBLJ3JB17(jr@J!W)lRj1^GUknP zpj6~iRuVnxr273Re@&kQUlGE-&7I!*QWW7Id_{yG zQU2D%7g$qKK-Y!Yt9Dmj|8IxOIdAu{%3Zp`jfv>Tt=v`WWS3@KW&HVI+MsayEnMLk z*VLKeiYiXQTt63Et2o-1=`DF4^2O!d;E4Y_a(1$*Q`D|Sp^9q;!`q6Mf>WiI8T}aT zkHDqKIXPd$SpA^N_vF7+ae3ULJtfeOoG#{^GkIInUi;$OEUtu;ImuR1ZqozTG8x)b0p9Vp?~dgE*Zhy0v&(m4y5GGyzkJsN($eQYD4Rcp z_X&XD=IpXm^>Be$u~S8vTE2hYT)h-e#lAKUm9`PZV75SP*UBwwE*kAE=ZbXnmsq_R zfO$q%QhzRL8jB~wjqt7j_)a7l>T9T!6Tw_xnmwrixk6SOo(1dp`&}vki%Ag0lazkN zhbU4EM{8$A`g+d)gbTy9D$3`j^$gJ9YEdI>$F9-v_uM$tUF;(l zLb-D(Z)-!T=42`}?c%Z&F=28^Q&6wc7(M08b*7l>;Zcd#9)TR*QNeQ!G)}dBx78z2 zV+@wxZ+$OIzU$qfRUvz4Xe3vh?w5$qxmi3_0W7pBZQ0gz;kZ5RrV`; zQbf`6p~Z^?L~)~C0acw&Gm?^+EH>9EH;T{lf=N~M^lf~uH`-jur^ikVnH)C_zDouC zZc)QYAE+}{8^GOoYu()ZcX?x}YhFHj2}1>V`^tXp4B%xhWR85ft}B*J$%TEm!|D!001xhN$`8O-mz&u?wqdhGE7&d>{S zx8s&`k20us2OmX8^(P-z9}SK^@;7((S<_EVyiL#R^}W9DP5nV$-)aoeU_SBuNiZ2s zP&5k0)7fY~nU6>F37QY){%kNF%=-QQY~l^a$ea2z=*(EOW@7Q6*d>yd16{4*B-I6P(1PPdr>ah8}r|rw<%je7I%jdzL R{~G`R|NphR!}$Ot1OOKFJN*Cv literal 0 HcmV?d00001 diff --git a/stable/xwiki/1.0.16/charts/postgresql-7.0.77.tgz b/stable/xwiki/1.0.17/charts/postgresql-7.0.77.tgz similarity index 100% rename from stable/xwiki/1.0.16/charts/postgresql-7.0.77.tgz rename to stable/xwiki/1.0.17/charts/postgresql-7.0.77.tgz diff --git a/stable/xwiki/1.0.16/helm-values.md b/stable/xwiki/1.0.17/helm-values.md similarity index 100% rename from stable/xwiki/1.0.16/helm-values.md rename to stable/xwiki/1.0.17/helm-values.md diff --git a/stable/xwiki/1.0.16/ix_values.yaml b/stable/xwiki/1.0.17/ix_values.yaml similarity index 89% rename from stable/xwiki/1.0.16/ix_values.yaml rename to stable/xwiki/1.0.17/ix_values.yaml index a690f9b064e..62826eb604f 100644 --- a/stable/xwiki/1.0.16/ix_values.yaml +++ b/stable/xwiki/1.0.17/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/xwiki - tag: v14.3.1-postgres@sha256:6703971c36f4a11dd4e5ebc534420037f9d118c0634af2570450aca25de41069 + tag: v14.4.0-postgres@sha256:ecd70247e5abf639f692bacfb59bb7386f102297b1ce489ec12d87fef746c2a2 pullPolicy: IfNotPresent securityContext: diff --git a/stable/xwiki/1.0.16/questions.yaml b/stable/xwiki/1.0.17/questions.yaml similarity index 100% rename from stable/xwiki/1.0.16/questions.yaml rename to stable/xwiki/1.0.17/questions.yaml diff --git a/stable/xwiki/1.0.16/security.md b/stable/xwiki/1.0.17/security.md similarity index 95% rename from stable/xwiki/1.0.16/security.md rename to stable/xwiki/1.0.17/security.md index 321dcab39e0..c1090cab0d7 100644 --- a/stable/xwiki/1.0.16/security.md +++ b/stable/xwiki/1.0.17/security.md @@ -80,7 +80,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/postgresql:v14.3.0@sha256:cc117e963834a2b4f6db986b9a0d2b42009b73ce2805ea29ac9c526107c7e99e - tccr.io/truecharts/xwiki:v14.3.1-postgres@sha256:6703971c36f4a11dd4e5ebc534420037f9d118c0634af2570450aca25de41069 + tccr.io/truecharts/xwiki:v14.4.0-postgres@sha256:ecd70247e5abf639f692bacfb59bb7386f102297b1ce489ec12d87fef746c2a2 ##### Scan Results @@ -257,12 +257,12 @@ hide: | libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| @@ -558,12 +558,12 @@ hide: | libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| @@ -687,7 +687,7 @@ hide: | github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
| -#### Container: tccr.io/truecharts/xwiki:v14.3.1-postgres@sha256:6703971c36f4a11dd4e5ebc534420037f9d118c0634af2570450aca25de41069 (debian 11.3) +#### Container: tccr.io/truecharts/xwiki:v14.4.0-postgres@sha256:ecd70247e5abf639f692bacfb59bb7386f102297b1ce489ec12d87fef746c2a2 (debian 11.3) **debian** @@ -794,7 +794,7 @@ hide: | libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | liblapack3 | CVE-2021-4048 | CRITICAL | 3.9.0-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048
https://github.com/JuliaLang/julia/issues/42415
https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781
https://github.com/Reference-LAPACK/lapack/pull/625
https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c
https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41
https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7
https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/
https://nvd.nist.gov/vuln/detail/CVE-2021-4048
| -| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.57+dfsg-3 | 2.4.57+dfsg-3+deb11u1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.57+dfsg-3 | 2.4.57+dfsg-3+deb11u1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| @@ -1008,9 +1008,6 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| com.drewnoakes:metadata-extractor | CVE-2022-24613 | MEDIUM | 2.16.0 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-24613
https://github.com/advisories/GHSA-p5pg-wm9q-8v6r
https://github.com/drewnoakes/metadata-extractor/issues/561
https://nvd.nist.gov/vuln/detail/CVE-2022-24613
| -| com.drewnoakes:metadata-extractor | CVE-2022-24614 | MEDIUM | 2.16.0 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-24614
https://github.com/advisories/GHSA-4v6p-cxf9-98rf
https://github.com/drewnoakes/metadata-extractor/issues/561
https://nvd.nist.gov/vuln/detail/CVE-2022-24614
| -| com.fasterxml.jackson.core:jackson-databind | CVE-2020-36518 | HIGH | 2.13.2 | 2.12.6.1, 2.13.2.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-36518
https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b
https://github.com/FasterXML/jackson-databind/issues/2816
https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12
https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13
https://github.com/advisories/GHSA-57j2-w4cx-62h2
https://lists.debian.org/debian-lts-announce/2022/05/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36518
https://security.netapp.com/advisory/ntap-20220506-0004/
https://www.oracle.com/security-alerts/cpuapr2022.html
| | com.fasterxml.jackson.core:jackson-databind | CVE-2017-15095 | CRITICAL | 2.4.0 | 2.7.9.2, 2.8.10, 2.9.1 |
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103880
http://www.securitytracker.com/id/1039769
https://access.redhat.com/errata/RHSA-2017:3189
https://access.redhat.com/errata/RHSA-2017:3190
https://access.redhat.com/errata/RHSA-2018:0342
https://access.redhat.com/errata/RHSA-2018:0478
https://access.redhat.com/errata/RHSA-2018:0479
https://access.redhat.com/errata/RHSA-2018:0480
https://access.redhat.com/errata/RHSA-2018:0481
https://access.redhat.com/errata/RHSA-2018:0576
https://access.redhat.com/errata/RHSA-2018:0577
https://access.redhat.com/errata/RHSA-2018:1447
https://access.redhat.com/errata/RHSA-2018:1448
https://access.redhat.com/errata/RHSA-2018:1449
https://access.redhat.com/errata/RHSA-2018:1450
https://access.redhat.com/errata/RHSA-2018:1451
https://access.redhat.com/errata/RHSA-2018:2927
https://access.redhat.com/errata/RHSA-2019:2858
https://access.redhat.com/errata/RHSA-2019:3149
https://access.redhat.com/errata/RHSA-2019:3892
https://access.redhat.com/security/cve/CVE-2017-15095
https://access.redhat.com/solutions/3442891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15095
https://github.com/FasterXML/jackson-databind/blob/7093008aa2afe8068e120df850189ae072dfa1b2/src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializerFactory.java#L43
https://github.com/FasterXML/jackson-databind/commit/3bfbb835
https://github.com/FasterXML/jackson-databind/commit/ddfddfba
https://github.com/FasterXML/jackson-databind/commit/e8f043d1
https://github.com/FasterXML/jackson-databind/issues/1680
https://github.com/FasterXML/jackson-databind/issues/1723
https://github.com/FasterXML/jackson-databind/issues/1737
https://github.com/advisories/GHSA-h592-38cm-4ggp
https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629@%3Csolr-user.lucene.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html
https://nvd.nist.gov/vuln/detail/CVE-2017-15095
https://security.netapp.com/advisory/ntap-20171214-0003/
https://ubuntu.com/security/notices/USN-4741-1
https://www.debian.org/security/2017/dsa-4037
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
| | com.fasterxml.jackson.core:jackson-databind | CVE-2018-11307 | CRITICAL | 2.4.0 | 2.7.9.4, 2.8.11.2, 2.9.6 |
Expand...https://access.redhat.com/errata/RHSA-2019:0782
https://access.redhat.com/errata/RHSA-2019:1822
https://access.redhat.com/errata/RHSA-2019:1823
https://access.redhat.com/errata/RHSA-2019:2804
https://access.redhat.com/errata/RHSA-2019:2858
https://access.redhat.com/errata/RHSA-2019:3002
https://access.redhat.com/errata/RHSA-2019:3140
https://access.redhat.com/errata/RHSA-2019:3149
https://access.redhat.com/errata/RHSA-2019:3892
https://access.redhat.com/errata/RHSA-2019:4037
https://access.redhat.com/security/cve/CVE-2018-11307
https://github.com/FasterXML/jackson-databind/issues/2032
https://github.com/advisories/GHSA-qr7j-h6gg-jmgc
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
https://nvd.nist.gov/vuln/detail/CVE-2017-7525
https://nvd.nist.gov/vuln/detail/CVE-2018-11307
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
| | com.fasterxml.jackson.core:jackson-databind | CVE-2018-14718 | CRITICAL | 2.4.0 | 2.6.7.2, 2.9.7 |
Expand...http://www.securityfocus.com/bid/106601
https://access.redhat.com/errata/RHBA-2019:0959
https://access.redhat.com/errata/RHSA-2019:0782
https://access.redhat.com/errata/RHSA-2019:0877
https://access.redhat.com/errata/RHSA-2019:1782
https://access.redhat.com/errata/RHSA-2019:1797
https://access.redhat.com/errata/RHSA-2019:1822
https://access.redhat.com/errata/RHSA-2019:1823
https://access.redhat.com/errata/RHSA-2019:2804
https://access.redhat.com/errata/RHSA-2019:2858
https://access.redhat.com/errata/RHSA-2019:3002
https://access.redhat.com/errata/RHSA-2019:3140
https://access.redhat.com/errata/RHSA-2019:3149
https://access.redhat.com/errata/RHSA-2019:3892
https://access.redhat.com/errata/RHSA-2019:4037
https://access.redhat.com/security/cve/CVE-2018-14718
https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44
https://github.com/FasterXML/jackson-databind/issues/2097
https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7
https://github.com/advisories/GHSA-645p-88qh-w398
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/6a78f88716c3c57aa74ec05764a37ab3874769a347805903b393b286@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/82b01bfb6787097427ce97cec6a7127e93718bc05d1efd5eaffc228f@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/ba973114605d936be276ee6ce09dfbdbf78aa56f6cdc6e79bfa7b8df@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2018-14718
https://seclists.org/bugtraq/2019/May/68
https://security.netapp.com/advisory/ntap-20190530-0003/
https://www.debian.org/security/2019/dsa-4452
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| @@ -1048,21 +1045,19 @@ hide: | org.apache.calcite:calcite-core | CVE-2020-13955 | MEDIUM | 1.18.0 | 1.26.0 |
Expand...https://github.com/advisories/GHSA-hxp5-8pgq-mgv9
https://github.com/apache/calcite/commit/43eeafcbac29d02c72bd520c003cdfc571de2d15
https://issues.apache.org/jira/browse/CALCITE-4298
https://lists.apache.org/thread.html/r0b0fbe2038388175951ce1028182d980f9e9a7328be13d52dab70bb3%40%3Cdev.calcite.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-13955
| | org.apache.hadoop:hadoop-common | CVE-2022-26612 | CRITICAL | 3.2.0 | 3.2.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-26612
https://github.com/advisories/GHSA-gx2c-fvhc-ph4j
https://lists.apache.org/thread/hslo7wzw2449gv1jyjk8g6ttd7935fyz
https://nvd.nist.gov/vuln/detail/CVE-2022-26612
https://security.netapp.com/advisory/ntap-20220519-0004/
| | org.apache.hadoop:hadoop-common | CVE-2020-9492 | HIGH | 3.2.0 | 2.10.1, 2.10.1, 3.2.2, 3.2.2 |
Expand...https://access.redhat.com/security/cve/CVE-2020-9492
https://github.com/advisories/GHSA-f8vc-wfc8-hxqh
https://github.com/apache/hadoop/commit/ca65409836d2949e9a9408d40bec0177b414cd5d
https://hadoop.apache.org/cve_list.html
https://lists.apache.org/thread.html/r0a534f1cde7555f7208e9f9b791c1ab396d215eaaef283b3a9153429@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r49c9ab444ab1107c6a8be8a0d66602dec32a16d96c2631fec8d309fb@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r4a57de5215494c35c8304cf114be75d42df7abc6c0c54bf163c3e370@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r513758942356ccd0d14538ba18a09903fc72716d74be1cb727ea91ff%40%3Cgeneral.hadoop.apache.org%3E
https://lists.apache.org/thread.html/r6341f2a468ced8872a71997aa1786ce036242413484f0fa68dc9ca02@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r6c2fa7949738e9d39606f1d7cd890c93a2633e3357c9aeaf886ea9a6@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r79201a209df9a4e7f761e537434131b4e39eabec4369a7d668904df4@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r79323adac584edab99fd5e4b52a013844b784a5d4b600da0662b33d6@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r9328eb49305e4cacc80e182bfd8a2efd8e640d940e24f5bfd7d5cb26@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r941e9be04efe0f455d20aeac88516c0848decd7e7b1d93d5687060f4@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rb12afaa421d483863c4175e42e5dbd0673917a3cff73f3fca4f8275f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rc0057ebf32b646ab47f7f5744a8948332e015c39044cbb9d87ea76cd@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rca4516b00b55b347905df45e5d0432186248223f30497db87aba8710@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/re4129c6b9e0410848bbd3761187ce9c19bc1cd491037b253007df99e@%3Cissues.solr.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-9492
https://security.netapp.com/advisory/ntap-20210304-0001/
https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEHADOOP-1065272
| -| org.apache.poi:poi | CVE-2022-26336 | MEDIUM | 5.2.0 | 5.2.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-26336
https://github.com/advisories/GHSA-mqvp-7rrg-9jxc
https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j
https://nvd.nist.gov/vuln/detail/CVE-2022-26336
| -| org.apache.poi:poi-scratchpad | CVE-2022-26336 | MEDIUM | 5.2.0 | 5.2.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-26336
https://github.com/advisories/GHSA-mqvp-7rrg-9jxc
https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j
https://nvd.nist.gov/vuln/detail/CVE-2022-26336
| | org.apache.solr:solr-core | CVE-2021-27905 | CRITICAL | 8.8.0 | 8.8.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-27905
https://github.com/advisories/GHSA-5phw-3jrp-3vj8
https://lists.apache.org/thread.html/r0ddc3a82bd7523b1453cb7a5e09eb5559517145425074a42eb326b10%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E
https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E
https://lists.apache.org/thread.html/r6ccec7fc54d82591b23c143f1f6a6e38f6e03e75db70870e4cb14a1a@%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r720a4a0497fc90bad5feec8aa18b777912ee15c7eeb5f882adbf523e@%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r78a3a4f1138a1608b0c6d4a2ee7647848c1a20b0d5c652cd9b02c25a@%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r8f1152a43c36d878bbeb5a92f261e9efaf3af313b033d7acfccea59d@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E
https://lists.apache.org/thread.html/rae9ccaecce9859f709ed1458545d90a4c07163070dc98b5e9e59057f@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd232d77c57a8ce172359ab098df9512d8b37373ab87c444be911b430@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/re9d64bb8e5dfefddcbf255adb4559e13a0df5b818da1b9b51329723f@%3Cnotifications.ofbiz.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-27905
https://security.netapp.com/advisory/ntap-20210611-0009/
| | org.apache.solr:solr-core | CVE-2021-29943 | CRITICAL | 8.8.0 | 8.8.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-29943
https://github.com/advisories/GHSA-vf7p-j8x6-xvwp
https://lists.apache.org/thread.html/r91dd0ff556e0c9aab4c92852e0e540c59d4633718ce12881558cf44d%40%3Cusers.solr.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-29943
https://security.netapp.com/advisory/ntap-20210604-0009/
| | org.apache.solr:solr-core | CVE-2021-44548 | CRITICAL | 8.8.0 | 8.11.1 |
Expand...https://github.com/advisories/GHSA-pccr-q7v9-5f27
https://nvd.nist.gov/vuln/detail/CVE-2021-44548
https://security.netapp.com/advisory/ntap-20220114-0005/
https://solr.apache.org/security.html#cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandler
| | org.apache.solr:solr-core | CVE-2021-29262 | HIGH | 8.8.0 | 8.8.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-29262
https://github.com/advisories/GHSA-jgcr-fg3g-qvw8
https://issues.apache.org/jira/browse/SOLR-15249
https://lists.apache.org/thread.html/r1171f6417eeb6d5e1206d53e2b2ff2d6ee14026f8b595ef7d8a33b79@%3Coak-issues.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/r1e92a2eff6c47a65c4a6e95e809a9707181de76f8062403a0bea1012@%3Coak-issues.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/r51b29ff62060b67bc9999ded5e252b36b09311fe5a02d27f6de3e4d3@%3Coak-issues.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/r536da4c4e4e406f7843461cc754a3d0a3fe575aa576e2b71a9cd57d0%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r7151081abab92a827a607205c4260b0a3d22280b52d15bc909177608@%3Coak-issues.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/r8d35eeb9a470d2682b5bcf3be0b8942faa7e28f9ca5861c058d17fff@%3Coak-issues.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/r9c4ce6903218c92ef2583070e64af5a69e483821c4b3016dc41e3c6f@%3Coak-issues.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/rb6db683903174eaa44ec80cc118a38574319b0d4181f36b61ee6278f@%3Cdev.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/rbc680cbfd745f22d182158217428a296e8e398cde16f3f428fe4bddc@%3Coak-issues.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/rd85f87e559ee27e9c69795e3ad93a77621895e0328ea3df41d711d72@%3Coak-commits.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/ref84e60192f4bdc3206b247f260513e8d4e71f3e200792f75386d07a@%3Cdev.jackrabbit.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-29262
https://security.netapp.com/advisory/ntap-20210604-0009/
| | org.apache.solr:solr-core | CVE-2020-27223 | MEDIUM | 8.8.0 | 8.8.2 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27223
https://bugs.eclipse.org/bugs/show_bug.cgi?id=571128
https://github.com/advisories/GHSA-m394-8rww-3jr7
https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7
https://lists.apache.org/thread.html/r068dfd35ce2193f6af28b74ff29ab148c2b2cacb235995576f5bea78@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r07aedcb1ece62969c406cb84c8f0e22cec7e42cdc272f3176e473320@%3Cusers.solr.apache.org%3E
https://lists.apache.org/thread.html/r0b639bd9bfaea265022125d18acd2fc6456044b76609ec74772c9567@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0c6eced465950743f3041b03767a32b2e98d19731bd72277fc7ea428@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0cdab13815fc419805a332278c8d27e354e78560944fc36db0bdc760@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0e25cdf3722a24c53049d37396f0da8502cb4b7cdc481650dc601dbc@%3Cgitbox.activemq.apache.org%3E
https://lists.apache.org/thread.html/r105f4e52feb051faeb9141ef78f909aaf5129d6ed1fc52e099c79463@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r1414ab2b3f4bb4c0e736caff6dc8d15f93f6264f0cca5c47710d7bb3@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r1b7ed296a865e3f1337a96ee9cd51f6d154d881a30da36020ca72a4b@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r1b803e6ebdac5f670708878fb1b27cd7a0ce9d774a60e797e58cee6f@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r26d9196f4d2afb9bec2784bcb6fc183aca82e4119bf41bdc613eec01@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r27ad7843d060762cc942820566eeaa9639f75371afedf8124b943283@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r2c2c7b2971360fb946bbf062c58d7245927dd1ce9150fc9987f65409@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r35ab810c0f3016b3fd3a3fa9088a2d2781b354a810780ce74d022b6c@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r409ee2bae66bfff6aa89e6c74aff535e6248260d3afcb42bfb3b316b@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r463b12b27264c5e1e3c48c8c2cc5d33813d2f0d981102548fb3102fb@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r492cff8488a7f6eb96700afb5d137b719ddb80a833e77f971d2691c6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r4a456d89a83752a012d88a60ff4b21def6c9f650b9e69ea9fa11c9f9@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r4c92ea39167c0f7b096ae8268db496b5451d69606f0304b7c8a994c7@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r51f8975ef47c12a46fbfd7da9efea7f08e1d307fe1dc3042514659ae@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r521a077885ce79c44a799118c878589e81e525cab72d368e5cfb6f61@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r5612dc69e1f79c421faf9764ffbc92591e2a69ea417c04cba57f49ea@%3Cuser.karaf.apache.org%3E
https://lists.apache.org/thread.html/r562a0cbc5c8cac4d000a27b2854a8ab1b924aa9dd45f8ffbea98e5ad@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5b7cc6ac733e0b35816751cf45d152ae246a3f40e0b1e62b101c9522@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r601f15f3de7ae3a7bbcd780c19155075c56443c2cdc1d193c03b4182@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r65c714241b9d064a44fec10d60ebf5a37d5ebadd6bf88b0eed13ade0@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r734f996149bb9b1796740385fcbdf3e093eb9aabedc0f20a48ea1d68@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r75ee2a529edb892ac59110cb3f6f91844a932c5034e16c8317f5668d@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7f4ad5eec0bce2821c308bb23cac53df5c94eb84de1c58de9b95c176@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7fbdb7880be1566f943d80fbbeefde2115c086eba1bef3115350a388@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7ffd050d3bd7c90d95f4933560b5f4f15971ab9a5f5322fdce116243@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r857b31ad16c6e76002bc6cca73c83358ed2595477e288286ee82c48d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r897a6a14d03eab09e89b809d2a650f3765065201da5bc3db9a4dd6e8@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8b1963f16d6cb1230ca7ee73b6ec4f5c48f344191dbb1caabd265ee4@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8dc1b13b80d39fbf4a9d158850e15cd868f0460c2f364f13dca7050b@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra2f529da674f25a7351543544f7d621b5227c49a0745913b1194d11e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/ra384892bab8c03a60613a6a9d5e9cae0a2b800fd882792a55520115e@%3Ccommits.kafka.apache.org%3E
https://lists.apache.org/thread.html/ra40a88a2301a3da86e25b501ff4bc88124f2b816c2917d5f3497f8f0@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra47a26c008487b0a739a368c846e168de06c3cd118d31ecedafa679a@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/raa6d60b00b67c0550672b4f506f0df75b323dcd25cf574e91e2f2dff@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb79b62ac3085e05656e41865f5a7efcbdc7dcd7843abed9c5fe0fef8@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc052fd4e9e9c01bead74c0b5680355ea5dc3b72d46f253cb65d03e43@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rc721fe2910533bffb6bd4d69ea8ff4f36066d260dbcd2d14e041614a@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rd666e187ebea2fda8624683ab51e2a5ad2108f762d21bf1a383d7502@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rdd6c47321db1bfe12c68a898765bf3b6f97e2afa6a501254ed4feaed@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/re03a4dbc15df6f390a2f8c0a071c31c8324dbef007e59fdc2592091a@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/re19fa47ec901cc3cf6d7784027198e8113f8bc2dbfd6c9d6d13f5447@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re3bd4f831f9be49871cb6adb997289b5dbcd6fe4bc5cb08223254080@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/re43768896273c0b5f1a03d7f0a9d370852074489d51825fdc0d77f0f@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E
https://lists.apache.org/thread.html/reb3c6dc050c7ee18ea154cd94dba85d99aa6b02b84c4bb2138a4abf2@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/reca91f217f9e1ce607ce6e19a1c0b3db82b5b1b58cf39a84d6434695@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf190d1d28e1367d1664ef6bc2f71227566d7b6b39209817a5364da1f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rf6c2efa3137bc8c22707e550a1f9b80f74bca62b9c8a6f768f2c6b86@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf77f4c4583669f1133d58cc4f1964367e253818ed8db986bb2732f7c@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rff630ce92a4d1bb494fc1a3f9b57a3d60819b436505bcd8c6ccc713c@%3Ccommits.kafka.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-27223
https://security.netapp.com/advisory/ntap-20210401-0005/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com/security-alerts/cpuApr2021.html
| | org.apache.solr:solr-core | CVE-2021-28163 | LOW | 8.8.0 | 8.8.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-28163
https://github.com/advisories/GHSA-j6qj-j888-vvgq
https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq
https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r787e47297a614b05b99d01b04c8a1d6c0cafb480c9cb7c624a6b8fc3@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E
https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5CXQIJVYU4R3JL6LSPXQ5GIV7WLLA7PI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGNKXBNRRCZTGGXPIX3VBWCF2SAM3DWS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAAKW7S66TECXGJZWB3ZFGOQAK34IYHF/
https://nvd.nist.gov/vuln/detail/CVE-2021-28163
https://security.netapp.com/advisory/ntap-20210611-0006/
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| org.eclipse.jetty:jetty-client | CVE-2020-27216 | HIGH | 9.4.29.v20200521 | 9.3.29.v20201019, 9.4.32.v20200930, 11.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27216
https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921
https://cwe.mitre.org/data/definitions/378.html
https://cwe.mitre.org/data/definitions/379.html
https://github.com/advisories/GHSA-g3wg-6mcf-8jj6
https://github.com/eclipse/jetty.project/issues/5451
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6#advisory-comment-63053
https://github.com/github/codeql/pull/4473
https://lists.apache.org/thread.html/r0259b14ae69b87821e27fed1f5333ea86018294fd31aab16b1fac84e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r07525dc424ed69b3919618599e762f9ac03791490ca9d724f2241442@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r09b345099b4f88d2bed7f195a96145849243fb4e53661aa3bcf4c176@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0d7ad4f02c44d5d53a9ffcbca7ff4a8138241322da9c5c35b5429630@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r0d95e01f52667f44835c40f6dea72bb4397f33cd70a564ea74f3836d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r0df8fe10fc36028cf6d0381ab66510917d0d68bc5ef7042001d03830@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0e9efe032cc65433251ee6470c66c334d4e7db9101e24cf91a3961f2@%3Ccommits.directory.apache.org%3E
https://lists.apache.org/thread.html/r0f5e9b93133ef3aaf31484bc3e15cc4b85f8af0fe4de2dacd9379d72@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r100c5c7586a23a19fdb54d8a32e17cd0944bdaa46277b35c397056f6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r171846414347ec5fed38241a9f8a009bd2c89d902154c6102b1fb39a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r185d10aae8161c08726f3ba9a1f1c47dfb97624ea6212fa217173204@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r18b6f10d9939419bae9c225d5058c97533cb376c9d6d0a0733ddd48d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r19e8b338af511641d211ff45c43646fe1ae19dc9897d69939c09cabe@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1d40368a309f9d835dcdd900249966e4fcbdf98c1cc4c84db2cd9964@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1d45051310b11c6d6476f20d71b08ea97cb76846cbf61d196bac1c3f@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1dbb87c9255ecefadd8de514fa1d35c1d493c0527d7672cf40505d04@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1ed79516bd6d248ea9f0e704dbfd7de740d5a75b71c7be8699fec824@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1ef28b89ff0281c87ba3a7659058789bf28a99b8074191f1c3678db8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1fe31643fc34b4a33ae3d416d92c271aa97663f1782767d25e1d9ff8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2122537d3f9beb0ce59f44371a951b226406719919656ed000984bd0@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r279254a1bd6434c943da52000476f307e62b6910755387aeca1ec9a1@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2aa316d008dab9ae48350b330d15dc1b863ea2a933558fbfc42b91a6@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2d17b2a4803096ba427f3575599ea29b55f5cf9dbc1f12ba044cae1a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2e02700f7cfecb213de50be83e066086bea90278cd753db7fdc2ccff@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2f732ee49d00610683ab5ddb4692ab25136b00bfd132ca3a590218a9@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3042a9dd2973aa229e52d022df7813e4d74b67df73bfa6d97bb0caf8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r336b1694a01858111e4625fb9ab2b07ad43a64a525cf6402e06aa6bf@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r351298dd39fc1ab63303be94b0c0d08acd72b17448e0346d7386189b@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E
https://lists.apache.org/thread.html/r382870d6ccfd60533eb0d980688261723ed8a0704dafa691c4e9aa68@%3Ccommits.iotdb.apache.org%3E
https://lists.apache.org/thread.html/r3a763de620be72b6d74f46ec4bf39c9f35f8a0b39993212c0ac778ec@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r3b0ce1549a1ccdd7e51ec66daf8d54d46f1571edbda88ed09c96d7da@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3e05ab0922876e74fea975d70af82b98580f4c14ba643c4f8a9e3a94@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3f32cb4965239399c22497a0aabb015b28b2372d4897185a6ef0ccd7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r407c316f6113dfc76f7bb3cb1693f08274c521064a92e5214197548e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4179c71908778cc0598ee8ee1eaed9b88fc5483c65373f45e087f650@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r44115ebfbf3b7d294d7a75f2d30bcc822dab186ebbcc2dce11915ca9@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4946ffd86ad6eb7cb7863311235c914cb41232380de8d9dcdb3c115c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4f29fb24639ebc5d15fc477656ebc2b3aa00fcfbe197000009c26b40@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r503045a75f4419d083cb63ac89e765d6fb8b10c7dacc0c54fce07cff@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/r547bb14c88c5da2588d853ed3030be0109efa537dd797877dff14afd@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5494fdaf4a0a42a15c49841ba7ae577d466d09239ee1050458da0f29@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r556787f1ab14da034d79dfff0c123c05877bbe89ef163fd359b4564c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r568d354961fa88f206dc345411fb11d245c6dc1a8da3e80187fc6706@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r58f5b14dc5ae43583db3a7e872419aca97ebe47bcd7f7334f4128016@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r59e0878013d329dcc481eeafebdb0ee445b1e2852d0c4827b1ddaff2@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5a07f274f355c914054c7357ad6d3456ffaca064f26cd780acb90a9a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5a9462096c71593e771602beb0e69357adb5175d9a5c18d5181e0ab4@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6236ae4adc401e3b2f2575c22865f2f6c6ea9ff1d7b264b40d9602af@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r66e99d973fd79ddbcb3fbdb24f4767fe9b911f5b0abb05d7b6f65801@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r6b83ca85c8f9a6794b1f85bc70d1385ed7bc1ad07750d0977537154a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6dfa64ecc3d67c1a71c08bfa04064549179d499f8e20a8285c57bd51@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6f51a654ac2e67e3d1c65a8957cbbb127c3f15b64b4fcd626df03633@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r70f8bcccd304bd66c1aca657dbfc2bf11f73add9032571b01f1f733d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r71da5f51ef04cb95abae560425dce9667740cbd567920f516f76efb7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r73b5a9b677b707bbb7c1469ea746312c47838b312603bada9e382bba@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r761a52f1e214efec286ee80045d0012e955eebaa72395ad62cccbcfc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r769411eb43dd9ef77665700deb7fc491fc3ceb532914260c90b56f2f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r77dd041d8025a869156481d2268c67ad17121f64e31f9b4a1a220145@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r7bdc83513c12db1827b79b8d57a7a0975a25d28bc6c5efe590ec1e02@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r7da5ae60d7973e8894cfe92f49ecb5b47417eefab4c77cc87514d3cf@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r8045eedd6bb74efcd8e01130796adbab98ee4a0d1273509fb1f2077a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r819857361f5a156e90d6d06ccf6c41026bc99030d60d0804be3a9957@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r827d17bf6900eddc686f4b6ee16fc5e52ca0070f8df7612222c40ac5@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r874688141495df766e62be095f1dfb0bf4a24ca0340d8e0215c03fab@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r87b0c69fef09277333a7e1716926d1f237d462e143a335854ddd922f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r87d8337300a635d66f0bb838bf635cdfcbba6b92c608a7813adbf4f4@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8866f0cd2a3b319288b7eea20ac137b9f260c813d10ee2db88b65d32@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8cacf91ae1b17cc6531d20953c52fa52f6fd3191deb3383446086ab7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8dd01541fc49d24ec223365a9974231cbd7378b749247a89b0a52210@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8fead0144bb84d8714695c43607dca9c5101aa028a431ec695882fe5@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r90b5ac6e2bf190a5297bda58c7ec76d01cd86ff050b2470fcd9f4b35@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r911c1879258ebf98bca172c0673350eb7ea6569ca1735888d4cb7adc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r916b6542bd5b15a8a7ff8fc14a0e0331e8e3e9d682f22768ae71d775@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r93b240be16e642579ed794325bae31b040e1af896ecc12466642e19d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r93d5e81e879120d8d87925dbdd4045cb3afa9b066f4370f60b626ce3@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r9b790fe3a93121199f41258474222f15002b2f729495aa7ecbf90718@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9c010b79140452294292379183e7fe8e3533c5bb4db3f3fb39a6df61@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9cc76b98f87738791b8ec3736755f92444d3c8cb26bd4e4ffdb5c1cc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9cd444f944241dc26d9b8b007fe8971ed7f005b56befef7a4f4fb827@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9d9b4b93df7f92cdf1147db0fc169be1776c93d1fbc63bc65721fffd@%3Cdev.knox.apache.org%3E
https://lists.apache.org/thread.html/r9f8c45a2a4540911cd8bd0485f67e8091883c9234d7a3aeb349c46c1@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/ra1f19625cc67ac1b459c558f2ea5647d71ce51c6fe4f4cb03baec849@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra55e04d5a73afcb8383f4386e2b26832c6e3972e53827021ab885943@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/ra5b7313d8cc9411db6790adfba33f2cf0665cb77adb7b02043c95867@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/raa9c370ab42d737e93bc1795bb6a2187d7c60210cd5e3b3ce8f3c484@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rad255c736fad46135f1339408cb0147d0671e45c376c3be85ceeec1a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rae15d73cabef55bad148e4e6449b05da95646a2a8db3fc938e858dff@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/raf9c581b793c30ff8f55f2415c7bd337eb69775aae607bf9ed1b16fb@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rafb023a7c61180a1027819678eb2068b0b60cd5c2559cb8490e26c81@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb077d35f2940191daeefca0d6449cddb2e9d06bcf8f5af4da2df3ca2@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb5f2558ea2ac63633dfb04db1e8a6ea6bb1a2b8614899095e16c6233@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb69b1d7008a4b3de5ce5867e41a455693907026bc70ead06867aa323@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb7e159636b26156f6ef2b2a1a79b3ec9a026923b5456713e68f7c18e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb81a018f83fe02c95a2138a7bb4f1e1677bd7e1fc1e7024280c2292d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb8ad3745cb94c60d44cc369aff436eaf03dbc93112cefc86a2ed53ba@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb8c007f87dc57731a7b9a3b05364530422535b7e0bc6a0c5b68d4d55@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rbc5a622401924fadab61e07393235838918228b3d8a1a6704295b032@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rbc5a8d7a0a13bc8152d427a7e9097cdeb139c6cfe111b2f00f26d16b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbf99e4495461099cad9aa62e0164f8f25a7f97b791b4ace56e375f8d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1646894341450fdc4f7e96a88f5e2cf18d8004714f98aec6b831b3e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1d9b8e9d17749d4d2b9abaaa72c422d090315bd6bc0ae73a16abc1c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc2e24756d28580eeac811c5c6a12012c9f424b6e5bffb89f98ee3d03@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rc44d1147f78496ec9932a38b28795ff4fd0c4fa6e3b6f5cc33c14d29@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc4b972ea10c5a65c6a88a6e233778718ab9af7f484affdd5e5de0cff@%3Ccommits.felix.apache.org%3E
https://lists.apache.org/thread.html/rc77918636d8744d50312e4f67ba2e01f47db3ec5144540df8745cb38@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc8dd95802be0cca8d7d0929c0c8484ede384ecb966b2a9dc7197b089@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rc9d2ab8a6c7835182f20b01104798e67c75db655c869733a0713a590@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rccedec4cfd5df6761255b71349e3b7c27ee0745bd33698a71b1775cf@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcdcf32952397c83a1d617a8c9cd5c15c98b8d0d38a607972956bde7e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcdd56ab4255801a0964dcce3285e87f2c6994e6469e189f6836f34e3@%3Cnotifications.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rcfb95a7c69c4b9c082ea1918e812dfc45aa0d1e120fd47f68251a336@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcff5caebfd535195276aaabc1b631fd55a4ff6b14e2bdfe33f18ff91@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd58b60ab2e49ebf21022e59e280feb25899ff785c88f31fe314aa5b9@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/rd7e62e2972a41c2658f41a824b8bdd15644d80fcadc51fe7b7c855de@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rdbf1cd0ab330c032f3a09b453cb6405dccc905ad53765323bddab957@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rdddb4b06e86fd58a1beda132f22192af2f9b56aae8849cb3767ccd55@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rde11c433675143d8d27551c3d9e821fe1955f1551a518033d3716553@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rde782fd8e133f7e04e50c8aaa4774df524367764eb5b85bf60d96747@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re08b03cd1754b32f342664eead415af48092c630c8e3e0deba862a26@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/re5706141ca397587f7ee0f500a39ccc590a41f802fc125fc135cb92f@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ree506849c4f04376793b1a3076bc017da60b8a2ef2702dc214ff826f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/refbbb0eb65c185d1fa491cee08ac8ed32708ce3b269133a6da264317@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rf00ea6376f3d0e8b8f62cf6d4a4f28b24e27193acd2c851f618aa41e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rf3bc023a7cc729aeac72f482e2eeeab9008aa6b1dadbeb3f45320cae@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfd9f102864a039f7fda64a580dfe1a342d65d7b723ca06dc9fbceb31@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfe5caef1fd6cf4b8ceac1b63c33195f2908517b665c946c020d3fbd6@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfe6ba83d14545e982400dea89e68b10113cb5202a3dcb558ce64842d@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rff0ad6a7dac2182421e2db2407e44fbb61a89904adfd91538f21fbf8@%3Cissues.beam.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27216
https://security.netapp.com/advisory/ntap-20201123-0005/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| org.eclipse.jetty:jetty-client | CVE-2020-27216 | HIGH | 9.4.29.v20200521 | 9.4.33.v20201020, 10.0.0.beta3, 11.0.0.beta3 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27216
https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921
https://cwe.mitre.org/data/definitions/378.html
https://cwe.mitre.org/data/definitions/379.html
https://github.com/advisories/GHSA-g3wg-6mcf-8jj6
https://github.com/eclipse/jetty.project/issues/5451
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6#advisory-comment-63053
https://github.com/github/codeql/pull/4473
https://lists.apache.org/thread.html/r0259b14ae69b87821e27fed1f5333ea86018294fd31aab16b1fac84e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r07525dc424ed69b3919618599e762f9ac03791490ca9d724f2241442@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r09b345099b4f88d2bed7f195a96145849243fb4e53661aa3bcf4c176@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0d7ad4f02c44d5d53a9ffcbca7ff4a8138241322da9c5c35b5429630@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r0d95e01f52667f44835c40f6dea72bb4397f33cd70a564ea74f3836d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r0df8fe10fc36028cf6d0381ab66510917d0d68bc5ef7042001d03830@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0e9efe032cc65433251ee6470c66c334d4e7db9101e24cf91a3961f2@%3Ccommits.directory.apache.org%3E
https://lists.apache.org/thread.html/r0f5e9b93133ef3aaf31484bc3e15cc4b85f8af0fe4de2dacd9379d72@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r100c5c7586a23a19fdb54d8a32e17cd0944bdaa46277b35c397056f6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r171846414347ec5fed38241a9f8a009bd2c89d902154c6102b1fb39a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r185d10aae8161c08726f3ba9a1f1c47dfb97624ea6212fa217173204@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r18b6f10d9939419bae9c225d5058c97533cb376c9d6d0a0733ddd48d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r19e8b338af511641d211ff45c43646fe1ae19dc9897d69939c09cabe@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1d40368a309f9d835dcdd900249966e4fcbdf98c1cc4c84db2cd9964@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1d45051310b11c6d6476f20d71b08ea97cb76846cbf61d196bac1c3f@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1dbb87c9255ecefadd8de514fa1d35c1d493c0527d7672cf40505d04@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1ed79516bd6d248ea9f0e704dbfd7de740d5a75b71c7be8699fec824@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1ef28b89ff0281c87ba3a7659058789bf28a99b8074191f1c3678db8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1fe31643fc34b4a33ae3d416d92c271aa97663f1782767d25e1d9ff8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2122537d3f9beb0ce59f44371a951b226406719919656ed000984bd0@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r279254a1bd6434c943da52000476f307e62b6910755387aeca1ec9a1@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2aa316d008dab9ae48350b330d15dc1b863ea2a933558fbfc42b91a6@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2d17b2a4803096ba427f3575599ea29b55f5cf9dbc1f12ba044cae1a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2e02700f7cfecb213de50be83e066086bea90278cd753db7fdc2ccff@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2f732ee49d00610683ab5ddb4692ab25136b00bfd132ca3a590218a9@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3042a9dd2973aa229e52d022df7813e4d74b67df73bfa6d97bb0caf8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r336b1694a01858111e4625fb9ab2b07ad43a64a525cf6402e06aa6bf@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r351298dd39fc1ab63303be94b0c0d08acd72b17448e0346d7386189b@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E
https://lists.apache.org/thread.html/r382870d6ccfd60533eb0d980688261723ed8a0704dafa691c4e9aa68@%3Ccommits.iotdb.apache.org%3E
https://lists.apache.org/thread.html/r3a763de620be72b6d74f46ec4bf39c9f35f8a0b39993212c0ac778ec@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r3b0ce1549a1ccdd7e51ec66daf8d54d46f1571edbda88ed09c96d7da@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3e05ab0922876e74fea975d70af82b98580f4c14ba643c4f8a9e3a94@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3f32cb4965239399c22497a0aabb015b28b2372d4897185a6ef0ccd7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r407c316f6113dfc76f7bb3cb1693f08274c521064a92e5214197548e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4179c71908778cc0598ee8ee1eaed9b88fc5483c65373f45e087f650@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r44115ebfbf3b7d294d7a75f2d30bcc822dab186ebbcc2dce11915ca9@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4946ffd86ad6eb7cb7863311235c914cb41232380de8d9dcdb3c115c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4f29fb24639ebc5d15fc477656ebc2b3aa00fcfbe197000009c26b40@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r503045a75f4419d083cb63ac89e765d6fb8b10c7dacc0c54fce07cff@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/r547bb14c88c5da2588d853ed3030be0109efa537dd797877dff14afd@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5494fdaf4a0a42a15c49841ba7ae577d466d09239ee1050458da0f29@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r556787f1ab14da034d79dfff0c123c05877bbe89ef163fd359b4564c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r568d354961fa88f206dc345411fb11d245c6dc1a8da3e80187fc6706@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r58f5b14dc5ae43583db3a7e872419aca97ebe47bcd7f7334f4128016@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r59e0878013d329dcc481eeafebdb0ee445b1e2852d0c4827b1ddaff2@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5a07f274f355c914054c7357ad6d3456ffaca064f26cd780acb90a9a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5a9462096c71593e771602beb0e69357adb5175d9a5c18d5181e0ab4@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6236ae4adc401e3b2f2575c22865f2f6c6ea9ff1d7b264b40d9602af@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r66e99d973fd79ddbcb3fbdb24f4767fe9b911f5b0abb05d7b6f65801@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r6b83ca85c8f9a6794b1f85bc70d1385ed7bc1ad07750d0977537154a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6dfa64ecc3d67c1a71c08bfa04064549179d499f8e20a8285c57bd51@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6f51a654ac2e67e3d1c65a8957cbbb127c3f15b64b4fcd626df03633@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r70f8bcccd304bd66c1aca657dbfc2bf11f73add9032571b01f1f733d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r71da5f51ef04cb95abae560425dce9667740cbd567920f516f76efb7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r73b5a9b677b707bbb7c1469ea746312c47838b312603bada9e382bba@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r761a52f1e214efec286ee80045d0012e955eebaa72395ad62cccbcfc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r769411eb43dd9ef77665700deb7fc491fc3ceb532914260c90b56f2f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r77dd041d8025a869156481d2268c67ad17121f64e31f9b4a1a220145@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r7bdc83513c12db1827b79b8d57a7a0975a25d28bc6c5efe590ec1e02@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r7da5ae60d7973e8894cfe92f49ecb5b47417eefab4c77cc87514d3cf@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r8045eedd6bb74efcd8e01130796adbab98ee4a0d1273509fb1f2077a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r819857361f5a156e90d6d06ccf6c41026bc99030d60d0804be3a9957@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r827d17bf6900eddc686f4b6ee16fc5e52ca0070f8df7612222c40ac5@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r874688141495df766e62be095f1dfb0bf4a24ca0340d8e0215c03fab@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r87b0c69fef09277333a7e1716926d1f237d462e143a335854ddd922f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r87d8337300a635d66f0bb838bf635cdfcbba6b92c608a7813adbf4f4@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8866f0cd2a3b319288b7eea20ac137b9f260c813d10ee2db88b65d32@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8cacf91ae1b17cc6531d20953c52fa52f6fd3191deb3383446086ab7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8dd01541fc49d24ec223365a9974231cbd7378b749247a89b0a52210@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8fead0144bb84d8714695c43607dca9c5101aa028a431ec695882fe5@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r90b5ac6e2bf190a5297bda58c7ec76d01cd86ff050b2470fcd9f4b35@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r911c1879258ebf98bca172c0673350eb7ea6569ca1735888d4cb7adc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r916b6542bd5b15a8a7ff8fc14a0e0331e8e3e9d682f22768ae71d775@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r93b240be16e642579ed794325bae31b040e1af896ecc12466642e19d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r93d5e81e879120d8d87925dbdd4045cb3afa9b066f4370f60b626ce3@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r9b790fe3a93121199f41258474222f15002b2f729495aa7ecbf90718@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9c010b79140452294292379183e7fe8e3533c5bb4db3f3fb39a6df61@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9cc76b98f87738791b8ec3736755f92444d3c8cb26bd4e4ffdb5c1cc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9cd444f944241dc26d9b8b007fe8971ed7f005b56befef7a4f4fb827@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9d9b4b93df7f92cdf1147db0fc169be1776c93d1fbc63bc65721fffd@%3Cdev.knox.apache.org%3E
https://lists.apache.org/thread.html/r9f8c45a2a4540911cd8bd0485f67e8091883c9234d7a3aeb349c46c1@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/ra1f19625cc67ac1b459c558f2ea5647d71ce51c6fe4f4cb03baec849@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra55e04d5a73afcb8383f4386e2b26832c6e3972e53827021ab885943@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/ra5b7313d8cc9411db6790adfba33f2cf0665cb77adb7b02043c95867@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/raa9c370ab42d737e93bc1795bb6a2187d7c60210cd5e3b3ce8f3c484@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rad255c736fad46135f1339408cb0147d0671e45c376c3be85ceeec1a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rae15d73cabef55bad148e4e6449b05da95646a2a8db3fc938e858dff@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/raf9c581b793c30ff8f55f2415c7bd337eb69775aae607bf9ed1b16fb@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rafb023a7c61180a1027819678eb2068b0b60cd5c2559cb8490e26c81@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb077d35f2940191daeefca0d6449cddb2e9d06bcf8f5af4da2df3ca2@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb5f2558ea2ac63633dfb04db1e8a6ea6bb1a2b8614899095e16c6233@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb69b1d7008a4b3de5ce5867e41a455693907026bc70ead06867aa323@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb7e159636b26156f6ef2b2a1a79b3ec9a026923b5456713e68f7c18e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb81a018f83fe02c95a2138a7bb4f1e1677bd7e1fc1e7024280c2292d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb8ad3745cb94c60d44cc369aff436eaf03dbc93112cefc86a2ed53ba@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb8c007f87dc57731a7b9a3b05364530422535b7e0bc6a0c5b68d4d55@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rbc5a622401924fadab61e07393235838918228b3d8a1a6704295b032@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rbc5a8d7a0a13bc8152d427a7e9097cdeb139c6cfe111b2f00f26d16b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbf99e4495461099cad9aa62e0164f8f25a7f97b791b4ace56e375f8d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1646894341450fdc4f7e96a88f5e2cf18d8004714f98aec6b831b3e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1d9b8e9d17749d4d2b9abaaa72c422d090315bd6bc0ae73a16abc1c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc2e24756d28580eeac811c5c6a12012c9f424b6e5bffb89f98ee3d03@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rc44d1147f78496ec9932a38b28795ff4fd0c4fa6e3b6f5cc33c14d29@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc4b972ea10c5a65c6a88a6e233778718ab9af7f484affdd5e5de0cff@%3Ccommits.felix.apache.org%3E
https://lists.apache.org/thread.html/rc77918636d8744d50312e4f67ba2e01f47db3ec5144540df8745cb38@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc8dd95802be0cca8d7d0929c0c8484ede384ecb966b2a9dc7197b089@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rc9d2ab8a6c7835182f20b01104798e67c75db655c869733a0713a590@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rccedec4cfd5df6761255b71349e3b7c27ee0745bd33698a71b1775cf@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcdcf32952397c83a1d617a8c9cd5c15c98b8d0d38a607972956bde7e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcdd56ab4255801a0964dcce3285e87f2c6994e6469e189f6836f34e3@%3Cnotifications.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rcfb95a7c69c4b9c082ea1918e812dfc45aa0d1e120fd47f68251a336@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcff5caebfd535195276aaabc1b631fd55a4ff6b14e2bdfe33f18ff91@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd58b60ab2e49ebf21022e59e280feb25899ff785c88f31fe314aa5b9@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/rd7e62e2972a41c2658f41a824b8bdd15644d80fcadc51fe7b7c855de@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rdbf1cd0ab330c032f3a09b453cb6405dccc905ad53765323bddab957@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rdddb4b06e86fd58a1beda132f22192af2f9b56aae8849cb3767ccd55@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rde11c433675143d8d27551c3d9e821fe1955f1551a518033d3716553@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rde782fd8e133f7e04e50c8aaa4774df524367764eb5b85bf60d96747@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re08b03cd1754b32f342664eead415af48092c630c8e3e0deba862a26@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/re5706141ca397587f7ee0f500a39ccc590a41f802fc125fc135cb92f@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ree506849c4f04376793b1a3076bc017da60b8a2ef2702dc214ff826f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/refbbb0eb65c185d1fa491cee08ac8ed32708ce3b269133a6da264317@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rf00ea6376f3d0e8b8f62cf6d4a4f28b24e27193acd2c851f618aa41e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rf3bc023a7cc729aeac72f482e2eeeab9008aa6b1dadbeb3f45320cae@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfd9f102864a039f7fda64a580dfe1a342d65d7b723ca06dc9fbceb31@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfe5caef1fd6cf4b8ceac1b63c33195f2908517b665c946c020d3fbd6@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfe6ba83d14545e982400dea89e68b10113cb5202a3dcb558ce64842d@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rff0ad6a7dac2182421e2db2407e44fbb61a89904adfd91538f21fbf8@%3Cissues.beam.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27216
https://security.netapp.com/advisory/ntap-20201123-0005/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.eclipse.jetty:jetty-client | CVE-2021-28165 | HIGH | 9.4.29.v20200521 | 9.4.39.v20210325, 10.0.2, 11.0.2 |
Expand...http://www.openwall.com/lists/oss-security/2021/04/20/3
https://access.redhat.com/security/cve/CVE-2021-28165
https://github.com/advisories/GHSA-26vr-8j45-3r4w
https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w
https://lists.apache.org/thread.html/r002258611ed0c35b82b839d284b43db9dcdec120db8afc1c993137dc@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r03ca0b69db1e3e5f72fe484b71370d537cd711cbf334e2913332730a@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r05db8e0ef01e1280cc7543575ae0fa1c2b4d06a8b928916ef65dd2ad@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r06d54a297cb8217c66e5190912a955fb870ba47da164002bf2baffe5@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r077b76cafb61520c14c87c4fc76419ed664002da0ddac5ad851ae7e7@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r0a241b0649beef90d422b42a26a2470d336e59e66970eafd54f9c3e2@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0a4797ba6ceea8074f47574a4f3cc11493d514c1fab8203ebd212add@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r0bf3aa065abd23960fc8bdc8090d6bc00d5e391cf94ec4e1f4537ae3@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r0cd1a5e3f4ad4770b44f8aa96572fc09d5b35bec149c0cc247579c42@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r0f02034a33076fd7243cf3a8807d2766e373f5cb2e7fd0c9a78f97c4@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r17e26cf9a1e3cbc09522d15ece5d7c7a00cdced7641b92a22a783287@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r23785214d47673b811ef119ca3a40f729801865ea1e891572d15faa6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r2afc72af069a7fe89ca2de847f3ab3971cb1d668a9497c999946cd78@%3Ccommits.spark.apache.org%3E
https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r2f2d9c3b7cc750a6763d6388bcf5db0c7b467bd8be6ac4d6aea4f0cf@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r31f591a0deac927ede8ccc3eac4bb92697ee2361bf01549f9e3440ca@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r33eb3889ca0aa12720355e64fc2f8f1e8c0c28a4d55b3b4b8891becb@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r40136c2010fccf4fb2818a965e5d7ecca470e5f525c232ec5b8eb83a@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r401b1c592f295b811608010a70792b11c91885b72af9f9410cffbe35@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r411d75dc6bcefadaaea246549dd18e8d391a880ddf28a796f09ce152@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r47a7542ab61da865fff3db0fe74bfe76c89a37b6e6d2c2a423f8baee@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r4891d45625cc522fe0eb764ac50d48bcca9c0db4805ea4a998d4c225@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r4abbd760d24bab2b8f1294c5c9216ae915100099c4391ad64e9ae38b@%3Cdev.hbase.apache.org%3E
https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r520c56519b8820955a86966f499e7a0afcbcf669d6f7da59ef1eb155@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r56e5568ac73daedcb3b5affbb4b908999f03d3c1b1ada3920b01e959@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r5d1f16dca2e010193840068f1a1ec17b7015e91acc646607cbc0a4da@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r5f172f2dd8fb02f032ef4437218fd4f610605a3dd4f2a024c1e43b94@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r64ff94118f6c80e6c085c6e2d51bbb490eaefad0642db8c936e4f0b7@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r6535b2beddf0ed2d263ab64ff365a5f790df135a1a2f45786417adb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r65daad30d13f7c56eb5c3d7733ad8dddbf62c469175410777a78d812@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r694e57d74fcaa48818a03c282aecfa13ae68340c798dfcb55cb7acc7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r6b070441871a4e6ce8bb63e190c879bb60da7c5e15023de29ebd4f9f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r6ce2907b2691c025250ba010bc797677ef78d5994d08507a2e5477c9@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r6f256a1d15505f79f4050a69bb8f27b34cb353604dd2f765c9da5df7@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r71031d0acb1de55c9ab32f4750c50ce2f28543252e887ca03bd5621e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r7189bf41cb0c483629917a01cf296f9fbdbda3987084595192e3845d@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r72bf813ed4737196ea3ed26494e949577be587fd5939fe8be09907c7@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r746434be6abff9ad321ff54ecae09e1f09c1c7c139021f40a5774090@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r769155244ca2da2948a44091bb3bb9a56e7e1c71ecc720b8ecf281f0@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7bf7004c18c914fae3d5a6a0191d477e5b6408d95669b3afbf6efa36@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7c40fb3a66a39b6e6c83b0454bc6917ffe6c69e3131322be9c07a1da@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r81748d56923882543f5be456043c67daef84d631cf54899082058ef1@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r83453ec252af729996476e5839d0b28f07294959d60fea1bd76f7d81@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r90327f55db8f1d079f9a724aabf1f5eb3c00c1de49dc7fd04cad1ebc@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r940f15db77a96f6aea92d830bc94d8d95f26cc593394d144755824da@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r942f4a903d0abb25ac75c592e57df98dea51350e8589269a72fd7913@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r9b793db9f395b546e66fb9c44fe1cd75c7755029e944dfee31b8b779@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r9db72e9c33b93eba45a214af588f1d553839b5c3080fc913854a49ab@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r9fae5a4087d9ed1c9d4f0c7493b6981a4741cfb4bebb2416da638424@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/ra210e38ae0bf615084390b26ba01bb5d66c0a76f232277446ae0948a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra21b3e6bd9669377139fe33fb46edf6fece3f31375bc42a0dcc964b2@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra50519652b0b7f869a14fbfb4be9758a29171d7fe561bb7e036e8449@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/ra9dd15ba8a4fb7e42c7fe948a6d6b3868fd6bbf8e3fb37fcf33b2cd0@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rae8bbc5a516f3e21b8a55e61ff6ad0ced03bdbd116d2170a3eed9f5c@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/raea6e820644e8c5a577f77d4e2044f8ab52183c2536b00c56738beef@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb00345f6b1620b553d2cc1acaf3017aa75cea3776b911e024fa3b187@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb11a13e623218c70b9f2a2d0d122fdaaf905e04a2edcd23761894464@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb1624b9777a3070135e94331a428c6653a6a1edccd56fa9fb7a547f2@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb2d34abb67cdf525945fe4b821c5cdbca29a78d586ae1f9f505a311c@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb66ed0b4bb74836add60dd5ddf9172016380b2aeefb7f96fe348537b@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb8f5a6ded384eb00608e6137e87110e7dd7d5054cc34561cb89b81af@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rbab9e67ec97591d063905bc7d4743e6a673f1bc457975fc0445ac97f@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rbba0b02a3287e34af328070dd58f7828612f96e2e64992137f4dc63d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rbcd7b477df55857bb6cae21fcc4404683ac98aac1a47551f0dc55486@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbd9a837a18ca57ac0d9b4165a6eec95ee132f55d025666fe41099f33@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rc4779abc1cface47e956cf9f8910f15d79c24477e7b1ac9be076a825@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rc4dbc9907b0bdd634200ac90a15283d9c143c11af66e7ec72128d020@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rc6c43c3180c0efe00497c73dd374cd34b62036cb67987ad42c1f2dce@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rc907ed7b089828364437de5ed57fa062330970dc1bc5cd214b711f77@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rcdea97f4d3233298296aabc103c9fcefbf629425418c2b69bb16745f@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rd24d8a059233167b4a5aebda4b3534ca1d86caa8a85b10a73403ee97@%3Ccommits.spark.apache.org%3E
https://lists.apache.org/thread.html/rd6c1eb9a8a94b3ac8a525d74d792924e8469f201b77e1afcf774e7a6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rd755dfe5f658c42704540ad7950cebd136739089c3231658e398cf38@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E
https://lists.apache.org/thread.html/rd9ea411a58925cc82c32e15f541ead23cb25b4b2d57a2bdb0341536e@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rdbf2a2cd1800540ae50dd78b57411229223a6172117d62b8e57596aa@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rdde34d53aa80193cda016272d61e6749f8a9044ccb37a30768938f7e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rdf4fe435891e8c35e70ea5da033b4c3da78760f15a8c4212fad89d9f@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rdfe5f1c071ba9dadba18d7fb0ff13ea6ecb33da624250c559999eaeb@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/re0545ecced2d468c94ce4dcfa37d40a9573cc68ef5f6839ffca9c1c1@%3Ccommits.hbase.apache.org%3E
https://lists.apache.org/thread.html/re3a1617d16a7367f767b8209b2151f4c19958196354b39568c532f26@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/re577736ca7da51952c910b345a500b7676ea9931c9b19709b87f292b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re6614b4fe7dbb945409daadb9e1cc73c02383df68bf9334736107a6e@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ree1895a256a9db951e0d97a76222909c2e1f28c1a3d89933173deed6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf1b02dfccd27b8bbc3afd119b212452fa32e9ed7d506be9357a3a7ec@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf6de4c249bd74007f5f66f683c110535f46e719d2f83a41e8faf295f@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf99f9a25ca24fe519c9346388f61b5b3a09be31b800bf37f01473ad7@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rfc9f51b4e21022b3cd6cb6f90791a6a6999560212e519b5f09db0aed@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rfd3ff6e66b6bbcfb2fefa9f5a20328937c0369b2e142e3e1c6774743@%3Creviews.spark.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-28165
https://security.netapp.com/advisory/ntap-20210611-0006/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.eclipse.jetty:jetty-client | CVE-2020-27223 | MEDIUM | 9.4.29.v20200521 | 9.4.36.v20210114, 10.0.1, 11.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27223
https://bugs.eclipse.org/bugs/show_bug.cgi?id=571128
https://github.com/advisories/GHSA-m394-8rww-3jr7
https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7
https://lists.apache.org/thread.html/r068dfd35ce2193f6af28b74ff29ab148c2b2cacb235995576f5bea78@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r07aedcb1ece62969c406cb84c8f0e22cec7e42cdc272f3176e473320@%3Cusers.solr.apache.org%3E
https://lists.apache.org/thread.html/r0b639bd9bfaea265022125d18acd2fc6456044b76609ec74772c9567@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0c6eced465950743f3041b03767a32b2e98d19731bd72277fc7ea428@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0cdab13815fc419805a332278c8d27e354e78560944fc36db0bdc760@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0e25cdf3722a24c53049d37396f0da8502cb4b7cdc481650dc601dbc@%3Cgitbox.activemq.apache.org%3E
https://lists.apache.org/thread.html/r105f4e52feb051faeb9141ef78f909aaf5129d6ed1fc52e099c79463@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r1414ab2b3f4bb4c0e736caff6dc8d15f93f6264f0cca5c47710d7bb3@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r1b7ed296a865e3f1337a96ee9cd51f6d154d881a30da36020ca72a4b@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r1b803e6ebdac5f670708878fb1b27cd7a0ce9d774a60e797e58cee6f@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r26d9196f4d2afb9bec2784bcb6fc183aca82e4119bf41bdc613eec01@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r27ad7843d060762cc942820566eeaa9639f75371afedf8124b943283@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r2c2c7b2971360fb946bbf062c58d7245927dd1ce9150fc9987f65409@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r35ab810c0f3016b3fd3a3fa9088a2d2781b354a810780ce74d022b6c@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r409ee2bae66bfff6aa89e6c74aff535e6248260d3afcb42bfb3b316b@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r463b12b27264c5e1e3c48c8c2cc5d33813d2f0d981102548fb3102fb@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r492cff8488a7f6eb96700afb5d137b719ddb80a833e77f971d2691c6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r4a456d89a83752a012d88a60ff4b21def6c9f650b9e69ea9fa11c9f9@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r4c92ea39167c0f7b096ae8268db496b5451d69606f0304b7c8a994c7@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r51f8975ef47c12a46fbfd7da9efea7f08e1d307fe1dc3042514659ae@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r521a077885ce79c44a799118c878589e81e525cab72d368e5cfb6f61@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r5612dc69e1f79c421faf9764ffbc92591e2a69ea417c04cba57f49ea@%3Cuser.karaf.apache.org%3E
https://lists.apache.org/thread.html/r562a0cbc5c8cac4d000a27b2854a8ab1b924aa9dd45f8ffbea98e5ad@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5b7cc6ac733e0b35816751cf45d152ae246a3f40e0b1e62b101c9522@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r601f15f3de7ae3a7bbcd780c19155075c56443c2cdc1d193c03b4182@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r65c714241b9d064a44fec10d60ebf5a37d5ebadd6bf88b0eed13ade0@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r734f996149bb9b1796740385fcbdf3e093eb9aabedc0f20a48ea1d68@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r75ee2a529edb892ac59110cb3f6f91844a932c5034e16c8317f5668d@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7f4ad5eec0bce2821c308bb23cac53df5c94eb84de1c58de9b95c176@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7fbdb7880be1566f943d80fbbeefde2115c086eba1bef3115350a388@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7ffd050d3bd7c90d95f4933560b5f4f15971ab9a5f5322fdce116243@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r857b31ad16c6e76002bc6cca73c83358ed2595477e288286ee82c48d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r897a6a14d03eab09e89b809d2a650f3765065201da5bc3db9a4dd6e8@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8b1963f16d6cb1230ca7ee73b6ec4f5c48f344191dbb1caabd265ee4@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8dc1b13b80d39fbf4a9d158850e15cd868f0460c2f364f13dca7050b@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra2f529da674f25a7351543544f7d621b5227c49a0745913b1194d11e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/ra384892bab8c03a60613a6a9d5e9cae0a2b800fd882792a55520115e@%3Ccommits.kafka.apache.org%3E
https://lists.apache.org/thread.html/ra40a88a2301a3da86e25b501ff4bc88124f2b816c2917d5f3497f8f0@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra47a26c008487b0a739a368c846e168de06c3cd118d31ecedafa679a@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/raa6d60b00b67c0550672b4f506f0df75b323dcd25cf574e91e2f2dff@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb79b62ac3085e05656e41865f5a7efcbdc7dcd7843abed9c5fe0fef8@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc052fd4e9e9c01bead74c0b5680355ea5dc3b72d46f253cb65d03e43@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rc721fe2910533bffb6bd4d69ea8ff4f36066d260dbcd2d14e041614a@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rd666e187ebea2fda8624683ab51e2a5ad2108f762d21bf1a383d7502@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rdd6c47321db1bfe12c68a898765bf3b6f97e2afa6a501254ed4feaed@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/re03a4dbc15df6f390a2f8c0a071c31c8324dbef007e59fdc2592091a@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/re19fa47ec901cc3cf6d7784027198e8113f8bc2dbfd6c9d6d13f5447@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re3bd4f831f9be49871cb6adb997289b5dbcd6fe4bc5cb08223254080@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/re43768896273c0b5f1a03d7f0a9d370852074489d51825fdc0d77f0f@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E
https://lists.apache.org/thread.html/reb3c6dc050c7ee18ea154cd94dba85d99aa6b02b84c4bb2138a4abf2@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/reca91f217f9e1ce607ce6e19a1c0b3db82b5b1b58cf39a84d6434695@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf190d1d28e1367d1664ef6bc2f71227566d7b6b39209817a5364da1f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rf6c2efa3137bc8c22707e550a1f9b80f74bca62b9c8a6f768f2c6b86@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf77f4c4583669f1133d58cc4f1964367e253818ed8db986bb2732f7c@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rff630ce92a4d1bb494fc1a3f9b57a3d60819b436505bcd8c6ccc713c@%3Ccommits.kafka.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-27223
https://security.netapp.com/advisory/ntap-20210401-0005/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com/security-alerts/cpuApr2021.html
| -| org.eclipse.jetty:jetty-http | CVE-2020-27216 | HIGH | 9.4.29.v20200521 | 9.3.29.v20201019, 9.4.32.v20200930, 11.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27216
https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921
https://cwe.mitre.org/data/definitions/378.html
https://cwe.mitre.org/data/definitions/379.html
https://github.com/advisories/GHSA-g3wg-6mcf-8jj6
https://github.com/eclipse/jetty.project/issues/5451
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6#advisory-comment-63053
https://github.com/github/codeql/pull/4473
https://lists.apache.org/thread.html/r0259b14ae69b87821e27fed1f5333ea86018294fd31aab16b1fac84e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r07525dc424ed69b3919618599e762f9ac03791490ca9d724f2241442@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r09b345099b4f88d2bed7f195a96145849243fb4e53661aa3bcf4c176@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0d7ad4f02c44d5d53a9ffcbca7ff4a8138241322da9c5c35b5429630@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r0d95e01f52667f44835c40f6dea72bb4397f33cd70a564ea74f3836d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r0df8fe10fc36028cf6d0381ab66510917d0d68bc5ef7042001d03830@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0e9efe032cc65433251ee6470c66c334d4e7db9101e24cf91a3961f2@%3Ccommits.directory.apache.org%3E
https://lists.apache.org/thread.html/r0f5e9b93133ef3aaf31484bc3e15cc4b85f8af0fe4de2dacd9379d72@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r100c5c7586a23a19fdb54d8a32e17cd0944bdaa46277b35c397056f6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r171846414347ec5fed38241a9f8a009bd2c89d902154c6102b1fb39a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r185d10aae8161c08726f3ba9a1f1c47dfb97624ea6212fa217173204@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r18b6f10d9939419bae9c225d5058c97533cb376c9d6d0a0733ddd48d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r19e8b338af511641d211ff45c43646fe1ae19dc9897d69939c09cabe@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1d40368a309f9d835dcdd900249966e4fcbdf98c1cc4c84db2cd9964@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1d45051310b11c6d6476f20d71b08ea97cb76846cbf61d196bac1c3f@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1dbb87c9255ecefadd8de514fa1d35c1d493c0527d7672cf40505d04@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1ed79516bd6d248ea9f0e704dbfd7de740d5a75b71c7be8699fec824@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1ef28b89ff0281c87ba3a7659058789bf28a99b8074191f1c3678db8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1fe31643fc34b4a33ae3d416d92c271aa97663f1782767d25e1d9ff8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2122537d3f9beb0ce59f44371a951b226406719919656ed000984bd0@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r279254a1bd6434c943da52000476f307e62b6910755387aeca1ec9a1@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2aa316d008dab9ae48350b330d15dc1b863ea2a933558fbfc42b91a6@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2d17b2a4803096ba427f3575599ea29b55f5cf9dbc1f12ba044cae1a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2e02700f7cfecb213de50be83e066086bea90278cd753db7fdc2ccff@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2f732ee49d00610683ab5ddb4692ab25136b00bfd132ca3a590218a9@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3042a9dd2973aa229e52d022df7813e4d74b67df73bfa6d97bb0caf8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r336b1694a01858111e4625fb9ab2b07ad43a64a525cf6402e06aa6bf@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r351298dd39fc1ab63303be94b0c0d08acd72b17448e0346d7386189b@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E
https://lists.apache.org/thread.html/r382870d6ccfd60533eb0d980688261723ed8a0704dafa691c4e9aa68@%3Ccommits.iotdb.apache.org%3E
https://lists.apache.org/thread.html/r3a763de620be72b6d74f46ec4bf39c9f35f8a0b39993212c0ac778ec@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r3b0ce1549a1ccdd7e51ec66daf8d54d46f1571edbda88ed09c96d7da@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3e05ab0922876e74fea975d70af82b98580f4c14ba643c4f8a9e3a94@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3f32cb4965239399c22497a0aabb015b28b2372d4897185a6ef0ccd7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r407c316f6113dfc76f7bb3cb1693f08274c521064a92e5214197548e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4179c71908778cc0598ee8ee1eaed9b88fc5483c65373f45e087f650@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r44115ebfbf3b7d294d7a75f2d30bcc822dab186ebbcc2dce11915ca9@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4946ffd86ad6eb7cb7863311235c914cb41232380de8d9dcdb3c115c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4f29fb24639ebc5d15fc477656ebc2b3aa00fcfbe197000009c26b40@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r503045a75f4419d083cb63ac89e765d6fb8b10c7dacc0c54fce07cff@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/r547bb14c88c5da2588d853ed3030be0109efa537dd797877dff14afd@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5494fdaf4a0a42a15c49841ba7ae577d466d09239ee1050458da0f29@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r556787f1ab14da034d79dfff0c123c05877bbe89ef163fd359b4564c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r568d354961fa88f206dc345411fb11d245c6dc1a8da3e80187fc6706@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r58f5b14dc5ae43583db3a7e872419aca97ebe47bcd7f7334f4128016@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r59e0878013d329dcc481eeafebdb0ee445b1e2852d0c4827b1ddaff2@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5a07f274f355c914054c7357ad6d3456ffaca064f26cd780acb90a9a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5a9462096c71593e771602beb0e69357adb5175d9a5c18d5181e0ab4@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6236ae4adc401e3b2f2575c22865f2f6c6ea9ff1d7b264b40d9602af@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r66e99d973fd79ddbcb3fbdb24f4767fe9b911f5b0abb05d7b6f65801@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r6b83ca85c8f9a6794b1f85bc70d1385ed7bc1ad07750d0977537154a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6dfa64ecc3d67c1a71c08bfa04064549179d499f8e20a8285c57bd51@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6f51a654ac2e67e3d1c65a8957cbbb127c3f15b64b4fcd626df03633@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r70f8bcccd304bd66c1aca657dbfc2bf11f73add9032571b01f1f733d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r71da5f51ef04cb95abae560425dce9667740cbd567920f516f76efb7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r73b5a9b677b707bbb7c1469ea746312c47838b312603bada9e382bba@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r761a52f1e214efec286ee80045d0012e955eebaa72395ad62cccbcfc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r769411eb43dd9ef77665700deb7fc491fc3ceb532914260c90b56f2f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r77dd041d8025a869156481d2268c67ad17121f64e31f9b4a1a220145@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r7bdc83513c12db1827b79b8d57a7a0975a25d28bc6c5efe590ec1e02@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r7da5ae60d7973e8894cfe92f49ecb5b47417eefab4c77cc87514d3cf@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r8045eedd6bb74efcd8e01130796adbab98ee4a0d1273509fb1f2077a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r819857361f5a156e90d6d06ccf6c41026bc99030d60d0804be3a9957@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r827d17bf6900eddc686f4b6ee16fc5e52ca0070f8df7612222c40ac5@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r874688141495df766e62be095f1dfb0bf4a24ca0340d8e0215c03fab@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r87b0c69fef09277333a7e1716926d1f237d462e143a335854ddd922f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r87d8337300a635d66f0bb838bf635cdfcbba6b92c608a7813adbf4f4@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8866f0cd2a3b319288b7eea20ac137b9f260c813d10ee2db88b65d32@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8cacf91ae1b17cc6531d20953c52fa52f6fd3191deb3383446086ab7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8dd01541fc49d24ec223365a9974231cbd7378b749247a89b0a52210@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8fead0144bb84d8714695c43607dca9c5101aa028a431ec695882fe5@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r90b5ac6e2bf190a5297bda58c7ec76d01cd86ff050b2470fcd9f4b35@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r911c1879258ebf98bca172c0673350eb7ea6569ca1735888d4cb7adc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r916b6542bd5b15a8a7ff8fc14a0e0331e8e3e9d682f22768ae71d775@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r93b240be16e642579ed794325bae31b040e1af896ecc12466642e19d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r93d5e81e879120d8d87925dbdd4045cb3afa9b066f4370f60b626ce3@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r9b790fe3a93121199f41258474222f15002b2f729495aa7ecbf90718@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9c010b79140452294292379183e7fe8e3533c5bb4db3f3fb39a6df61@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9cc76b98f87738791b8ec3736755f92444d3c8cb26bd4e4ffdb5c1cc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9cd444f944241dc26d9b8b007fe8971ed7f005b56befef7a4f4fb827@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9d9b4b93df7f92cdf1147db0fc169be1776c93d1fbc63bc65721fffd@%3Cdev.knox.apache.org%3E
https://lists.apache.org/thread.html/r9f8c45a2a4540911cd8bd0485f67e8091883c9234d7a3aeb349c46c1@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/ra1f19625cc67ac1b459c558f2ea5647d71ce51c6fe4f4cb03baec849@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra55e04d5a73afcb8383f4386e2b26832c6e3972e53827021ab885943@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/ra5b7313d8cc9411db6790adfba33f2cf0665cb77adb7b02043c95867@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/raa9c370ab42d737e93bc1795bb6a2187d7c60210cd5e3b3ce8f3c484@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rad255c736fad46135f1339408cb0147d0671e45c376c3be85ceeec1a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rae15d73cabef55bad148e4e6449b05da95646a2a8db3fc938e858dff@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/raf9c581b793c30ff8f55f2415c7bd337eb69775aae607bf9ed1b16fb@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rafb023a7c61180a1027819678eb2068b0b60cd5c2559cb8490e26c81@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb077d35f2940191daeefca0d6449cddb2e9d06bcf8f5af4da2df3ca2@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb5f2558ea2ac63633dfb04db1e8a6ea6bb1a2b8614899095e16c6233@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb69b1d7008a4b3de5ce5867e41a455693907026bc70ead06867aa323@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb7e159636b26156f6ef2b2a1a79b3ec9a026923b5456713e68f7c18e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb81a018f83fe02c95a2138a7bb4f1e1677bd7e1fc1e7024280c2292d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb8ad3745cb94c60d44cc369aff436eaf03dbc93112cefc86a2ed53ba@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb8c007f87dc57731a7b9a3b05364530422535b7e0bc6a0c5b68d4d55@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rbc5a622401924fadab61e07393235838918228b3d8a1a6704295b032@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rbc5a8d7a0a13bc8152d427a7e9097cdeb139c6cfe111b2f00f26d16b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbf99e4495461099cad9aa62e0164f8f25a7f97b791b4ace56e375f8d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1646894341450fdc4f7e96a88f5e2cf18d8004714f98aec6b831b3e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1d9b8e9d17749d4d2b9abaaa72c422d090315bd6bc0ae73a16abc1c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc2e24756d28580eeac811c5c6a12012c9f424b6e5bffb89f98ee3d03@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rc44d1147f78496ec9932a38b28795ff4fd0c4fa6e3b6f5cc33c14d29@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc4b972ea10c5a65c6a88a6e233778718ab9af7f484affdd5e5de0cff@%3Ccommits.felix.apache.org%3E
https://lists.apache.org/thread.html/rc77918636d8744d50312e4f67ba2e01f47db3ec5144540df8745cb38@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc8dd95802be0cca8d7d0929c0c8484ede384ecb966b2a9dc7197b089@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rc9d2ab8a6c7835182f20b01104798e67c75db655c869733a0713a590@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rccedec4cfd5df6761255b71349e3b7c27ee0745bd33698a71b1775cf@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcdcf32952397c83a1d617a8c9cd5c15c98b8d0d38a607972956bde7e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcdd56ab4255801a0964dcce3285e87f2c6994e6469e189f6836f34e3@%3Cnotifications.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rcfb95a7c69c4b9c082ea1918e812dfc45aa0d1e120fd47f68251a336@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcff5caebfd535195276aaabc1b631fd55a4ff6b14e2bdfe33f18ff91@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd58b60ab2e49ebf21022e59e280feb25899ff785c88f31fe314aa5b9@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/rd7e62e2972a41c2658f41a824b8bdd15644d80fcadc51fe7b7c855de@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rdbf1cd0ab330c032f3a09b453cb6405dccc905ad53765323bddab957@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rdddb4b06e86fd58a1beda132f22192af2f9b56aae8849cb3767ccd55@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rde11c433675143d8d27551c3d9e821fe1955f1551a518033d3716553@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rde782fd8e133f7e04e50c8aaa4774df524367764eb5b85bf60d96747@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re08b03cd1754b32f342664eead415af48092c630c8e3e0deba862a26@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/re5706141ca397587f7ee0f500a39ccc590a41f802fc125fc135cb92f@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ree506849c4f04376793b1a3076bc017da60b8a2ef2702dc214ff826f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/refbbb0eb65c185d1fa491cee08ac8ed32708ce3b269133a6da264317@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rf00ea6376f3d0e8b8f62cf6d4a4f28b24e27193acd2c851f618aa41e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rf3bc023a7cc729aeac72f482e2eeeab9008aa6b1dadbeb3f45320cae@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfd9f102864a039f7fda64a580dfe1a342d65d7b723ca06dc9fbceb31@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfe5caef1fd6cf4b8ceac1b63c33195f2908517b665c946c020d3fbd6@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfe6ba83d14545e982400dea89e68b10113cb5202a3dcb558ce64842d@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rff0ad6a7dac2182421e2db2407e44fbb61a89904adfd91538f21fbf8@%3Cissues.beam.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27216
https://security.netapp.com/advisory/ntap-20201123-0005/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| org.eclipse.jetty:jetty-http | CVE-2020-27216 | HIGH | 9.4.29.v20200521 | 9.4.33.v20201020, 10.0.0.beta3, 11.0.0.beta3 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27216
https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921
https://cwe.mitre.org/data/definitions/378.html
https://cwe.mitre.org/data/definitions/379.html
https://github.com/advisories/GHSA-g3wg-6mcf-8jj6
https://github.com/eclipse/jetty.project/issues/5451
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6#advisory-comment-63053
https://github.com/github/codeql/pull/4473
https://lists.apache.org/thread.html/r0259b14ae69b87821e27fed1f5333ea86018294fd31aab16b1fac84e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r07525dc424ed69b3919618599e762f9ac03791490ca9d724f2241442@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r09b345099b4f88d2bed7f195a96145849243fb4e53661aa3bcf4c176@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0d7ad4f02c44d5d53a9ffcbca7ff4a8138241322da9c5c35b5429630@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r0d95e01f52667f44835c40f6dea72bb4397f33cd70a564ea74f3836d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r0df8fe10fc36028cf6d0381ab66510917d0d68bc5ef7042001d03830@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0e9efe032cc65433251ee6470c66c334d4e7db9101e24cf91a3961f2@%3Ccommits.directory.apache.org%3E
https://lists.apache.org/thread.html/r0f5e9b93133ef3aaf31484bc3e15cc4b85f8af0fe4de2dacd9379d72@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r100c5c7586a23a19fdb54d8a32e17cd0944bdaa46277b35c397056f6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r171846414347ec5fed38241a9f8a009bd2c89d902154c6102b1fb39a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r185d10aae8161c08726f3ba9a1f1c47dfb97624ea6212fa217173204@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r18b6f10d9939419bae9c225d5058c97533cb376c9d6d0a0733ddd48d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r19e8b338af511641d211ff45c43646fe1ae19dc9897d69939c09cabe@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1d40368a309f9d835dcdd900249966e4fcbdf98c1cc4c84db2cd9964@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1d45051310b11c6d6476f20d71b08ea97cb76846cbf61d196bac1c3f@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1dbb87c9255ecefadd8de514fa1d35c1d493c0527d7672cf40505d04@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1ed79516bd6d248ea9f0e704dbfd7de740d5a75b71c7be8699fec824@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1ef28b89ff0281c87ba3a7659058789bf28a99b8074191f1c3678db8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1fe31643fc34b4a33ae3d416d92c271aa97663f1782767d25e1d9ff8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2122537d3f9beb0ce59f44371a951b226406719919656ed000984bd0@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r279254a1bd6434c943da52000476f307e62b6910755387aeca1ec9a1@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2aa316d008dab9ae48350b330d15dc1b863ea2a933558fbfc42b91a6@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2d17b2a4803096ba427f3575599ea29b55f5cf9dbc1f12ba044cae1a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2e02700f7cfecb213de50be83e066086bea90278cd753db7fdc2ccff@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2f732ee49d00610683ab5ddb4692ab25136b00bfd132ca3a590218a9@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3042a9dd2973aa229e52d022df7813e4d74b67df73bfa6d97bb0caf8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r336b1694a01858111e4625fb9ab2b07ad43a64a525cf6402e06aa6bf@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r351298dd39fc1ab63303be94b0c0d08acd72b17448e0346d7386189b@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E
https://lists.apache.org/thread.html/r382870d6ccfd60533eb0d980688261723ed8a0704dafa691c4e9aa68@%3Ccommits.iotdb.apache.org%3E
https://lists.apache.org/thread.html/r3a763de620be72b6d74f46ec4bf39c9f35f8a0b39993212c0ac778ec@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r3b0ce1549a1ccdd7e51ec66daf8d54d46f1571edbda88ed09c96d7da@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3e05ab0922876e74fea975d70af82b98580f4c14ba643c4f8a9e3a94@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3f32cb4965239399c22497a0aabb015b28b2372d4897185a6ef0ccd7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r407c316f6113dfc76f7bb3cb1693f08274c521064a92e5214197548e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4179c71908778cc0598ee8ee1eaed9b88fc5483c65373f45e087f650@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r44115ebfbf3b7d294d7a75f2d30bcc822dab186ebbcc2dce11915ca9@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4946ffd86ad6eb7cb7863311235c914cb41232380de8d9dcdb3c115c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4f29fb24639ebc5d15fc477656ebc2b3aa00fcfbe197000009c26b40@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r503045a75f4419d083cb63ac89e765d6fb8b10c7dacc0c54fce07cff@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/r547bb14c88c5da2588d853ed3030be0109efa537dd797877dff14afd@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5494fdaf4a0a42a15c49841ba7ae577d466d09239ee1050458da0f29@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r556787f1ab14da034d79dfff0c123c05877bbe89ef163fd359b4564c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r568d354961fa88f206dc345411fb11d245c6dc1a8da3e80187fc6706@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r58f5b14dc5ae43583db3a7e872419aca97ebe47bcd7f7334f4128016@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r59e0878013d329dcc481eeafebdb0ee445b1e2852d0c4827b1ddaff2@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5a07f274f355c914054c7357ad6d3456ffaca064f26cd780acb90a9a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5a9462096c71593e771602beb0e69357adb5175d9a5c18d5181e0ab4@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6236ae4adc401e3b2f2575c22865f2f6c6ea9ff1d7b264b40d9602af@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r66e99d973fd79ddbcb3fbdb24f4767fe9b911f5b0abb05d7b6f65801@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r6b83ca85c8f9a6794b1f85bc70d1385ed7bc1ad07750d0977537154a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6dfa64ecc3d67c1a71c08bfa04064549179d499f8e20a8285c57bd51@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6f51a654ac2e67e3d1c65a8957cbbb127c3f15b64b4fcd626df03633@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r70f8bcccd304bd66c1aca657dbfc2bf11f73add9032571b01f1f733d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r71da5f51ef04cb95abae560425dce9667740cbd567920f516f76efb7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r73b5a9b677b707bbb7c1469ea746312c47838b312603bada9e382bba@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r761a52f1e214efec286ee80045d0012e955eebaa72395ad62cccbcfc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r769411eb43dd9ef77665700deb7fc491fc3ceb532914260c90b56f2f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r77dd041d8025a869156481d2268c67ad17121f64e31f9b4a1a220145@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r7bdc83513c12db1827b79b8d57a7a0975a25d28bc6c5efe590ec1e02@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r7da5ae60d7973e8894cfe92f49ecb5b47417eefab4c77cc87514d3cf@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r8045eedd6bb74efcd8e01130796adbab98ee4a0d1273509fb1f2077a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r819857361f5a156e90d6d06ccf6c41026bc99030d60d0804be3a9957@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r827d17bf6900eddc686f4b6ee16fc5e52ca0070f8df7612222c40ac5@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r874688141495df766e62be095f1dfb0bf4a24ca0340d8e0215c03fab@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r87b0c69fef09277333a7e1716926d1f237d462e143a335854ddd922f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r87d8337300a635d66f0bb838bf635cdfcbba6b92c608a7813adbf4f4@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8866f0cd2a3b319288b7eea20ac137b9f260c813d10ee2db88b65d32@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8cacf91ae1b17cc6531d20953c52fa52f6fd3191deb3383446086ab7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8dd01541fc49d24ec223365a9974231cbd7378b749247a89b0a52210@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8fead0144bb84d8714695c43607dca9c5101aa028a431ec695882fe5@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r90b5ac6e2bf190a5297bda58c7ec76d01cd86ff050b2470fcd9f4b35@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r911c1879258ebf98bca172c0673350eb7ea6569ca1735888d4cb7adc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r916b6542bd5b15a8a7ff8fc14a0e0331e8e3e9d682f22768ae71d775@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r93b240be16e642579ed794325bae31b040e1af896ecc12466642e19d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r93d5e81e879120d8d87925dbdd4045cb3afa9b066f4370f60b626ce3@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r9b790fe3a93121199f41258474222f15002b2f729495aa7ecbf90718@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9c010b79140452294292379183e7fe8e3533c5bb4db3f3fb39a6df61@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9cc76b98f87738791b8ec3736755f92444d3c8cb26bd4e4ffdb5c1cc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9cd444f944241dc26d9b8b007fe8971ed7f005b56befef7a4f4fb827@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9d9b4b93df7f92cdf1147db0fc169be1776c93d1fbc63bc65721fffd@%3Cdev.knox.apache.org%3E
https://lists.apache.org/thread.html/r9f8c45a2a4540911cd8bd0485f67e8091883c9234d7a3aeb349c46c1@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/ra1f19625cc67ac1b459c558f2ea5647d71ce51c6fe4f4cb03baec849@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra55e04d5a73afcb8383f4386e2b26832c6e3972e53827021ab885943@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/ra5b7313d8cc9411db6790adfba33f2cf0665cb77adb7b02043c95867@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/raa9c370ab42d737e93bc1795bb6a2187d7c60210cd5e3b3ce8f3c484@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rad255c736fad46135f1339408cb0147d0671e45c376c3be85ceeec1a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rae15d73cabef55bad148e4e6449b05da95646a2a8db3fc938e858dff@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/raf9c581b793c30ff8f55f2415c7bd337eb69775aae607bf9ed1b16fb@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rafb023a7c61180a1027819678eb2068b0b60cd5c2559cb8490e26c81@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb077d35f2940191daeefca0d6449cddb2e9d06bcf8f5af4da2df3ca2@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb5f2558ea2ac63633dfb04db1e8a6ea6bb1a2b8614899095e16c6233@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb69b1d7008a4b3de5ce5867e41a455693907026bc70ead06867aa323@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb7e159636b26156f6ef2b2a1a79b3ec9a026923b5456713e68f7c18e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb81a018f83fe02c95a2138a7bb4f1e1677bd7e1fc1e7024280c2292d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb8ad3745cb94c60d44cc369aff436eaf03dbc93112cefc86a2ed53ba@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb8c007f87dc57731a7b9a3b05364530422535b7e0bc6a0c5b68d4d55@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rbc5a622401924fadab61e07393235838918228b3d8a1a6704295b032@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rbc5a8d7a0a13bc8152d427a7e9097cdeb139c6cfe111b2f00f26d16b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbf99e4495461099cad9aa62e0164f8f25a7f97b791b4ace56e375f8d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1646894341450fdc4f7e96a88f5e2cf18d8004714f98aec6b831b3e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1d9b8e9d17749d4d2b9abaaa72c422d090315bd6bc0ae73a16abc1c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc2e24756d28580eeac811c5c6a12012c9f424b6e5bffb89f98ee3d03@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rc44d1147f78496ec9932a38b28795ff4fd0c4fa6e3b6f5cc33c14d29@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc4b972ea10c5a65c6a88a6e233778718ab9af7f484affdd5e5de0cff@%3Ccommits.felix.apache.org%3E
https://lists.apache.org/thread.html/rc77918636d8744d50312e4f67ba2e01f47db3ec5144540df8745cb38@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc8dd95802be0cca8d7d0929c0c8484ede384ecb966b2a9dc7197b089@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rc9d2ab8a6c7835182f20b01104798e67c75db655c869733a0713a590@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rccedec4cfd5df6761255b71349e3b7c27ee0745bd33698a71b1775cf@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcdcf32952397c83a1d617a8c9cd5c15c98b8d0d38a607972956bde7e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcdd56ab4255801a0964dcce3285e87f2c6994e6469e189f6836f34e3@%3Cnotifications.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rcfb95a7c69c4b9c082ea1918e812dfc45aa0d1e120fd47f68251a336@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcff5caebfd535195276aaabc1b631fd55a4ff6b14e2bdfe33f18ff91@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd58b60ab2e49ebf21022e59e280feb25899ff785c88f31fe314aa5b9@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/rd7e62e2972a41c2658f41a824b8bdd15644d80fcadc51fe7b7c855de@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rdbf1cd0ab330c032f3a09b453cb6405dccc905ad53765323bddab957@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rdddb4b06e86fd58a1beda132f22192af2f9b56aae8849cb3767ccd55@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rde11c433675143d8d27551c3d9e821fe1955f1551a518033d3716553@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rde782fd8e133f7e04e50c8aaa4774df524367764eb5b85bf60d96747@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re08b03cd1754b32f342664eead415af48092c630c8e3e0deba862a26@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/re5706141ca397587f7ee0f500a39ccc590a41f802fc125fc135cb92f@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ree506849c4f04376793b1a3076bc017da60b8a2ef2702dc214ff826f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/refbbb0eb65c185d1fa491cee08ac8ed32708ce3b269133a6da264317@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rf00ea6376f3d0e8b8f62cf6d4a4f28b24e27193acd2c851f618aa41e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rf3bc023a7cc729aeac72f482e2eeeab9008aa6b1dadbeb3f45320cae@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfd9f102864a039f7fda64a580dfe1a342d65d7b723ca06dc9fbceb31@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfe5caef1fd6cf4b8ceac1b63c33195f2908517b665c946c020d3fbd6@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfe6ba83d14545e982400dea89e68b10113cb5202a3dcb558ce64842d@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rff0ad6a7dac2182421e2db2407e44fbb61a89904adfd91538f21fbf8@%3Cissues.beam.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27216
https://security.netapp.com/advisory/ntap-20201123-0005/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.eclipse.jetty:jetty-http | CVE-2021-28165 | HIGH | 9.4.29.v20200521 | 9.4.39.v20210325, 10.0.2, 11.0.2 |
Expand...http://www.openwall.com/lists/oss-security/2021/04/20/3
https://access.redhat.com/security/cve/CVE-2021-28165
https://github.com/advisories/GHSA-26vr-8j45-3r4w
https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w
https://lists.apache.org/thread.html/r002258611ed0c35b82b839d284b43db9dcdec120db8afc1c993137dc@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r03ca0b69db1e3e5f72fe484b71370d537cd711cbf334e2913332730a@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r05db8e0ef01e1280cc7543575ae0fa1c2b4d06a8b928916ef65dd2ad@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r06d54a297cb8217c66e5190912a955fb870ba47da164002bf2baffe5@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r077b76cafb61520c14c87c4fc76419ed664002da0ddac5ad851ae7e7@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r0a241b0649beef90d422b42a26a2470d336e59e66970eafd54f9c3e2@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0a4797ba6ceea8074f47574a4f3cc11493d514c1fab8203ebd212add@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r0bf3aa065abd23960fc8bdc8090d6bc00d5e391cf94ec4e1f4537ae3@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r0cd1a5e3f4ad4770b44f8aa96572fc09d5b35bec149c0cc247579c42@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r0f02034a33076fd7243cf3a8807d2766e373f5cb2e7fd0c9a78f97c4@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r17e26cf9a1e3cbc09522d15ece5d7c7a00cdced7641b92a22a783287@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r23785214d47673b811ef119ca3a40f729801865ea1e891572d15faa6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r2afc72af069a7fe89ca2de847f3ab3971cb1d668a9497c999946cd78@%3Ccommits.spark.apache.org%3E
https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r2f2d9c3b7cc750a6763d6388bcf5db0c7b467bd8be6ac4d6aea4f0cf@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r31f591a0deac927ede8ccc3eac4bb92697ee2361bf01549f9e3440ca@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r33eb3889ca0aa12720355e64fc2f8f1e8c0c28a4d55b3b4b8891becb@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r40136c2010fccf4fb2818a965e5d7ecca470e5f525c232ec5b8eb83a@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r401b1c592f295b811608010a70792b11c91885b72af9f9410cffbe35@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r411d75dc6bcefadaaea246549dd18e8d391a880ddf28a796f09ce152@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r47a7542ab61da865fff3db0fe74bfe76c89a37b6e6d2c2a423f8baee@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r4891d45625cc522fe0eb764ac50d48bcca9c0db4805ea4a998d4c225@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r4abbd760d24bab2b8f1294c5c9216ae915100099c4391ad64e9ae38b@%3Cdev.hbase.apache.org%3E
https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r520c56519b8820955a86966f499e7a0afcbcf669d6f7da59ef1eb155@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r56e5568ac73daedcb3b5affbb4b908999f03d3c1b1ada3920b01e959@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r5d1f16dca2e010193840068f1a1ec17b7015e91acc646607cbc0a4da@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r5f172f2dd8fb02f032ef4437218fd4f610605a3dd4f2a024c1e43b94@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r64ff94118f6c80e6c085c6e2d51bbb490eaefad0642db8c936e4f0b7@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r6535b2beddf0ed2d263ab64ff365a5f790df135a1a2f45786417adb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r65daad30d13f7c56eb5c3d7733ad8dddbf62c469175410777a78d812@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r694e57d74fcaa48818a03c282aecfa13ae68340c798dfcb55cb7acc7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r6b070441871a4e6ce8bb63e190c879bb60da7c5e15023de29ebd4f9f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r6ce2907b2691c025250ba010bc797677ef78d5994d08507a2e5477c9@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r6f256a1d15505f79f4050a69bb8f27b34cb353604dd2f765c9da5df7@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r71031d0acb1de55c9ab32f4750c50ce2f28543252e887ca03bd5621e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r7189bf41cb0c483629917a01cf296f9fbdbda3987084595192e3845d@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r72bf813ed4737196ea3ed26494e949577be587fd5939fe8be09907c7@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r746434be6abff9ad321ff54ecae09e1f09c1c7c139021f40a5774090@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r769155244ca2da2948a44091bb3bb9a56e7e1c71ecc720b8ecf281f0@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7bf7004c18c914fae3d5a6a0191d477e5b6408d95669b3afbf6efa36@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7c40fb3a66a39b6e6c83b0454bc6917ffe6c69e3131322be9c07a1da@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r81748d56923882543f5be456043c67daef84d631cf54899082058ef1@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r83453ec252af729996476e5839d0b28f07294959d60fea1bd76f7d81@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r90327f55db8f1d079f9a724aabf1f5eb3c00c1de49dc7fd04cad1ebc@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r940f15db77a96f6aea92d830bc94d8d95f26cc593394d144755824da@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r942f4a903d0abb25ac75c592e57df98dea51350e8589269a72fd7913@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r9b793db9f395b546e66fb9c44fe1cd75c7755029e944dfee31b8b779@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r9db72e9c33b93eba45a214af588f1d553839b5c3080fc913854a49ab@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r9fae5a4087d9ed1c9d4f0c7493b6981a4741cfb4bebb2416da638424@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/ra210e38ae0bf615084390b26ba01bb5d66c0a76f232277446ae0948a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra21b3e6bd9669377139fe33fb46edf6fece3f31375bc42a0dcc964b2@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra50519652b0b7f869a14fbfb4be9758a29171d7fe561bb7e036e8449@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/ra9dd15ba8a4fb7e42c7fe948a6d6b3868fd6bbf8e3fb37fcf33b2cd0@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rae8bbc5a516f3e21b8a55e61ff6ad0ced03bdbd116d2170a3eed9f5c@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/raea6e820644e8c5a577f77d4e2044f8ab52183c2536b00c56738beef@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb00345f6b1620b553d2cc1acaf3017aa75cea3776b911e024fa3b187@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb11a13e623218c70b9f2a2d0d122fdaaf905e04a2edcd23761894464@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb1624b9777a3070135e94331a428c6653a6a1edccd56fa9fb7a547f2@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb2d34abb67cdf525945fe4b821c5cdbca29a78d586ae1f9f505a311c@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb66ed0b4bb74836add60dd5ddf9172016380b2aeefb7f96fe348537b@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb8f5a6ded384eb00608e6137e87110e7dd7d5054cc34561cb89b81af@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rbab9e67ec97591d063905bc7d4743e6a673f1bc457975fc0445ac97f@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rbba0b02a3287e34af328070dd58f7828612f96e2e64992137f4dc63d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rbcd7b477df55857bb6cae21fcc4404683ac98aac1a47551f0dc55486@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbd9a837a18ca57ac0d9b4165a6eec95ee132f55d025666fe41099f33@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rc4779abc1cface47e956cf9f8910f15d79c24477e7b1ac9be076a825@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rc4dbc9907b0bdd634200ac90a15283d9c143c11af66e7ec72128d020@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rc6c43c3180c0efe00497c73dd374cd34b62036cb67987ad42c1f2dce@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rc907ed7b089828364437de5ed57fa062330970dc1bc5cd214b711f77@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rcdea97f4d3233298296aabc103c9fcefbf629425418c2b69bb16745f@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rd24d8a059233167b4a5aebda4b3534ca1d86caa8a85b10a73403ee97@%3Ccommits.spark.apache.org%3E
https://lists.apache.org/thread.html/rd6c1eb9a8a94b3ac8a525d74d792924e8469f201b77e1afcf774e7a6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rd755dfe5f658c42704540ad7950cebd136739089c3231658e398cf38@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E
https://lists.apache.org/thread.html/rd9ea411a58925cc82c32e15f541ead23cb25b4b2d57a2bdb0341536e@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rdbf2a2cd1800540ae50dd78b57411229223a6172117d62b8e57596aa@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rdde34d53aa80193cda016272d61e6749f8a9044ccb37a30768938f7e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rdf4fe435891e8c35e70ea5da033b4c3da78760f15a8c4212fad89d9f@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rdfe5f1c071ba9dadba18d7fb0ff13ea6ecb33da624250c559999eaeb@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/re0545ecced2d468c94ce4dcfa37d40a9573cc68ef5f6839ffca9c1c1@%3Ccommits.hbase.apache.org%3E
https://lists.apache.org/thread.html/re3a1617d16a7367f767b8209b2151f4c19958196354b39568c532f26@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/re577736ca7da51952c910b345a500b7676ea9931c9b19709b87f292b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re6614b4fe7dbb945409daadb9e1cc73c02383df68bf9334736107a6e@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ree1895a256a9db951e0d97a76222909c2e1f28c1a3d89933173deed6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf1b02dfccd27b8bbc3afd119b212452fa32e9ed7d506be9357a3a7ec@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf6de4c249bd74007f5f66f683c110535f46e719d2f83a41e8faf295f@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf99f9a25ca24fe519c9346388f61b5b3a09be31b800bf37f01473ad7@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rfc9f51b4e21022b3cd6cb6f90791a6a6999560212e519b5f09db0aed@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rfd3ff6e66b6bbcfb2fefa9f5a20328937c0369b2e142e3e1c6774743@%3Creviews.spark.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-28165
https://security.netapp.com/advisory/ntap-20210611-0006/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| org.eclipse.jetty:jetty-http | CVE-2020-27223 | MEDIUM | 9.4.29.v20200521 | 9.4.36.v20210114, 11.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27223
https://bugs.eclipse.org/bugs/show_bug.cgi?id=571128
https://github.com/advisories/GHSA-m394-8rww-3jr7
https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7
https://lists.apache.org/thread.html/r068dfd35ce2193f6af28b74ff29ab148c2b2cacb235995576f5bea78@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r07aedcb1ece62969c406cb84c8f0e22cec7e42cdc272f3176e473320@%3Cusers.solr.apache.org%3E
https://lists.apache.org/thread.html/r0b639bd9bfaea265022125d18acd2fc6456044b76609ec74772c9567@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0c6eced465950743f3041b03767a32b2e98d19731bd72277fc7ea428@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0cdab13815fc419805a332278c8d27e354e78560944fc36db0bdc760@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0e25cdf3722a24c53049d37396f0da8502cb4b7cdc481650dc601dbc@%3Cgitbox.activemq.apache.org%3E
https://lists.apache.org/thread.html/r105f4e52feb051faeb9141ef78f909aaf5129d6ed1fc52e099c79463@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r1414ab2b3f4bb4c0e736caff6dc8d15f93f6264f0cca5c47710d7bb3@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r1b7ed296a865e3f1337a96ee9cd51f6d154d881a30da36020ca72a4b@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r1b803e6ebdac5f670708878fb1b27cd7a0ce9d774a60e797e58cee6f@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r26d9196f4d2afb9bec2784bcb6fc183aca82e4119bf41bdc613eec01@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r27ad7843d060762cc942820566eeaa9639f75371afedf8124b943283@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r2c2c7b2971360fb946bbf062c58d7245927dd1ce9150fc9987f65409@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r35ab810c0f3016b3fd3a3fa9088a2d2781b354a810780ce74d022b6c@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r409ee2bae66bfff6aa89e6c74aff535e6248260d3afcb42bfb3b316b@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r463b12b27264c5e1e3c48c8c2cc5d33813d2f0d981102548fb3102fb@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r492cff8488a7f6eb96700afb5d137b719ddb80a833e77f971d2691c6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r4a456d89a83752a012d88a60ff4b21def6c9f650b9e69ea9fa11c9f9@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r4c92ea39167c0f7b096ae8268db496b5451d69606f0304b7c8a994c7@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r51f8975ef47c12a46fbfd7da9efea7f08e1d307fe1dc3042514659ae@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r521a077885ce79c44a799118c878589e81e525cab72d368e5cfb6f61@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r5612dc69e1f79c421faf9764ffbc92591e2a69ea417c04cba57f49ea@%3Cuser.karaf.apache.org%3E
https://lists.apache.org/thread.html/r562a0cbc5c8cac4d000a27b2854a8ab1b924aa9dd45f8ffbea98e5ad@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5b7cc6ac733e0b35816751cf45d152ae246a3f40e0b1e62b101c9522@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r601f15f3de7ae3a7bbcd780c19155075c56443c2cdc1d193c03b4182@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r65c714241b9d064a44fec10d60ebf5a37d5ebadd6bf88b0eed13ade0@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r734f996149bb9b1796740385fcbdf3e093eb9aabedc0f20a48ea1d68@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r75ee2a529edb892ac59110cb3f6f91844a932c5034e16c8317f5668d@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7f4ad5eec0bce2821c308bb23cac53df5c94eb84de1c58de9b95c176@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7fbdb7880be1566f943d80fbbeefde2115c086eba1bef3115350a388@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7ffd050d3bd7c90d95f4933560b5f4f15971ab9a5f5322fdce116243@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r857b31ad16c6e76002bc6cca73c83358ed2595477e288286ee82c48d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r897a6a14d03eab09e89b809d2a650f3765065201da5bc3db9a4dd6e8@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8b1963f16d6cb1230ca7ee73b6ec4f5c48f344191dbb1caabd265ee4@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8dc1b13b80d39fbf4a9d158850e15cd868f0460c2f364f13dca7050b@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra2f529da674f25a7351543544f7d621b5227c49a0745913b1194d11e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/ra384892bab8c03a60613a6a9d5e9cae0a2b800fd882792a55520115e@%3Ccommits.kafka.apache.org%3E
https://lists.apache.org/thread.html/ra40a88a2301a3da86e25b501ff4bc88124f2b816c2917d5f3497f8f0@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra47a26c008487b0a739a368c846e168de06c3cd118d31ecedafa679a@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/raa6d60b00b67c0550672b4f506f0df75b323dcd25cf574e91e2f2dff@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb79b62ac3085e05656e41865f5a7efcbdc7dcd7843abed9c5fe0fef8@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc052fd4e9e9c01bead74c0b5680355ea5dc3b72d46f253cb65d03e43@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rc721fe2910533bffb6bd4d69ea8ff4f36066d260dbcd2d14e041614a@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rd666e187ebea2fda8624683ab51e2a5ad2108f762d21bf1a383d7502@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rdd6c47321db1bfe12c68a898765bf3b6f97e2afa6a501254ed4feaed@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/re03a4dbc15df6f390a2f8c0a071c31c8324dbef007e59fdc2592091a@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/re19fa47ec901cc3cf6d7784027198e8113f8bc2dbfd6c9d6d13f5447@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re3bd4f831f9be49871cb6adb997289b5dbcd6fe4bc5cb08223254080@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/re43768896273c0b5f1a03d7f0a9d370852074489d51825fdc0d77f0f@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E
https://lists.apache.org/thread.html/reb3c6dc050c7ee18ea154cd94dba85d99aa6b02b84c4bb2138a4abf2@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/reca91f217f9e1ce607ce6e19a1c0b3db82b5b1b58cf39a84d6434695@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf190d1d28e1367d1664ef6bc2f71227566d7b6b39209817a5364da1f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rf6c2efa3137bc8c22707e550a1f9b80f74bca62b9c8a6f768f2c6b86@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf77f4c4583669f1133d58cc4f1964367e253818ed8db986bb2732f7c@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rff630ce92a4d1bb494fc1a3f9b57a3d60819b436505bcd8c6ccc713c@%3Ccommits.kafka.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-27223
https://security.netapp.com/advisory/ntap-20210401-0005/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com/security-alerts/cpuApr2021.html
| +| org.eclipse.jetty:jetty-http | CVE-2020-27223 | MEDIUM | 9.4.29.v20200521 | 9.4.37.v20210219, 11.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27223
https://bugs.eclipse.org/bugs/show_bug.cgi?id=571128
https://github.com/advisories/GHSA-m394-8rww-3jr7
https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7
https://lists.apache.org/thread.html/r068dfd35ce2193f6af28b74ff29ab148c2b2cacb235995576f5bea78@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r07aedcb1ece62969c406cb84c8f0e22cec7e42cdc272f3176e473320@%3Cusers.solr.apache.org%3E
https://lists.apache.org/thread.html/r0b639bd9bfaea265022125d18acd2fc6456044b76609ec74772c9567@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0c6eced465950743f3041b03767a32b2e98d19731bd72277fc7ea428@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0cdab13815fc419805a332278c8d27e354e78560944fc36db0bdc760@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0e25cdf3722a24c53049d37396f0da8502cb4b7cdc481650dc601dbc@%3Cgitbox.activemq.apache.org%3E
https://lists.apache.org/thread.html/r105f4e52feb051faeb9141ef78f909aaf5129d6ed1fc52e099c79463@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r1414ab2b3f4bb4c0e736caff6dc8d15f93f6264f0cca5c47710d7bb3@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r1b7ed296a865e3f1337a96ee9cd51f6d154d881a30da36020ca72a4b@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r1b803e6ebdac5f670708878fb1b27cd7a0ce9d774a60e797e58cee6f@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r26d9196f4d2afb9bec2784bcb6fc183aca82e4119bf41bdc613eec01@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r27ad7843d060762cc942820566eeaa9639f75371afedf8124b943283@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r2c2c7b2971360fb946bbf062c58d7245927dd1ce9150fc9987f65409@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r35ab810c0f3016b3fd3a3fa9088a2d2781b354a810780ce74d022b6c@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r409ee2bae66bfff6aa89e6c74aff535e6248260d3afcb42bfb3b316b@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r463b12b27264c5e1e3c48c8c2cc5d33813d2f0d981102548fb3102fb@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r492cff8488a7f6eb96700afb5d137b719ddb80a833e77f971d2691c6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r4a456d89a83752a012d88a60ff4b21def6c9f650b9e69ea9fa11c9f9@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r4c92ea39167c0f7b096ae8268db496b5451d69606f0304b7c8a994c7@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r51f8975ef47c12a46fbfd7da9efea7f08e1d307fe1dc3042514659ae@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r521a077885ce79c44a799118c878589e81e525cab72d368e5cfb6f61@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r5612dc69e1f79c421faf9764ffbc92591e2a69ea417c04cba57f49ea@%3Cuser.karaf.apache.org%3E
https://lists.apache.org/thread.html/r562a0cbc5c8cac4d000a27b2854a8ab1b924aa9dd45f8ffbea98e5ad@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5b7cc6ac733e0b35816751cf45d152ae246a3f40e0b1e62b101c9522@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r601f15f3de7ae3a7bbcd780c19155075c56443c2cdc1d193c03b4182@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r65c714241b9d064a44fec10d60ebf5a37d5ebadd6bf88b0eed13ade0@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r734f996149bb9b1796740385fcbdf3e093eb9aabedc0f20a48ea1d68@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r75ee2a529edb892ac59110cb3f6f91844a932c5034e16c8317f5668d@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7f4ad5eec0bce2821c308bb23cac53df5c94eb84de1c58de9b95c176@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7fbdb7880be1566f943d80fbbeefde2115c086eba1bef3115350a388@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7ffd050d3bd7c90d95f4933560b5f4f15971ab9a5f5322fdce116243@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r857b31ad16c6e76002bc6cca73c83358ed2595477e288286ee82c48d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r897a6a14d03eab09e89b809d2a650f3765065201da5bc3db9a4dd6e8@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8b1963f16d6cb1230ca7ee73b6ec4f5c48f344191dbb1caabd265ee4@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8dc1b13b80d39fbf4a9d158850e15cd868f0460c2f364f13dca7050b@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra2f529da674f25a7351543544f7d621b5227c49a0745913b1194d11e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/ra384892bab8c03a60613a6a9d5e9cae0a2b800fd882792a55520115e@%3Ccommits.kafka.apache.org%3E
https://lists.apache.org/thread.html/ra40a88a2301a3da86e25b501ff4bc88124f2b816c2917d5f3497f8f0@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra47a26c008487b0a739a368c846e168de06c3cd118d31ecedafa679a@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/raa6d60b00b67c0550672b4f506f0df75b323dcd25cf574e91e2f2dff@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb79b62ac3085e05656e41865f5a7efcbdc7dcd7843abed9c5fe0fef8@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc052fd4e9e9c01bead74c0b5680355ea5dc3b72d46f253cb65d03e43@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rc721fe2910533bffb6bd4d69ea8ff4f36066d260dbcd2d14e041614a@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rd666e187ebea2fda8624683ab51e2a5ad2108f762d21bf1a383d7502@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rdd6c47321db1bfe12c68a898765bf3b6f97e2afa6a501254ed4feaed@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/re03a4dbc15df6f390a2f8c0a071c31c8324dbef007e59fdc2592091a@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/re19fa47ec901cc3cf6d7784027198e8113f8bc2dbfd6c9d6d13f5447@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re3bd4f831f9be49871cb6adb997289b5dbcd6fe4bc5cb08223254080@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/re43768896273c0b5f1a03d7f0a9d370852074489d51825fdc0d77f0f@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E
https://lists.apache.org/thread.html/reb3c6dc050c7ee18ea154cd94dba85d99aa6b02b84c4bb2138a4abf2@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/reca91f217f9e1ce607ce6e19a1c0b3db82b5b1b58cf39a84d6434695@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf190d1d28e1367d1664ef6bc2f71227566d7b6b39209817a5364da1f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rf6c2efa3137bc8c22707e550a1f9b80f74bca62b9c8a6f768f2c6b86@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf77f4c4583669f1133d58cc4f1964367e253818ed8db986bb2732f7c@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rff630ce92a4d1bb494fc1a3f9b57a3d60819b436505bcd8c6ccc713c@%3Ccommits.kafka.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-27223
https://security.netapp.com/advisory/ntap-20210401-0005/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com/security-alerts/cpuApr2021.html
| | org.eclipse.jetty:jetty-io | CVE-2021-28165 | HIGH | 9.4.29.v20200521 | 9.4.39.v20210325, 10.0.2, 11.0.2 |
Expand...http://www.openwall.com/lists/oss-security/2021/04/20/3
https://access.redhat.com/security/cve/CVE-2021-28165
https://github.com/advisories/GHSA-26vr-8j45-3r4w
https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w
https://lists.apache.org/thread.html/r002258611ed0c35b82b839d284b43db9dcdec120db8afc1c993137dc@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r03ca0b69db1e3e5f72fe484b71370d537cd711cbf334e2913332730a@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r05db8e0ef01e1280cc7543575ae0fa1c2b4d06a8b928916ef65dd2ad@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r06d54a297cb8217c66e5190912a955fb870ba47da164002bf2baffe5@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r077b76cafb61520c14c87c4fc76419ed664002da0ddac5ad851ae7e7@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r0a241b0649beef90d422b42a26a2470d336e59e66970eafd54f9c3e2@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0a4797ba6ceea8074f47574a4f3cc11493d514c1fab8203ebd212add@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r0bf3aa065abd23960fc8bdc8090d6bc00d5e391cf94ec4e1f4537ae3@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r0cd1a5e3f4ad4770b44f8aa96572fc09d5b35bec149c0cc247579c42@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r0f02034a33076fd7243cf3a8807d2766e373f5cb2e7fd0c9a78f97c4@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r17e26cf9a1e3cbc09522d15ece5d7c7a00cdced7641b92a22a783287@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r23785214d47673b811ef119ca3a40f729801865ea1e891572d15faa6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r2afc72af069a7fe89ca2de847f3ab3971cb1d668a9497c999946cd78@%3Ccommits.spark.apache.org%3E
https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r2f2d9c3b7cc750a6763d6388bcf5db0c7b467bd8be6ac4d6aea4f0cf@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r31f591a0deac927ede8ccc3eac4bb92697ee2361bf01549f9e3440ca@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r33eb3889ca0aa12720355e64fc2f8f1e8c0c28a4d55b3b4b8891becb@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r40136c2010fccf4fb2818a965e5d7ecca470e5f525c232ec5b8eb83a@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r401b1c592f295b811608010a70792b11c91885b72af9f9410cffbe35@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r411d75dc6bcefadaaea246549dd18e8d391a880ddf28a796f09ce152@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r47a7542ab61da865fff3db0fe74bfe76c89a37b6e6d2c2a423f8baee@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r4891d45625cc522fe0eb764ac50d48bcca9c0db4805ea4a998d4c225@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r4abbd760d24bab2b8f1294c5c9216ae915100099c4391ad64e9ae38b@%3Cdev.hbase.apache.org%3E
https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r520c56519b8820955a86966f499e7a0afcbcf669d6f7da59ef1eb155@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r56e5568ac73daedcb3b5affbb4b908999f03d3c1b1ada3920b01e959@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r5d1f16dca2e010193840068f1a1ec17b7015e91acc646607cbc0a4da@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r5f172f2dd8fb02f032ef4437218fd4f610605a3dd4f2a024c1e43b94@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r64ff94118f6c80e6c085c6e2d51bbb490eaefad0642db8c936e4f0b7@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r6535b2beddf0ed2d263ab64ff365a5f790df135a1a2f45786417adb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r65daad30d13f7c56eb5c3d7733ad8dddbf62c469175410777a78d812@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r694e57d74fcaa48818a03c282aecfa13ae68340c798dfcb55cb7acc7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r6b070441871a4e6ce8bb63e190c879bb60da7c5e15023de29ebd4f9f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r6ce2907b2691c025250ba010bc797677ef78d5994d08507a2e5477c9@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r6f256a1d15505f79f4050a69bb8f27b34cb353604dd2f765c9da5df7@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r71031d0acb1de55c9ab32f4750c50ce2f28543252e887ca03bd5621e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r7189bf41cb0c483629917a01cf296f9fbdbda3987084595192e3845d@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r72bf813ed4737196ea3ed26494e949577be587fd5939fe8be09907c7@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r746434be6abff9ad321ff54ecae09e1f09c1c7c139021f40a5774090@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r769155244ca2da2948a44091bb3bb9a56e7e1c71ecc720b8ecf281f0@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7bf7004c18c914fae3d5a6a0191d477e5b6408d95669b3afbf6efa36@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7c40fb3a66a39b6e6c83b0454bc6917ffe6c69e3131322be9c07a1da@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r81748d56923882543f5be456043c67daef84d631cf54899082058ef1@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r83453ec252af729996476e5839d0b28f07294959d60fea1bd76f7d81@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r90327f55db8f1d079f9a724aabf1f5eb3c00c1de49dc7fd04cad1ebc@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r940f15db77a96f6aea92d830bc94d8d95f26cc593394d144755824da@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r942f4a903d0abb25ac75c592e57df98dea51350e8589269a72fd7913@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r9b793db9f395b546e66fb9c44fe1cd75c7755029e944dfee31b8b779@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r9db72e9c33b93eba45a214af588f1d553839b5c3080fc913854a49ab@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r9fae5a4087d9ed1c9d4f0c7493b6981a4741cfb4bebb2416da638424@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/ra210e38ae0bf615084390b26ba01bb5d66c0a76f232277446ae0948a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra21b3e6bd9669377139fe33fb46edf6fece3f31375bc42a0dcc964b2@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra50519652b0b7f869a14fbfb4be9758a29171d7fe561bb7e036e8449@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/ra9dd15ba8a4fb7e42c7fe948a6d6b3868fd6bbf8e3fb37fcf33b2cd0@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rae8bbc5a516f3e21b8a55e61ff6ad0ced03bdbd116d2170a3eed9f5c@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/raea6e820644e8c5a577f77d4e2044f8ab52183c2536b00c56738beef@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb00345f6b1620b553d2cc1acaf3017aa75cea3776b911e024fa3b187@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb11a13e623218c70b9f2a2d0d122fdaaf905e04a2edcd23761894464@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb1624b9777a3070135e94331a428c6653a6a1edccd56fa9fb7a547f2@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb2d34abb67cdf525945fe4b821c5cdbca29a78d586ae1f9f505a311c@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb66ed0b4bb74836add60dd5ddf9172016380b2aeefb7f96fe348537b@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb8f5a6ded384eb00608e6137e87110e7dd7d5054cc34561cb89b81af@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rbab9e67ec97591d063905bc7d4743e6a673f1bc457975fc0445ac97f@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rbba0b02a3287e34af328070dd58f7828612f96e2e64992137f4dc63d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rbcd7b477df55857bb6cae21fcc4404683ac98aac1a47551f0dc55486@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbd9a837a18ca57ac0d9b4165a6eec95ee132f55d025666fe41099f33@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rc4779abc1cface47e956cf9f8910f15d79c24477e7b1ac9be076a825@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rc4dbc9907b0bdd634200ac90a15283d9c143c11af66e7ec72128d020@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rc6c43c3180c0efe00497c73dd374cd34b62036cb67987ad42c1f2dce@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rc907ed7b089828364437de5ed57fa062330970dc1bc5cd214b711f77@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rcdea97f4d3233298296aabc103c9fcefbf629425418c2b69bb16745f@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rd24d8a059233167b4a5aebda4b3534ca1d86caa8a85b10a73403ee97@%3Ccommits.spark.apache.org%3E
https://lists.apache.org/thread.html/rd6c1eb9a8a94b3ac8a525d74d792924e8469f201b77e1afcf774e7a6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rd755dfe5f658c42704540ad7950cebd136739089c3231658e398cf38@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E
https://lists.apache.org/thread.html/rd9ea411a58925cc82c32e15f541ead23cb25b4b2d57a2bdb0341536e@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rdbf2a2cd1800540ae50dd78b57411229223a6172117d62b8e57596aa@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rdde34d53aa80193cda016272d61e6749f8a9044ccb37a30768938f7e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rdf4fe435891e8c35e70ea5da033b4c3da78760f15a8c4212fad89d9f@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rdfe5f1c071ba9dadba18d7fb0ff13ea6ecb33da624250c559999eaeb@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/re0545ecced2d468c94ce4dcfa37d40a9573cc68ef5f6839ffca9c1c1@%3Ccommits.hbase.apache.org%3E
https://lists.apache.org/thread.html/re3a1617d16a7367f767b8209b2151f4c19958196354b39568c532f26@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/re577736ca7da51952c910b345a500b7676ea9931c9b19709b87f292b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re6614b4fe7dbb945409daadb9e1cc73c02383df68bf9334736107a6e@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ree1895a256a9db951e0d97a76222909c2e1f28c1a3d89933173deed6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf1b02dfccd27b8bbc3afd119b212452fa32e9ed7d506be9357a3a7ec@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf6de4c249bd74007f5f66f683c110535f46e719d2f83a41e8faf295f@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf99f9a25ca24fe519c9346388f61b5b3a09be31b800bf37f01473ad7@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rfc9f51b4e21022b3cd6cb6f90791a6a6999560212e519b5f09db0aed@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rfd3ff6e66b6bbcfb2fefa9f5a20328937c0369b2e142e3e1c6774743@%3Creviews.spark.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-28165
https://security.netapp.com/advisory/ntap-20210611-0006/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| org.eclipse.jetty:jetty-util | CVE-2020-27216 | HIGH | 9.4.29.v20200521 | 9.3.29.v20201019, 9.4.32.v20200930, 11.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27216
https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921
https://cwe.mitre.org/data/definitions/378.html
https://cwe.mitre.org/data/definitions/379.html
https://github.com/advisories/GHSA-g3wg-6mcf-8jj6
https://github.com/eclipse/jetty.project/issues/5451
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6#advisory-comment-63053
https://github.com/github/codeql/pull/4473
https://lists.apache.org/thread.html/r0259b14ae69b87821e27fed1f5333ea86018294fd31aab16b1fac84e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r07525dc424ed69b3919618599e762f9ac03791490ca9d724f2241442@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r09b345099b4f88d2bed7f195a96145849243fb4e53661aa3bcf4c176@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0d7ad4f02c44d5d53a9ffcbca7ff4a8138241322da9c5c35b5429630@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r0d95e01f52667f44835c40f6dea72bb4397f33cd70a564ea74f3836d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r0df8fe10fc36028cf6d0381ab66510917d0d68bc5ef7042001d03830@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0e9efe032cc65433251ee6470c66c334d4e7db9101e24cf91a3961f2@%3Ccommits.directory.apache.org%3E
https://lists.apache.org/thread.html/r0f5e9b93133ef3aaf31484bc3e15cc4b85f8af0fe4de2dacd9379d72@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r100c5c7586a23a19fdb54d8a32e17cd0944bdaa46277b35c397056f6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r171846414347ec5fed38241a9f8a009bd2c89d902154c6102b1fb39a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r185d10aae8161c08726f3ba9a1f1c47dfb97624ea6212fa217173204@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r18b6f10d9939419bae9c225d5058c97533cb376c9d6d0a0733ddd48d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r19e8b338af511641d211ff45c43646fe1ae19dc9897d69939c09cabe@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1d40368a309f9d835dcdd900249966e4fcbdf98c1cc4c84db2cd9964@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1d45051310b11c6d6476f20d71b08ea97cb76846cbf61d196bac1c3f@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1dbb87c9255ecefadd8de514fa1d35c1d493c0527d7672cf40505d04@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1ed79516bd6d248ea9f0e704dbfd7de740d5a75b71c7be8699fec824@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1ef28b89ff0281c87ba3a7659058789bf28a99b8074191f1c3678db8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1fe31643fc34b4a33ae3d416d92c271aa97663f1782767d25e1d9ff8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2122537d3f9beb0ce59f44371a951b226406719919656ed000984bd0@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r279254a1bd6434c943da52000476f307e62b6910755387aeca1ec9a1@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2aa316d008dab9ae48350b330d15dc1b863ea2a933558fbfc42b91a6@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2d17b2a4803096ba427f3575599ea29b55f5cf9dbc1f12ba044cae1a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2e02700f7cfecb213de50be83e066086bea90278cd753db7fdc2ccff@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2f732ee49d00610683ab5ddb4692ab25136b00bfd132ca3a590218a9@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3042a9dd2973aa229e52d022df7813e4d74b67df73bfa6d97bb0caf8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r336b1694a01858111e4625fb9ab2b07ad43a64a525cf6402e06aa6bf@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r351298dd39fc1ab63303be94b0c0d08acd72b17448e0346d7386189b@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E
https://lists.apache.org/thread.html/r382870d6ccfd60533eb0d980688261723ed8a0704dafa691c4e9aa68@%3Ccommits.iotdb.apache.org%3E
https://lists.apache.org/thread.html/r3a763de620be72b6d74f46ec4bf39c9f35f8a0b39993212c0ac778ec@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r3b0ce1549a1ccdd7e51ec66daf8d54d46f1571edbda88ed09c96d7da@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3e05ab0922876e74fea975d70af82b98580f4c14ba643c4f8a9e3a94@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3f32cb4965239399c22497a0aabb015b28b2372d4897185a6ef0ccd7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r407c316f6113dfc76f7bb3cb1693f08274c521064a92e5214197548e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4179c71908778cc0598ee8ee1eaed9b88fc5483c65373f45e087f650@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r44115ebfbf3b7d294d7a75f2d30bcc822dab186ebbcc2dce11915ca9@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4946ffd86ad6eb7cb7863311235c914cb41232380de8d9dcdb3c115c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4f29fb24639ebc5d15fc477656ebc2b3aa00fcfbe197000009c26b40@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r503045a75f4419d083cb63ac89e765d6fb8b10c7dacc0c54fce07cff@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/r547bb14c88c5da2588d853ed3030be0109efa537dd797877dff14afd@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5494fdaf4a0a42a15c49841ba7ae577d466d09239ee1050458da0f29@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r556787f1ab14da034d79dfff0c123c05877bbe89ef163fd359b4564c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r568d354961fa88f206dc345411fb11d245c6dc1a8da3e80187fc6706@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r58f5b14dc5ae43583db3a7e872419aca97ebe47bcd7f7334f4128016@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r59e0878013d329dcc481eeafebdb0ee445b1e2852d0c4827b1ddaff2@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5a07f274f355c914054c7357ad6d3456ffaca064f26cd780acb90a9a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5a9462096c71593e771602beb0e69357adb5175d9a5c18d5181e0ab4@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6236ae4adc401e3b2f2575c22865f2f6c6ea9ff1d7b264b40d9602af@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r66e99d973fd79ddbcb3fbdb24f4767fe9b911f5b0abb05d7b6f65801@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r6b83ca85c8f9a6794b1f85bc70d1385ed7bc1ad07750d0977537154a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6dfa64ecc3d67c1a71c08bfa04064549179d499f8e20a8285c57bd51@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6f51a654ac2e67e3d1c65a8957cbbb127c3f15b64b4fcd626df03633@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r70f8bcccd304bd66c1aca657dbfc2bf11f73add9032571b01f1f733d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r71da5f51ef04cb95abae560425dce9667740cbd567920f516f76efb7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r73b5a9b677b707bbb7c1469ea746312c47838b312603bada9e382bba@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r761a52f1e214efec286ee80045d0012e955eebaa72395ad62cccbcfc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r769411eb43dd9ef77665700deb7fc491fc3ceb532914260c90b56f2f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r77dd041d8025a869156481d2268c67ad17121f64e31f9b4a1a220145@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r7bdc83513c12db1827b79b8d57a7a0975a25d28bc6c5efe590ec1e02@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r7da5ae60d7973e8894cfe92f49ecb5b47417eefab4c77cc87514d3cf@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r8045eedd6bb74efcd8e01130796adbab98ee4a0d1273509fb1f2077a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r819857361f5a156e90d6d06ccf6c41026bc99030d60d0804be3a9957@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r827d17bf6900eddc686f4b6ee16fc5e52ca0070f8df7612222c40ac5@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r874688141495df766e62be095f1dfb0bf4a24ca0340d8e0215c03fab@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r87b0c69fef09277333a7e1716926d1f237d462e143a335854ddd922f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r87d8337300a635d66f0bb838bf635cdfcbba6b92c608a7813adbf4f4@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8866f0cd2a3b319288b7eea20ac137b9f260c813d10ee2db88b65d32@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8cacf91ae1b17cc6531d20953c52fa52f6fd3191deb3383446086ab7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8dd01541fc49d24ec223365a9974231cbd7378b749247a89b0a52210@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8fead0144bb84d8714695c43607dca9c5101aa028a431ec695882fe5@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r90b5ac6e2bf190a5297bda58c7ec76d01cd86ff050b2470fcd9f4b35@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r911c1879258ebf98bca172c0673350eb7ea6569ca1735888d4cb7adc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r916b6542bd5b15a8a7ff8fc14a0e0331e8e3e9d682f22768ae71d775@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r93b240be16e642579ed794325bae31b040e1af896ecc12466642e19d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r93d5e81e879120d8d87925dbdd4045cb3afa9b066f4370f60b626ce3@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r9b790fe3a93121199f41258474222f15002b2f729495aa7ecbf90718@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9c010b79140452294292379183e7fe8e3533c5bb4db3f3fb39a6df61@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9cc76b98f87738791b8ec3736755f92444d3c8cb26bd4e4ffdb5c1cc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9cd444f944241dc26d9b8b007fe8971ed7f005b56befef7a4f4fb827@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9d9b4b93df7f92cdf1147db0fc169be1776c93d1fbc63bc65721fffd@%3Cdev.knox.apache.org%3E
https://lists.apache.org/thread.html/r9f8c45a2a4540911cd8bd0485f67e8091883c9234d7a3aeb349c46c1@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/ra1f19625cc67ac1b459c558f2ea5647d71ce51c6fe4f4cb03baec849@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra55e04d5a73afcb8383f4386e2b26832c6e3972e53827021ab885943@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/ra5b7313d8cc9411db6790adfba33f2cf0665cb77adb7b02043c95867@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/raa9c370ab42d737e93bc1795bb6a2187d7c60210cd5e3b3ce8f3c484@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rad255c736fad46135f1339408cb0147d0671e45c376c3be85ceeec1a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rae15d73cabef55bad148e4e6449b05da95646a2a8db3fc938e858dff@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/raf9c581b793c30ff8f55f2415c7bd337eb69775aae607bf9ed1b16fb@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rafb023a7c61180a1027819678eb2068b0b60cd5c2559cb8490e26c81@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb077d35f2940191daeefca0d6449cddb2e9d06bcf8f5af4da2df3ca2@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb5f2558ea2ac63633dfb04db1e8a6ea6bb1a2b8614899095e16c6233@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb69b1d7008a4b3de5ce5867e41a455693907026bc70ead06867aa323@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb7e159636b26156f6ef2b2a1a79b3ec9a026923b5456713e68f7c18e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb81a018f83fe02c95a2138a7bb4f1e1677bd7e1fc1e7024280c2292d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb8ad3745cb94c60d44cc369aff436eaf03dbc93112cefc86a2ed53ba@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb8c007f87dc57731a7b9a3b05364530422535b7e0bc6a0c5b68d4d55@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rbc5a622401924fadab61e07393235838918228b3d8a1a6704295b032@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rbc5a8d7a0a13bc8152d427a7e9097cdeb139c6cfe111b2f00f26d16b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbf99e4495461099cad9aa62e0164f8f25a7f97b791b4ace56e375f8d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1646894341450fdc4f7e96a88f5e2cf18d8004714f98aec6b831b3e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1d9b8e9d17749d4d2b9abaaa72c422d090315bd6bc0ae73a16abc1c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc2e24756d28580eeac811c5c6a12012c9f424b6e5bffb89f98ee3d03@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rc44d1147f78496ec9932a38b28795ff4fd0c4fa6e3b6f5cc33c14d29@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc4b972ea10c5a65c6a88a6e233778718ab9af7f484affdd5e5de0cff@%3Ccommits.felix.apache.org%3E
https://lists.apache.org/thread.html/rc77918636d8744d50312e4f67ba2e01f47db3ec5144540df8745cb38@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc8dd95802be0cca8d7d0929c0c8484ede384ecb966b2a9dc7197b089@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rc9d2ab8a6c7835182f20b01104798e67c75db655c869733a0713a590@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rccedec4cfd5df6761255b71349e3b7c27ee0745bd33698a71b1775cf@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcdcf32952397c83a1d617a8c9cd5c15c98b8d0d38a607972956bde7e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcdd56ab4255801a0964dcce3285e87f2c6994e6469e189f6836f34e3@%3Cnotifications.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rcfb95a7c69c4b9c082ea1918e812dfc45aa0d1e120fd47f68251a336@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcff5caebfd535195276aaabc1b631fd55a4ff6b14e2bdfe33f18ff91@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd58b60ab2e49ebf21022e59e280feb25899ff785c88f31fe314aa5b9@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/rd7e62e2972a41c2658f41a824b8bdd15644d80fcadc51fe7b7c855de@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rdbf1cd0ab330c032f3a09b453cb6405dccc905ad53765323bddab957@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rdddb4b06e86fd58a1beda132f22192af2f9b56aae8849cb3767ccd55@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rde11c433675143d8d27551c3d9e821fe1955f1551a518033d3716553@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rde782fd8e133f7e04e50c8aaa4774df524367764eb5b85bf60d96747@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re08b03cd1754b32f342664eead415af48092c630c8e3e0deba862a26@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/re5706141ca397587f7ee0f500a39ccc590a41f802fc125fc135cb92f@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ree506849c4f04376793b1a3076bc017da60b8a2ef2702dc214ff826f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/refbbb0eb65c185d1fa491cee08ac8ed32708ce3b269133a6da264317@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rf00ea6376f3d0e8b8f62cf6d4a4f28b24e27193acd2c851f618aa41e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rf3bc023a7cc729aeac72f482e2eeeab9008aa6b1dadbeb3f45320cae@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfd9f102864a039f7fda64a580dfe1a342d65d7b723ca06dc9fbceb31@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfe5caef1fd6cf4b8ceac1b63c33195f2908517b665c946c020d3fbd6@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfe6ba83d14545e982400dea89e68b10113cb5202a3dcb558ce64842d@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rff0ad6a7dac2182421e2db2407e44fbb61a89904adfd91538f21fbf8@%3Cissues.beam.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27216
https://security.netapp.com/advisory/ntap-20201123-0005/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| org.eclipse.jetty:jetty-util | CVE-2020-27216 | HIGH | 9.4.29.v20200521 | 9.4.33.v20201020, 10.0.0.beta3, 11.0.0.beta3 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27216
https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921
https://cwe.mitre.org/data/definitions/378.html
https://cwe.mitre.org/data/definitions/379.html
https://github.com/advisories/GHSA-g3wg-6mcf-8jj6
https://github.com/eclipse/jetty.project/issues/5451
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6#advisory-comment-63053
https://github.com/github/codeql/pull/4473
https://lists.apache.org/thread.html/r0259b14ae69b87821e27fed1f5333ea86018294fd31aab16b1fac84e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r07525dc424ed69b3919618599e762f9ac03791490ca9d724f2241442@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r09b345099b4f88d2bed7f195a96145849243fb4e53661aa3bcf4c176@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0d7ad4f02c44d5d53a9ffcbca7ff4a8138241322da9c5c35b5429630@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r0d95e01f52667f44835c40f6dea72bb4397f33cd70a564ea74f3836d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r0df8fe10fc36028cf6d0381ab66510917d0d68bc5ef7042001d03830@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0e9efe032cc65433251ee6470c66c334d4e7db9101e24cf91a3961f2@%3Ccommits.directory.apache.org%3E
https://lists.apache.org/thread.html/r0f5e9b93133ef3aaf31484bc3e15cc4b85f8af0fe4de2dacd9379d72@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r100c5c7586a23a19fdb54d8a32e17cd0944bdaa46277b35c397056f6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r171846414347ec5fed38241a9f8a009bd2c89d902154c6102b1fb39a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r185d10aae8161c08726f3ba9a1f1c47dfb97624ea6212fa217173204@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r18b6f10d9939419bae9c225d5058c97533cb376c9d6d0a0733ddd48d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r19e8b338af511641d211ff45c43646fe1ae19dc9897d69939c09cabe@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1d40368a309f9d835dcdd900249966e4fcbdf98c1cc4c84db2cd9964@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1d45051310b11c6d6476f20d71b08ea97cb76846cbf61d196bac1c3f@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1dbb87c9255ecefadd8de514fa1d35c1d493c0527d7672cf40505d04@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1ed79516bd6d248ea9f0e704dbfd7de740d5a75b71c7be8699fec824@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1ef28b89ff0281c87ba3a7659058789bf28a99b8074191f1c3678db8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r1fe31643fc34b4a33ae3d416d92c271aa97663f1782767d25e1d9ff8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2122537d3f9beb0ce59f44371a951b226406719919656ed000984bd0@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r279254a1bd6434c943da52000476f307e62b6910755387aeca1ec9a1@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2aa316d008dab9ae48350b330d15dc1b863ea2a933558fbfc42b91a6@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2d17b2a4803096ba427f3575599ea29b55f5cf9dbc1f12ba044cae1a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2e02700f7cfecb213de50be83e066086bea90278cd753db7fdc2ccff@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r2f732ee49d00610683ab5ddb4692ab25136b00bfd132ca3a590218a9@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3042a9dd2973aa229e52d022df7813e4d74b67df73bfa6d97bb0caf8@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r336b1694a01858111e4625fb9ab2b07ad43a64a525cf6402e06aa6bf@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r351298dd39fc1ab63303be94b0c0d08acd72b17448e0346d7386189b@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E
https://lists.apache.org/thread.html/r382870d6ccfd60533eb0d980688261723ed8a0704dafa691c4e9aa68@%3Ccommits.iotdb.apache.org%3E
https://lists.apache.org/thread.html/r3a763de620be72b6d74f46ec4bf39c9f35f8a0b39993212c0ac778ec@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r3b0ce1549a1ccdd7e51ec66daf8d54d46f1571edbda88ed09c96d7da@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3e05ab0922876e74fea975d70af82b98580f4c14ba643c4f8a9e3a94@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r3f32cb4965239399c22497a0aabb015b28b2372d4897185a6ef0ccd7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r407c316f6113dfc76f7bb3cb1693f08274c521064a92e5214197548e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4179c71908778cc0598ee8ee1eaed9b88fc5483c65373f45e087f650@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r44115ebfbf3b7d294d7a75f2d30bcc822dab186ebbcc2dce11915ca9@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4946ffd86ad6eb7cb7863311235c914cb41232380de8d9dcdb3c115c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r4f29fb24639ebc5d15fc477656ebc2b3aa00fcfbe197000009c26b40@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r503045a75f4419d083cb63ac89e765d6fb8b10c7dacc0c54fce07cff@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/r547bb14c88c5da2588d853ed3030be0109efa537dd797877dff14afd@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5494fdaf4a0a42a15c49841ba7ae577d466d09239ee1050458da0f29@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r556787f1ab14da034d79dfff0c123c05877bbe89ef163fd359b4564c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r568d354961fa88f206dc345411fb11d245c6dc1a8da3e80187fc6706@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r58f5b14dc5ae43583db3a7e872419aca97ebe47bcd7f7334f4128016@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r59e0878013d329dcc481eeafebdb0ee445b1e2852d0c4827b1ddaff2@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5a07f274f355c914054c7357ad6d3456ffaca064f26cd780acb90a9a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r5a9462096c71593e771602beb0e69357adb5175d9a5c18d5181e0ab4@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6236ae4adc401e3b2f2575c22865f2f6c6ea9ff1d7b264b40d9602af@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r66e99d973fd79ddbcb3fbdb24f4767fe9b911f5b0abb05d7b6f65801@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r6b83ca85c8f9a6794b1f85bc70d1385ed7bc1ad07750d0977537154a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6dfa64ecc3d67c1a71c08bfa04064549179d499f8e20a8285c57bd51@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r6f51a654ac2e67e3d1c65a8957cbbb127c3f15b64b4fcd626df03633@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r70f8bcccd304bd66c1aca657dbfc2bf11f73add9032571b01f1f733d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r71da5f51ef04cb95abae560425dce9667740cbd567920f516f76efb7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r73b5a9b677b707bbb7c1469ea746312c47838b312603bada9e382bba@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r761a52f1e214efec286ee80045d0012e955eebaa72395ad62cccbcfc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r769411eb43dd9ef77665700deb7fc491fc3ceb532914260c90b56f2f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r77dd041d8025a869156481d2268c67ad17121f64e31f9b4a1a220145@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r7bdc83513c12db1827b79b8d57a7a0975a25d28bc6c5efe590ec1e02@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r7da5ae60d7973e8894cfe92f49ecb5b47417eefab4c77cc87514d3cf@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r8045eedd6bb74efcd8e01130796adbab98ee4a0d1273509fb1f2077a@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r819857361f5a156e90d6d06ccf6c41026bc99030d60d0804be3a9957@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r827d17bf6900eddc686f4b6ee16fc5e52ca0070f8df7612222c40ac5@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r874688141495df766e62be095f1dfb0bf4a24ca0340d8e0215c03fab@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r87b0c69fef09277333a7e1716926d1f237d462e143a335854ddd922f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r87d8337300a635d66f0bb838bf635cdfcbba6b92c608a7813adbf4f4@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8866f0cd2a3b319288b7eea20ac137b9f260c813d10ee2db88b65d32@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8cacf91ae1b17cc6531d20953c52fa52f6fd3191deb3383446086ab7@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8dd01541fc49d24ec223365a9974231cbd7378b749247a89b0a52210@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r8fead0144bb84d8714695c43607dca9c5101aa028a431ec695882fe5@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r90b5ac6e2bf190a5297bda58c7ec76d01cd86ff050b2470fcd9f4b35@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r911c1879258ebf98bca172c0673350eb7ea6569ca1735888d4cb7adc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r916b6542bd5b15a8a7ff8fc14a0e0331e8e3e9d682f22768ae71d775@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r93b240be16e642579ed794325bae31b040e1af896ecc12466642e19d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r93d5e81e879120d8d87925dbdd4045cb3afa9b066f4370f60b626ce3@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r9b790fe3a93121199f41258474222f15002b2f729495aa7ecbf90718@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9c010b79140452294292379183e7fe8e3533c5bb4db3f3fb39a6df61@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9cc76b98f87738791b8ec3736755f92444d3c8cb26bd4e4ffdb5c1cc@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9cd444f944241dc26d9b8b007fe8971ed7f005b56befef7a4f4fb827@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/r9d9b4b93df7f92cdf1147db0fc169be1776c93d1fbc63bc65721fffd@%3Cdev.knox.apache.org%3E
https://lists.apache.org/thread.html/r9f8c45a2a4540911cd8bd0485f67e8091883c9234d7a3aeb349c46c1@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/ra1f19625cc67ac1b459c558f2ea5647d71ce51c6fe4f4cb03baec849@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra55e04d5a73afcb8383f4386e2b26832c6e3972e53827021ab885943@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/ra5b7313d8cc9411db6790adfba33f2cf0665cb77adb7b02043c95867@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/raa9c370ab42d737e93bc1795bb6a2187d7c60210cd5e3b3ce8f3c484@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rad255c736fad46135f1339408cb0147d0671e45c376c3be85ceeec1a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rae15d73cabef55bad148e4e6449b05da95646a2a8db3fc938e858dff@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/raf9c581b793c30ff8f55f2415c7bd337eb69775aae607bf9ed1b16fb@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rafb023a7c61180a1027819678eb2068b0b60cd5c2559cb8490e26c81@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb077d35f2940191daeefca0d6449cddb2e9d06bcf8f5af4da2df3ca2@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb5f2558ea2ac63633dfb04db1e8a6ea6bb1a2b8614899095e16c6233@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb69b1d7008a4b3de5ce5867e41a455693907026bc70ead06867aa323@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb7e159636b26156f6ef2b2a1a79b3ec9a026923b5456713e68f7c18e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb81a018f83fe02c95a2138a7bb4f1e1677bd7e1fc1e7024280c2292d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb8ad3745cb94c60d44cc369aff436eaf03dbc93112cefc86a2ed53ba@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rb8c007f87dc57731a7b9a3b05364530422535b7e0bc6a0c5b68d4d55@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rbc5a622401924fadab61e07393235838918228b3d8a1a6704295b032@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rbc5a8d7a0a13bc8152d427a7e9097cdeb139c6cfe111b2f00f26d16b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbf99e4495461099cad9aa62e0164f8f25a7f97b791b4ace56e375f8d@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1646894341450fdc4f7e96a88f5e2cf18d8004714f98aec6b831b3e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc1d9b8e9d17749d4d2b9abaaa72c422d090315bd6bc0ae73a16abc1c@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc2e24756d28580eeac811c5c6a12012c9f424b6e5bffb89f98ee3d03@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rc44d1147f78496ec9932a38b28795ff4fd0c4fa6e3b6f5cc33c14d29@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc4b972ea10c5a65c6a88a6e233778718ab9af7f484affdd5e5de0cff@%3Ccommits.felix.apache.org%3E
https://lists.apache.org/thread.html/rc77918636d8744d50312e4f67ba2e01f47db3ec5144540df8745cb38@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rc8dd95802be0cca8d7d0929c0c8484ede384ecb966b2a9dc7197b089@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rc9d2ab8a6c7835182f20b01104798e67c75db655c869733a0713a590@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rccedec4cfd5df6761255b71349e3b7c27ee0745bd33698a71b1775cf@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcdcf32952397c83a1d617a8c9cd5c15c98b8d0d38a607972956bde7e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcdd56ab4255801a0964dcce3285e87f2c6994e6469e189f6836f34e3@%3Cnotifications.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rcfb95a7c69c4b9c082ea1918e812dfc45aa0d1e120fd47f68251a336@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rcff5caebfd535195276aaabc1b631fd55a4ff6b14e2bdfe33f18ff91@%3Creviews.iotdb.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd58b60ab2e49ebf21022e59e280feb25899ff785c88f31fe314aa5b9@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/rd7e62e2972a41c2658f41a824b8bdd15644d80fcadc51fe7b7c855de@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rdbf1cd0ab330c032f3a09b453cb6405dccc905ad53765323bddab957@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rdddb4b06e86fd58a1beda132f22192af2f9b56aae8849cb3767ccd55@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rde11c433675143d8d27551c3d9e821fe1955f1551a518033d3716553@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rde782fd8e133f7e04e50c8aaa4774df524367764eb5b85bf60d96747@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re08b03cd1754b32f342664eead415af48092c630c8e3e0deba862a26@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/re5706141ca397587f7ee0f500a39ccc590a41f802fc125fc135cb92f@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ree506849c4f04376793b1a3076bc017da60b8a2ef2702dc214ff826f@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/refbbb0eb65c185d1fa491cee08ac8ed32708ce3b269133a6da264317@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rf00ea6376f3d0e8b8f62cf6d4a4f28b24e27193acd2c851f618aa41e@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rf3bc023a7cc729aeac72f482e2eeeab9008aa6b1dadbeb3f45320cae@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfd9f102864a039f7fda64a580dfe1a342d65d7b723ca06dc9fbceb31@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfe5caef1fd6cf4b8ceac1b63c33195f2908517b665c946c020d3fbd6@%3Cissues.beam.apache.org%3E
https://lists.apache.org/thread.html/rfe6ba83d14545e982400dea89e68b10113cb5202a3dcb558ce64842d@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rff0ad6a7dac2182421e2db2407e44fbb61a89904adfd91538f21fbf8@%3Cissues.beam.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27216
https://security.netapp.com/advisory/ntap-20201123-0005/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.eclipse.jetty:jetty-util | CVE-2021-28165 | HIGH | 9.4.29.v20200521 | 9.4.39.v20210325, 10.0.2, 11.0.2 |
Expand...http://www.openwall.com/lists/oss-security/2021/04/20/3
https://access.redhat.com/security/cve/CVE-2021-28165
https://github.com/advisories/GHSA-26vr-8j45-3r4w
https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w
https://lists.apache.org/thread.html/r002258611ed0c35b82b839d284b43db9dcdec120db8afc1c993137dc@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r03ca0b69db1e3e5f72fe484b71370d537cd711cbf334e2913332730a@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r05db8e0ef01e1280cc7543575ae0fa1c2b4d06a8b928916ef65dd2ad@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r06d54a297cb8217c66e5190912a955fb870ba47da164002bf2baffe5@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r077b76cafb61520c14c87c4fc76419ed664002da0ddac5ad851ae7e7@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r0a241b0649beef90d422b42a26a2470d336e59e66970eafd54f9c3e2@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0a4797ba6ceea8074f47574a4f3cc11493d514c1fab8203ebd212add@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r0bf3aa065abd23960fc8bdc8090d6bc00d5e391cf94ec4e1f4537ae3@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r0cd1a5e3f4ad4770b44f8aa96572fc09d5b35bec149c0cc247579c42@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r0f02034a33076fd7243cf3a8807d2766e373f5cb2e7fd0c9a78f97c4@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r17e26cf9a1e3cbc09522d15ece5d7c7a00cdced7641b92a22a783287@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r23785214d47673b811ef119ca3a40f729801865ea1e891572d15faa6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r2afc72af069a7fe89ca2de847f3ab3971cb1d668a9497c999946cd78@%3Ccommits.spark.apache.org%3E
https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r2f2d9c3b7cc750a6763d6388bcf5db0c7b467bd8be6ac4d6aea4f0cf@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r31f591a0deac927ede8ccc3eac4bb92697ee2361bf01549f9e3440ca@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r33eb3889ca0aa12720355e64fc2f8f1e8c0c28a4d55b3b4b8891becb@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r40136c2010fccf4fb2818a965e5d7ecca470e5f525c232ec5b8eb83a@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r401b1c592f295b811608010a70792b11c91885b72af9f9410cffbe35@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r411d75dc6bcefadaaea246549dd18e8d391a880ddf28a796f09ce152@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r47a7542ab61da865fff3db0fe74bfe76c89a37b6e6d2c2a423f8baee@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r4891d45625cc522fe0eb764ac50d48bcca9c0db4805ea4a998d4c225@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r4abbd760d24bab2b8f1294c5c9216ae915100099c4391ad64e9ae38b@%3Cdev.hbase.apache.org%3E
https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r520c56519b8820955a86966f499e7a0afcbcf669d6f7da59ef1eb155@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r56e5568ac73daedcb3b5affbb4b908999f03d3c1b1ada3920b01e959@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r5d1f16dca2e010193840068f1a1ec17b7015e91acc646607cbc0a4da@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r5f172f2dd8fb02f032ef4437218fd4f610605a3dd4f2a024c1e43b94@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r64ff94118f6c80e6c085c6e2d51bbb490eaefad0642db8c936e4f0b7@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r6535b2beddf0ed2d263ab64ff365a5f790df135a1a2f45786417adb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r65daad30d13f7c56eb5c3d7733ad8dddbf62c469175410777a78d812@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r694e57d74fcaa48818a03c282aecfa13ae68340c798dfcb55cb7acc7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E
https://lists.apache.org/thread.html/r6b070441871a4e6ce8bb63e190c879bb60da7c5e15023de29ebd4f9f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r6ce2907b2691c025250ba010bc797677ef78d5994d08507a2e5477c9@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r6f256a1d15505f79f4050a69bb8f27b34cb353604dd2f765c9da5df7@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r71031d0acb1de55c9ab32f4750c50ce2f28543252e887ca03bd5621e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r7189bf41cb0c483629917a01cf296f9fbdbda3987084595192e3845d@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/r72bf813ed4737196ea3ed26494e949577be587fd5939fe8be09907c7@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r746434be6abff9ad321ff54ecae09e1f09c1c7c139021f40a5774090@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r769155244ca2da2948a44091bb3bb9a56e7e1c71ecc720b8ecf281f0@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7bf7004c18c914fae3d5a6a0191d477e5b6408d95669b3afbf6efa36@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7c40fb3a66a39b6e6c83b0454bc6917ffe6c69e3131322be9c07a1da@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r81748d56923882543f5be456043c67daef84d631cf54899082058ef1@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r83453ec252af729996476e5839d0b28f07294959d60fea1bd76f7d81@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r90327f55db8f1d079f9a724aabf1f5eb3c00c1de49dc7fd04cad1ebc@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r940f15db77a96f6aea92d830bc94d8d95f26cc593394d144755824da@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r942f4a903d0abb25ac75c592e57df98dea51350e8589269a72fd7913@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r9b793db9f395b546e66fb9c44fe1cd75c7755029e944dfee31b8b779@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r9db72e9c33b93eba45a214af588f1d553839b5c3080fc913854a49ab@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r9fae5a4087d9ed1c9d4f0c7493b6981a4741cfb4bebb2416da638424@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/ra210e38ae0bf615084390b26ba01bb5d66c0a76f232277446ae0948a@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra21b3e6bd9669377139fe33fb46edf6fece3f31375bc42a0dcc964b2@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra50519652b0b7f869a14fbfb4be9758a29171d7fe561bb7e036e8449@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/ra9dd15ba8a4fb7e42c7fe948a6d6b3868fd6bbf8e3fb37fcf33b2cd0@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rae8bbc5a516f3e21b8a55e61ff6ad0ced03bdbd116d2170a3eed9f5c@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/raea6e820644e8c5a577f77d4e2044f8ab52183c2536b00c56738beef@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb00345f6b1620b553d2cc1acaf3017aa75cea3776b911e024fa3b187@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb11a13e623218c70b9f2a2d0d122fdaaf905e04a2edcd23761894464@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb1624b9777a3070135e94331a428c6653a6a1edccd56fa9fb7a547f2@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb2d34abb67cdf525945fe4b821c5cdbca29a78d586ae1f9f505a311c@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb66ed0b4bb74836add60dd5ddf9172016380b2aeefb7f96fe348537b@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rb8f5a6ded384eb00608e6137e87110e7dd7d5054cc34561cb89b81af@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rbab9e67ec97591d063905bc7d4743e6a673f1bc457975fc0445ac97f@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rbba0b02a3287e34af328070dd58f7828612f96e2e64992137f4dc63d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rbcd7b477df55857bb6cae21fcc4404683ac98aac1a47551f0dc55486@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbd9a837a18ca57ac0d9b4165a6eec95ee132f55d025666fe41099f33@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rc4779abc1cface47e956cf9f8910f15d79c24477e7b1ac9be076a825@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rc4dbc9907b0bdd634200ac90a15283d9c143c11af66e7ec72128d020@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rc6c43c3180c0efe00497c73dd374cd34b62036cb67987ad42c1f2dce@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rc907ed7b089828364437de5ed57fa062330970dc1bc5cd214b711f77@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rcdea97f4d3233298296aabc103c9fcefbf629425418c2b69bb16745f@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rd24d8a059233167b4a5aebda4b3534ca1d86caa8a85b10a73403ee97@%3Ccommits.spark.apache.org%3E
https://lists.apache.org/thread.html/rd6c1eb9a8a94b3ac8a525d74d792924e8469f201b77e1afcf774e7a6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rd755dfe5f658c42704540ad7950cebd136739089c3231658e398cf38@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E
https://lists.apache.org/thread.html/rd9ea411a58925cc82c32e15f541ead23cb25b4b2d57a2bdb0341536e@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rdbf2a2cd1800540ae50dd78b57411229223a6172117d62b8e57596aa@%3Cissues.hbase.apache.org%3E
https://lists.apache.org/thread.html/rdde34d53aa80193cda016272d61e6749f8a9044ccb37a30768938f7e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rdf4fe435891e8c35e70ea5da033b4c3da78760f15a8c4212fad89d9f@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rdfe5f1c071ba9dadba18d7fb0ff13ea6ecb33da624250c559999eaeb@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/re0545ecced2d468c94ce4dcfa37d40a9573cc68ef5f6839ffca9c1c1@%3Ccommits.hbase.apache.org%3E
https://lists.apache.org/thread.html/re3a1617d16a7367f767b8209b2151f4c19958196354b39568c532f26@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/re577736ca7da51952c910b345a500b7676ea9931c9b19709b87f292b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re6614b4fe7dbb945409daadb9e1cc73c02383df68bf9334736107a6e@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ree1895a256a9db951e0d97a76222909c2e1f28c1a3d89933173deed6@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf1b02dfccd27b8bbc3afd119b212452fa32e9ed7d506be9357a3a7ec@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf6de4c249bd74007f5f66f683c110535f46e719d2f83a41e8faf295f@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rf99f9a25ca24fe519c9346388f61b5b3a09be31b800bf37f01473ad7@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rfc9f51b4e21022b3cd6cb6f90791a6a6999560212e519b5f09db0aed@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rfd3ff6e66b6bbcfb2fefa9f5a20328937c0369b2e142e3e1c6774743@%3Creviews.spark.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-28165
https://security.netapp.com/advisory/ntap-20210611-0006/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.eclipse.jetty:jetty-util | CVE-2020-27223 | MEDIUM | 9.4.29.v20200521 | 9.4.36.v20210114, 10.0.1, 11.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-27223
https://bugs.eclipse.org/bugs/show_bug.cgi?id=571128
https://github.com/advisories/GHSA-m394-8rww-3jr7
https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7
https://lists.apache.org/thread.html/r068dfd35ce2193f6af28b74ff29ab148c2b2cacb235995576f5bea78@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r07aedcb1ece62969c406cb84c8f0e22cec7e42cdc272f3176e473320@%3Cusers.solr.apache.org%3E
https://lists.apache.org/thread.html/r0b639bd9bfaea265022125d18acd2fc6456044b76609ec74772c9567@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0c6eced465950743f3041b03767a32b2e98d19731bd72277fc7ea428@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0cdab13815fc419805a332278c8d27e354e78560944fc36db0bdc760@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0e25cdf3722a24c53049d37396f0da8502cb4b7cdc481650dc601dbc@%3Cgitbox.activemq.apache.org%3E
https://lists.apache.org/thread.html/r105f4e52feb051faeb9141ef78f909aaf5129d6ed1fc52e099c79463@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r1414ab2b3f4bb4c0e736caff6dc8d15f93f6264f0cca5c47710d7bb3@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r1b7ed296a865e3f1337a96ee9cd51f6d154d881a30da36020ca72a4b@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r1b803e6ebdac5f670708878fb1b27cd7a0ce9d774a60e797e58cee6f@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r26d9196f4d2afb9bec2784bcb6fc183aca82e4119bf41bdc613eec01@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r27ad7843d060762cc942820566eeaa9639f75371afedf8124b943283@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r2c2c7b2971360fb946bbf062c58d7245927dd1ce9150fc9987f65409@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/r35ab810c0f3016b3fd3a3fa9088a2d2781b354a810780ce74d022b6c@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r409ee2bae66bfff6aa89e6c74aff535e6248260d3afcb42bfb3b316b@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r463b12b27264c5e1e3c48c8c2cc5d33813d2f0d981102548fb3102fb@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r492cff8488a7f6eb96700afb5d137b719ddb80a833e77f971d2691c6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r4a456d89a83752a012d88a60ff4b21def6c9f650b9e69ea9fa11c9f9@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r4c92ea39167c0f7b096ae8268db496b5451d69606f0304b7c8a994c7@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r51f8975ef47c12a46fbfd7da9efea7f08e1d307fe1dc3042514659ae@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r521a077885ce79c44a799118c878589e81e525cab72d368e5cfb6f61@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r5612dc69e1f79c421faf9764ffbc92591e2a69ea417c04cba57f49ea@%3Cuser.karaf.apache.org%3E
https://lists.apache.org/thread.html/r562a0cbc5c8cac4d000a27b2854a8ab1b924aa9dd45f8ffbea98e5ad@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5b7cc6ac733e0b35816751cf45d152ae246a3f40e0b1e62b101c9522@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r601f15f3de7ae3a7bbcd780c19155075c56443c2cdc1d193c03b4182@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/r65c714241b9d064a44fec10d60ebf5a37d5ebadd6bf88b0eed13ade0@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r734f996149bb9b1796740385fcbdf3e093eb9aabedc0f20a48ea1d68@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r75ee2a529edb892ac59110cb3f6f91844a932c5034e16c8317f5668d@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7f4ad5eec0bce2821c308bb23cac53df5c94eb84de1c58de9b95c176@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7fbdb7880be1566f943d80fbbeefde2115c086eba1bef3115350a388@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7ffd050d3bd7c90d95f4933560b5f4f15971ab9a5f5322fdce116243@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r857b31ad16c6e76002bc6cca73c83358ed2595477e288286ee82c48d@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r897a6a14d03eab09e89b809d2a650f3765065201da5bc3db9a4dd6e8@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8b1963f16d6cb1230ca7ee73b6ec4f5c48f344191dbb1caabd265ee4@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8dc1b13b80d39fbf4a9d158850e15cd868f0460c2f364f13dca7050b@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra2f529da674f25a7351543544f7d621b5227c49a0745913b1194d11e@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/ra384892bab8c03a60613a6a9d5e9cae0a2b800fd882792a55520115e@%3Ccommits.kafka.apache.org%3E
https://lists.apache.org/thread.html/ra40a88a2301a3da86e25b501ff4bc88124f2b816c2917d5f3497f8f0@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra47a26c008487b0a739a368c846e168de06c3cd118d31ecedafa679a@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/raa6d60b00b67c0550672b4f506f0df75b323dcd25cf574e91e2f2dff@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rb79b62ac3085e05656e41865f5a7efcbdc7dcd7843abed9c5fe0fef8@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc052fd4e9e9c01bead74c0b5680355ea5dc3b72d46f253cb65d03e43@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rc721fe2910533bffb6bd4d69ea8ff4f36066d260dbcd2d14e041614a@%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/rd666e187ebea2fda8624683ab51e2a5ad2108f762d21bf1a383d7502@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rdd6c47321db1bfe12c68a898765bf3b6f97e2afa6a501254ed4feaed@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/re03a4dbc15df6f390a2f8c0a071c31c8324dbef007e59fdc2592091a@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/re19fa47ec901cc3cf6d7784027198e8113f8bc2dbfd6c9d6d13f5447@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re3bd4f831f9be49871cb6adb997289b5dbcd6fe4bc5cb08223254080@%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/re43768896273c0b5f1a03d7f0a9d370852074489d51825fdc0d77f0f@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E
https://lists.apache.org/thread.html/reb3c6dc050c7ee18ea154cd94dba85d99aa6b02b84c4bb2138a4abf2@%3Creviews.spark.apache.org%3E
https://lists.apache.org/thread.html/reca91f217f9e1ce607ce6e19a1c0b3db82b5b1b58cf39a84d6434695@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf190d1d28e1367d1664ef6bc2f71227566d7b6b39209817a5364da1f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rf6c2efa3137bc8c22707e550a1f9b80f74bca62b9c8a6f768f2c6b86@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf77f4c4583669f1133d58cc4f1964367e253818ed8db986bb2732f7c@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rff630ce92a4d1bb494fc1a3f9b57a3d60819b436505bcd8c6ccc713c@%3Ccommits.kafka.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-27223
https://security.netapp.com/advisory/ntap-20210401-0005/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com/security-alerts/cpuApr2021.html
| diff --git a/stable/xwiki/1.0.17/templates/common.yaml b/stable/xwiki/1.0.17/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/stable/xwiki/1.0.17/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/stable/xwiki/1.0.17/values.yaml b/stable/xwiki/1.0.17/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/zwavejs2mqtt/10.0.29/CHANGELOG.md b/stable/zwavejs2mqtt/10.0.29/CHANGELOG.md new file mode 100644 index 00000000000..a52d183dfa3 --- /dev/null +++ b/stable/zwavejs2mqtt/10.0.29/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [zwavejs2mqtt-10.0.29](https://github.com/truecharts/apps/compare/zwavejs2mqtt-10.0.28...zwavejs2mqtt-10.0.29) (2022-05-25) + +#### Chore + +* update docker general non-major ([#2745](https://github.com/truecharts/apps/issues/2745)) + + + + +### [zwavejs2mqtt-10.0.28](https://github.com/truecharts/apps/compare/zwavejs2mqtt-10.0.27...zwavejs2mqtt-10.0.28) (2022-05-24) + +#### Chore + +* update helm general non-major helm releases + + + + +### [zwavejs2mqtt-10.0.27](https://github.com/truecharts/apps/compare/zwavejs2mqtt-10.0.26...zwavejs2mqtt-10.0.27) (2022-05-17) + +#### Chore + +* Auto-update chart README [skip ci] +* update helm general non-major helm releases + + + + +### [zwavejs2mqtt-10.0.27](https://github.com/truecharts/apps/compare/zwavejs2mqtt-10.0.26...zwavejs2mqtt-10.0.27) (2022-05-17) + +#### Chore + +* update helm general non-major helm releases + + + + +### [zwavejs2mqtt-10.0.26](https://github.com/truecharts/apps/compare/zwavejs2mqtt-10.0.25...zwavejs2mqtt-10.0.26) (2022-05-17) + +#### Chore + +* update helm general non-major helm releases + + + + +### [zwavejs2mqtt-10.0.25](https://github.com/truecharts/apps/compare/zwavejs2mqtt-10.0.24...zwavejs2mqtt-10.0.25) (2022-05-13) + +#### Chore + +* update docker general non-major ([#2658](https://github.com/truecharts/apps/issues/2658)) + + + + +### [zwavejs2mqtt-10.0.24](https://github.com/truecharts/apps/compare/zwavejs2mqtt-10.0.23...zwavejs2mqtt-10.0.24) (2022-05-10) + +#### Chore + +* update helm general non-major helm releases ([#2649](https://github.com/truecharts/apps/issues/2649)) + + + + +### [zwavejs2mqtt-10.0.23](https://github.com/truecharts/apps/compare/zwavejs2mqtt-10.0.22...zwavejs2mqtt-10.0.23) (2022-05-06) + +#### Chore + +* update docker general non-major + + + + +### [zwavejs2mqtt-10.0.22](https://github.com/truecharts/apps/compare/zwavejs2mqtt-10.0.21...zwavejs2mqtt-10.0.22) (2022-05-05) + +#### Chore + +* update helm general non-major helm releases ([#2612](https://github.com/truecharts/apps/issues/2612)) + + + + +### [zwavejs2mqtt-10.0.21](https://github.com/truecharts/apps/compare/zwavejs2mqtt-10.0.20...zwavejs2mqtt-10.0.21) (2022-05-04) + +#### Chore + +* update docker general non-major ([#2606](https://github.com/truecharts/apps/issues/2606)) + + + + +### [zwavejs2mqtt-10.0.20](https://github.com/truecharts/apps/compare/zwavejs2mqtt-10.0.19...zwavejs2mqtt-10.0.20) (2022-04-29) + +#### Chore + diff --git a/stable/zwavejs2mqtt/10.0.29/CONFIG.md b/stable/zwavejs2mqtt/10.0.29/CONFIG.md new file mode 100644 index 00000000000..c147b7c819c --- /dev/null +++ b/stable/zwavejs2mqtt/10.0.29/CONFIG.md @@ -0,0 +1,7 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide. + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/zwavejs2mqtt/10.0.29/Chart.lock b/stable/zwavejs2mqtt/10.0.29/Chart.lock new file mode 100644 index 00000000000..2b5f3156d6c --- /dev/null +++ b/stable/zwavejs2mqtt/10.0.29/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.17 +digest: sha256:0baee009d04b98af63ce7181cf4a32bc8aa4a6cdcc645b3c003ef7c9c79a35fc +generated: "2022-05-25T06:58:17.492179696Z" diff --git a/stable/zwavejs2mqtt/10.0.29/Chart.yaml b/stable/zwavejs2mqtt/10.0.29/Chart.yaml new file mode 100644 index 00000000000..0e8f6fb5b7d --- /dev/null +++ b/stable/zwavejs2mqtt/10.0.29/Chart.yaml @@ -0,0 +1,32 @@ +apiVersion: v2 +appVersion: "6.10.0" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.17 +deprecated: false +description: Fully configurable Zwave to MQTT gateway and Control Panel using NodeJS + and Vue +home: https://github.com/truecharts/apps/tree/master/charts/stable/zwavejs2mqtt +icon: https://truecharts.org/_static/img/appicons/zwavejs2mqtt.png +keywords: +- zwavejs2mqtt +- zwave-js +- z-wave +- zwave +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: zwavejs2mqtt +sources: +- https://github.com/zwave-js/zwavejs2mqtt +- https://hub.docker.com/r/zwavejs/zwavejs2mqtt +type: application +version: 10.0.29 +annotations: + truecharts.org/catagories: | + - tools + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/zwavejs2mqtt/10.0.29/README.md b/stable/zwavejs2mqtt/10.0.29/README.md new file mode 100644 index 00000000000..d2a4351fdae --- /dev/null +++ b/stable/zwavejs2mqtt/10.0.29/README.md @@ -0,0 +1,38 @@ +# Introduction + +Fully configurable Zwave to MQTT gateway and Control Panel using NodeJS and Vue + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 9.3.17 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/zwavejs2mqtt/10.0.29/app-readme.md b/stable/zwavejs2mqtt/10.0.29/app-readme.md new file mode 100644 index 00000000000..e8d6214a0a1 --- /dev/null +++ b/stable/zwavejs2mqtt/10.0.29/app-readme.md @@ -0,0 +1,3 @@ +Fully configurable Zwave to MQTT gateway and Control Panel using NodeJS and Vue + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/zwavejs2mqtt/10.0.29/charts/common-9.3.17.tgz b/stable/zwavejs2mqtt/10.0.29/charts/common-9.3.17.tgz new file mode 100644 index 0000000000000000000000000000000000000000..d58e7afbc7b74ca2ac474c2873b4e4128a36ea80 GIT binary patch literal 44145 zcmV)zK#{*6iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UC_aDdQ{XC@+jd{;X~yNCXge>TQOo0#Tl3HzF(w~_zNU>LLps&DWTwkE|6p( z)|!zy8iN_<85{R{SD4QhlWs)jJx&)Wl4W`@%UF+7gnDzxIHEoMUa?{eN1`DE0xltk zlyw!T1w%9WJeK;BrZV=(Q=7p)G^&0H@g$aeLc z|9COz4o2O6r~gfB4spsMP7#&B&>Z4q3~)Ln|Cs~s5_;7FAcdm84gmmI&?HB{P(c;f z81Pkw#suND-Fx!!sP{xe2XxJbAte2x&9poHACNQTm7mY&Yx6&kky zkg(1rj1}NB1atuqB^ad~U{SCI07V&Lm=n4hgR5CYyO_B0LD%Z2T20{s4#kAz@XAQ8 z|70^b+#ii6(JtH{O@`6nXdmuP_9C<&jSi-hel+YKO?MCbyQBT#08QfE!6=>%;Xyn) zoa_zvCr8oV;bgbp7=vt)Bp@RRj#e!of1Sx6V{kfsOZXW@OmwIvq5X_0`e6ZSyeZXh zFhy6QVl~}!*bPZ;VK#u~5_&o4_PfLWaL_**>{)srK(seK><Wq>(hd9}k(xzTD zp)KTwbT;MJ!}6#+?Cy8_hP($uG>s18gV7*9gu8oi0!O3a{_a6P9`pwXeY6`5VlKV}y3&Xfm9jX&(;y132mLPY3+a<&JlLHa9`uj) zqUrExcQW1EA08aW=;#ndlfzv!+3!zx3qr=hU2=?RQWN+B-A59K+ zBQ!kh?;|)og3(d5KO7DE2hjmKItq?(srijaJ%<#-c(N&-b+u|D8@LTAtc$OOEYz?aJqLC9rh>i z5bhuBPy3_EKAghce!Lq^5Bk#>^^Xn@C$Jw4W3(F|#0Sw3_WOr}y=Z;YP3d}-kO@q3 zsvr(v3dj;sien@l3d$rwQ~Vi_sr)rvB#Br&>m~O)UD|^p%Au5FiewoOqbW|Y94BA_ zxHU05KRJH=Y7C|@VW`!LNXjWm5=1Rrl)_1Zw1P2TyDgwU#AE4eC}NQp1!9rkmES+Y z1jm3#M+yUw3Iwx+tmY`?J0ON=PEv+AAQUhTIhrmKhJ-Dn`~-Pnk8*J=dk7N%)0A+i zpp#VMk=N-tAbYm07I165#*B}_-~O)PYu5%NbEFCX3;-bg1nRB))5YcP7>vP}uNA#Z z-~=U`fK?Ul+NWDK>vrVrVm?7sFmj9-rYHs(iJ6-7363BegFy`gEwU>LV+0tdkfW=W zEc!j6;H5=|?T9|$SoK8l)_W9D1UUj*T0m_Bn8x5eNfMl1eaK?SHD3x?=ejrNCJTGRz0UO3&)XSmB~BTzv8%Swy)YD5JPik6sRl7bm#Lac)X&oP&yu0H&z z-oF;F$6&YB!k)5FGBsBVzK-xqZ8DV@!@yus9&k{5iL{q>Zh!%{KIXFF&bw$}R7#t0|gVAAkH0q9mAmM`WIpjEk zNwNZ0kk62inm85qF_Zn1_4JD~LiresMk9xy^=dIAaVsP7aX|G2ltfTPw4OPQHEBU= zgdl>xiqSP+``W8HT4BZIL3L1hi8!KjoFWEpW=Ie^pEYWFh^l}tQU-1?pMi^u|2Evz zZE?P`w$tsvF&^VI2Pl8~Amv;IKN5=nDIg`_jKtu0!3m3Cf@r}4|MwU(3F|*vP?y1} z6pN)Pz#+Xtd@L9#*A?0-nB(-lRnFj<)X#JH*?-sXTPP=IA3kuL;D5@oK0`D@DHqaQ z6g5<_s3EEq@hJxP>((r!h{iDhW>~ zFtX%+B{_@<`(1M(lejd1Ut&+!9y~6K7YBqGul$!g!7HuU%GxDy)ffxY5g(p@yD3sR zRm!mHP<+3T2tolxb3rfNWwDfHUGOf`BdAsQ4nX=}{i36O3#(ODypT&^F?WN| zk+BRC9ARm;s5iYzpkoS^Weyo0P5%I*@^4zVzv?h9ndy*T)#UQ_ItyY+J2Bpo-kh{ng+6JW&U1efo=a&DD(mzs9N>g+ymbGFLCsv`)Bpalw35iz< z0T@Msv-H$)0xQ52C#c&}$XXA<+41@L&+p#99E16)BUt2y&{%i(4V2c=5>t}OrL48g zyWm1=w%mGp2F_P0ho6m)Y211Sj<kjCKn>{L`1;@JfHTrVbwridff#iSRLi1j#R*Q|$A zp$|GSEyjFR|0n&y*EzB!W%I582rDT$GwLaSwl)vPYma`6q!WPMfJL@S9eojJ@pdg0O0 z6RuQLy|%?V;6$zeGKvYsdsC>bcd8hbGf2+?Q|94PDrd z-9a(7dKweXw9Eo?xB?V0k}MHOSwhJ5A_JJQg|h6#N*DZOr<#De$e6@MsVc$xR{SZg zqgYe6(ozCUFPqzgwq6#fZDXT)8G<%;EG(d`yKfapVZ==z_gxO7Y5fUTW23mUv7(@3HbyV%H%RDSqTlc5YtjnSQHwA{n23yfDdnu z&wm<&et&2zUziFrXu*)QmIQm7x+f&%=riv|FoP4EU@q3FWWgDZ?eg%452s?#eK(kz z&L>VafksS8riTy4uA4A7zNNoTw+?jk)&@UQ4w7>pJL#)lq{mFq#Pm|W_<@o|X5LKw zpKOt32@!^E7$Wu z5scrZ$x5{QJx-94r*3<)VPLN!=f*WC0iIrPn$00}5 z?{oX&3f1z}fl4v?6SwP__G!Q>@M;OZPjB#qe^4Ep+OhA5Uww(wp^NV4Ge!@hn$g*aJI zbTOld353O$e6KZz_*T4br&*ZU?dJ#Kb_@N9-8W%(pKSNc?_uD-H-jW*SaLk z?92sv&#bOtKQa0yjP4Tcp4mJE`aYPv$jn3i{@F9-`JN+~GJrXl2|F3g;b%Nw%mr5a z-|qHb4EFnCRVeC8HWFBZMFu9y(Tcg86)ZfXswd8<-)bp~6?!o`{?bE^E#%;4h9l)W zo?-=25bFsOayjTdvkRimU|X!OG#1j+X9dP-8skVTGG^qac}MacVdG$rtKt_wiPhsL z=|1}OJxr1bjIJ-pYjVZjrLQO@^wV!d1{39^8-Jk}fN6f$ACom6q3i1Fy|?k`sVsf)ci*j=-r> z8f-_XBe{veqi(mm?FeVND{86tDhj_jk|n zJWJ5lYXaj5Okf%zy1fI$&+qil9pgDZJ=+0qNsP`^c$ZP+_N($D1*4TKVtXs2dvyoS zC|Qb5R|JbG1u%yz>E=PdEHG7~Fc{ww2spkaTDJ;2uI`csRnwcqi_a*jNe7m8BFhjw z;A~K7(Xh^>5Y=)5IX!mH6yQv6`FC9|O0N=h&S7-D1J0zVeYt>%e(_#)#=enoarQl& z<78#LtPY5lZ=c}|Ohr*F1qXCPqNIl?N8|Ktxwj+!J93-Aa-#tJJxDv{y=_1=N2W?D z-CCdu9pwnrMnhuEyj--d6|b3@r4{mZjf|DFSR-H^IJcCsisF?5wnE5y+#x}vGJ-#^ zLnt2?$_l9^`oT#=lCJaZe33~QPN2ajvC8%d<~zb+sT7pY+ls zgEuLFVttcG&!sWALOhrIG8#p&(ueo2$gkI>9b<^e&UIsDBt`^pQ zYB$$Y2eQ{H0APlIvtuQ{bp6r&l!N{xMob^KLa|=lIKyBy98T>~3FQHHRy;Um9Kjfn zsnd=q{V9`8$kFJE5!T@xftF@YrVlYOPs|DpK z8SUq3ROV9ZuKR~}t586e8|b2g`AjpIj!R~t4vrGSd%aaCef8B6Onr6)mj+(2{{Hs& zmeXpbv8u~7u~ze9tEc6_4i%MZw%VU_$sT4-I1i0f`0lD6b8>1t+g@dR?Zy-TEiyU=vJj zh!~jTI8JULMeYcGk3XaMjrfA(rxIo4Y$8)tTa__VjZ=uG_}cw)eaKX>LIxvbLa+tG z_N;`4tRkD`mSk?I<`i&Y3M#=YLt;fN;EUh7>AWo)%a+$vA9Z{Au^2m&-j=<^HJ^!F zCYoT|Lr369797YhC>Ln6MA#UlS2+D#QIsdF10xx{FD6j?55C;G=Y^VChHHY#P`M_e^_f{X zF*l$}=0Q7B>l+844U%iifzm_p>{&q<&j{nW9(Hw_{E|;nh5C<#$&*kLDSwyVXlNNT z?O0su2$|II9UYt5O-KZj+)64Ul|eqskrDuM`&WF*S3EgpXOPdjpczWQ`u=;~JLQ9w zx*`_#vM?!~q;uduUVuS&u-ECAAgO5gGkE~s`{=mAN-Y^R>AAm@rnAn;oE1bf1t=<7 zu`y(6k~f3wESL%g+{NqjBD-|KcS2#SP*NGOE5xJXEHMI^4pW2v=&14F33H@@4OCU^ z>v2toC(Oaf90t;nT>0h@(2FNpMCx~)y_snO18x0>~;-Z0@ z30`4bP`JkQ{-ERQ^cg9bx?)B20jY2_q2?6!0?wQ)QZAJ2hx6}1jMRCAJK6CLwq;vh zwNPowH|yy`Ay;TUh@p*;Zm`mD%HDRVp+I~Ch&)eJz1Fbjdf~18xSwCu%Xa|Q9ToKJhAagMz!n2BLBhCuHLS{+^S^V+RguL85t4NfGgbQM9-_3<6bRIdBWG{n6r;3 zn(zOF?snVh#Llilf2-`g@*p{TE~V|+v0%q6L1!ONcJ!Y=p6v*Z*a2vs@zqOAceKLW z$*0_oR8}%2fM7ToY2fU~WJ`BhH6=8%SsXH%B1H7XA^p!dNu=o`*G=il=Jlc44WO2D z0?u1|K-a?mS$ZlsQOZiiO^{?UM`p$5Z)qC>yJsLi_5NL;b4jL`e1xJUvrOeR5yX^7 zCYd9hy=u|~>HN?4=bv`G&=(5=(SQ>{_p1y~%xON8r*RU76v!*QL@8jZSE^Ix`ioS0 zj8P1>95l9fKuWx-(g>AdJaRi#OqLn3{)rI!su354T0C`J-quk)H&7jXr)VLM;sEp+ zGs%)s0`Yt&A7vfJW50`;=B-Jb9VJufM8J@ZugHRSBuEE`587oIk@O!Xv$u3veDVN% z>N?2;AYhA0M+HTt%sfH9mM5k4;r#PI*Gw&J{6s9k!UrMT165%_d4Rc%{!B zcyjPqo^p9Z+*DykBJu*SzR6vgL>uzbI#wq%=OjjU&g9Pii4I}Y!>7hIM)dz^pc^^i z6^vevVMk%e%yFHLz=A0kJhWXKgZBu=KU2)nJ7KWq-M^S20F^W(Q;VbNh0rvJBxpYw+DWs}89`o@8EHaXUPclKwBGqRlK50oM3Knx0oY>Wf z(Kd!N#9+)I6;=wrK_~?uvvuvwuAMIRyLBQwPl!2}H$8S0l7+s5TvIlUs&5Y4NZPcC`Vgp!=w5ZGM z-jY^A^1GZ>s$pN$$jz^F{7*7${ErL$JmY(u7>GTk^&d(w?aP#2t^!9ZKk-c}C>b6q+`* zBP~kba+vu%`yCFj9^F6R;6C2er;Bu4weoE+_30vg;)~{d(Q-Beq){n}k`b)TVtE=h z_f-mvLZ_%TTXB#{Nz4_{;+n;kc5sRsMvC5>&lmQ5$8H%pWQ6ElM+7;*HYOoRmnBne~awoQJD8PZjLUP4dwiwsW=<{=oiyr@s&9<$o!C)5;I8M&hFenW0E}dhg(m zG_pnc9n~+<0dEJ@ZV8R;D`33c%1OC5>^q;-*4up5F}a>9_{wZpH(@PP*5Aae<}Yu5 zxg3e@xY2Vo)XtmWkbIbAef8n3?pB@$?GMbq56!;85!XRA>xWzCk83v8s_^=O)~z=j z_1`CF$-Ejss z8gIVpTv4*fdh=Ds7HO^7_Hr(H(Oi~C0DN*{tZ*9RC5{&`5hHVLZcUKcmKcX=gt{$7 zVYz{3l65kjZ&608$kd6h_ei{zFWrrxwzm`1mfzLxjdY(pdj{T7Ah!-df*E&G#ZO># zy~s+fIIrzi9G{_c_4fwt4}ZYwm$%Ou%@E8w`dvqc_iC!Y6?~y~;RL}Wk}^&qmWj}W z-ImRyFm8co;AaFDY$2}-p(rBrIZ9(0aO9+<$+HOQn(D{}0SSUj?W~izNd(JBm@Jrp z9L)%JVg!W_>8gw-FkuAXROkYEnrtQnK2uSI4A4a?me5X0P@P>k!JH>ZfVPP20Jex` zqVYF4#bS87CNLx>Ha5ic!>P7NRbLeqrzA;M@5W5KvOLIW8{k&x+- zu2ep2od#VkFKDs?6Dkj#z$r%*e3R4oo32a`Cq_i+-6&g(!Ct@LpX&{VxxBUR@CPh& zYpGFmiVg||_xo>fo>fs_hOQ$pbrc2z3@s6biI^H4u?RK^7*)87&7Bv^ARZm)R2yXp zbC2 zP^Y7~cI<`MgaY@nXnQ-IF6f^7tG`rSm8(9Pt{cqPo@(-c{o$GxZua;a9c}DfGc%#XKKlvD(Ka21$2X!y8-RsUN^0zvb6hDWT6Vo|NUtV2k9m{ zBfm$yoIH>&(zHy8TxQ|?;<11i$Cr38UDYH|ci~&N=R=4I_rmqtNDHU_g9;6gc21-E zjznqy<@XpGkCa%kVZnOF-_(&_5p^*|jHx<4?}UpcMCa?^1Y}e-;thrY6v=$%s$=q| zMeCmFbl}3umkvlt>PUei0?wDVj-l^$mrS(Su1FT7mpMS9KZD$kt1upf{-2@LN12QH zp@Hce#$>Fx3bTe;W|Cd2XzjIv z(N{Qr>x#oX@kD-jqNpIcYc;Z;>`V$AhuiHzgF+%HW2CyNoXWyGFEj>&;qGwYybWOl zy!=2WpQ^?-&wJyv;}m%I>_IZ%NWc_L$9324+#&;x*MR#Y&xiwdM}z)>;sYnWONkFs zn~r1yM#w$uRp}GJCJ7V@XEFZXU?E04RIbKINR zWEmxM4sqfbWVub2kSpc(VKbZolUO7n*LVX%t=?WT?blgL7RRQh5@>EIS=d1{>6TWJ z1$rx+$ku*5i^!pH$R5hg6zABeVz3YIUyEM9Cf8Vg5X|8RTU^+D5|VeW?3qzz0q9yj zY~725m?MEUU4%ArM1|hBT~Q#oUe_IWE~4pgHZM}d*^H<&m}Xv3vJfmFU#IqJCwb4( z4dydxbDWX*-sXnEp>A$iJRf2iVS(T00kPHZmZb2KgjdtOYhs3R1P+;id?Jc4be%mKpDlUO2{+Iui?*#N`t4E zLkCgm#AA@=*U9I1vioLAxAkrB>(|zoFE)^LX4YTXwuttEgtPTwP$9+*`^ zamqNL1{whTydFSa#sRRa0U%Cse5{WD)p>-%-Hg?*zMI9?(OuaMKo8tSgYNOTFMvHP>Ohw4D!eRgu5A3wZ9KO5lX zb=CanXh~!K{;h@X@8~J(f0!h9(Dk8bjsEZN5Bt9UAM6cAPx}8+9;yHJJ@cHd)M?Ay zb?JE))GejpRPVD;B)tG)$twK;iQ1*L_iRp}FpIT=L}yWnja#5n{lg@2)qn3>@PkTR zZ@l_2ja^e;C)WSA=h_Sf{Uxu7)(R^Cm!i4eQ!r*sEi|!yJ$E7gkwr^+{@a5Q_a+6_ z%>Th~uv?h_`@8#lPxJpV9y$Nt%b8rr3~48WNndAzP4s2ORTJ3qPt`P5cP%(6GNIFk zH}fb=uMl`HD(ryg`H7wJ3u`3gFMZ=CFI`$HXp`R-P>=*rr-{zjuPs};_pM4c=4`^b znbb~|x9dU5anx8|3cN()C4Ad%#kQi7*GDUpT0wZA{Z07SbkeAIo;_pmRmLDU^%CVi0zrG;-hE!M9>6 z$nauE5t)-?I?aZI8Ul!S=s3B|5q5GPLZxT#}h=e4oNrVu7gK4o(`7AxkQo5 zc=;n{oY0ld?Bguqo%TXy6<~Y6phRL0c{F?N3{BnObWPpYfw3AX@P@B7c!yyCD3QCW zxe&>_f((9>hyI{@w9iORq>JQrFWhLP3`;=oJFpMGBV?CvcJ=O9HQfaloW-D&_6Z;pY$e zdo}nqc7zX6VdKI&7jGIs32cYu)P6EXpN!FeA!D>`|Czw@``ZItYya(*{6GEC=*j+j zj7K`RUH|{7KE6=v{RdS>oMxVS*MEKwZ$r<&Ia1;H{mrX_*WWO2h0kAqc0B$DPRQRM zn(kbe2CqL?v=>RWT$;Q97;o%i3ze68=lb35n19X`LkrjGx- zI`CW8!zsk*=N<5zC(aNQNyy709#28n-mT|;)cx|dP{uF77BGg`UzeS~F595Z6V<60 zeFi?AOT4pgTPD$iXq( zqk7KXPq0gMMp$@%sHJ5UU(mFa<*j%dwodo9Mo#6^FBd(}wd^>xQcA2a1YvF=o;sV! zr+jEiNT@mPhb@{pUYhX|7)4AhipDQMyWIr$a+?M0rO=x}_7hs=72Ae{+j;NIU=(_% z5qeROS8ID>c20GDFL2YsyhbY)=)$l1ux=T+58z)lM67K8>C-@GB*D?@UaY`+`)|-6 z4fYE5-)J~Gc(VT<CgHX1Y;&Se zeYP|5Q9A;a)6YZ7a}MSwe7o0&@_6iW;5i2G;ON`Tr)ZX!8HvvwS3+%Pow5~9yEWxi z4S~B}3|D&Y95I+M>pdyCIqv4s1hkjXKJ~vin&HM`+gTJ-425A4? z?QT=Zs0Q#W1NSz7HOig31`OsqAaARglB}3Y&O!;^(lwzps%S9>&K8mB^;T}mH)Mkzv+tYTjll%z%95fz=vLf-n=3|bYgO}VM6{vG(J zmO>kGP%WhU=A9BRd3K4)FrbS$nP)2PkWr-_ax10gx&NGeEbG*oSFZ!6l*~(-O}u>4 zZBM%GNw+nYOi#M)Nw@uxb=#w=HqX!aTl*Z#{y%%X?XlwjcSpNL|KI-JZvV;u_ZW}# z|DB_Vq%ou`_YkNMsm76?5Evs`JQpgrf-7Bq&M`@EGgxglOE~B=M>K`WY043u%KY=r zE^y^GW4T%zbb&J?`@lQssS`~FQug9$#s0HyNKs9OXbxy{^m^(y=9g*!>gEBZv(QKs?CXJYBWQwnA>av)J)ap zsF@mTQ2TCylQ=&SIEPt1Tj$5+y46ga1IvjyiOFwndT zQYb?U%}ar2b<*W%(~O{{1R|b?5*0hr^=$-yJ^5|3`T?%Kr$H z#L*8Q^ZQNj^&p@!IRha=k~0gDL2eX~{0V2%Fo@ApSV{eRFOKI#9*c(ndU;5=|m zzE(;G10BUaLYI^?DTnFZOfXpl3`(sL0ov+fL z9p8OmVgEM8lhOYO-& zvoFm&W?jdWb*KH#4NI;&>{r8!#lwDUn6Y%&&*JbvXZ;-1OHI}t^)vO{qkaXF{&q+G zY!9AJ`rYQK)c;T|wC=+USZDtql=go{d%I8hzaHgr?0PM1%YLEC$!G3t@|=Dl!Qv+nbUN`n zav|SW2EjVO_b7{gr%3?4+;w-!1o$p}i4ydHnE>6X)F2h$LN<54K|;W0+5OgK4D4o* zaxAY7)v$y4{%onr5v&LL1`KT@PE$0hk zu@ukm*_fea#NAbTsIJR-qI{~Ai4LwQtml`JYc2+Ag$g(X=#&`7z4y-mvIKPL1@uj! zZ%B;1!!zQIy^|3>+u&F5%YwLRK=W(cJkatYVDI91i4`Xl zUgbD<8UCl&-qF#~54as_B@~9KpegrI8*G74Op+ML_EkbAFlmG5rAXF4i!1&&c}n)b z3XbnNhb4NK&e@0CtO(ZG|HDBc|Ko5l+))>M5~b_!ek+}t2}A)^pT{x2zTUUsILm}QP|J_JC;7$l+Jz6}SehU( zIWeDXy2mg2mMC2#a4&2T->xmKwAYl9xm1zfF%$=;=ijvcV5g^L;IN z_boWpxT{T#EFr6(&`NLmYOgDrXME-LUhj}L>3RWXe#36=4KKvx=kUuxqoE!+W2);Z zm2SpT{ql!Tm)NKSDz5F^=2Na1MGd-s2;D$seHi8%t?Xus=G-=DbGkrn(4Lb;%FiI5 zwL!ZhUdx+y+tGq?GH-+S(!ot*uw6&8xI71pH{T&s?d+=B#RzYxt%XxTu=>rbc2On- z0Ni%Js^M-`xz$A)Y+zzmReEB%H0g|83X-ohdVX5s=ioyv;`h*+nMc(jkKn7VQqTfy1C#a z_r1ehsQUZ2wuAmvpN96owl8kCA+Rp~=ip#ewEqYFC;R_V9=reNnFu&W5iFR?GU+En zw00w~&LS4mTwi%_zqjyQIuqKS!_a&^6(744WrSf)=n8!OI<6_m;T8D$wXI;DEs{hf zeJXe({W_T~CLP)+T2Rba!rn%oWr8HSNRQbEhUggd%}*UR-EX0EIc_=X0j0~=n5|Jd zrclxOY-%ePlKmwYO{#FmaTj@owLF$Z{m-hl=ZyK{rJ=Dd>-L%4Kap-HJYC7AdaC-A zP-n~lN|%_DR9;}SgcJ))q+PX989F%-q=~7cNqM~ko-ZXK%YDBNba?4@GVB`C$y^L1 zhYLZ@>O#+Y9J8s_AW_RG;Upr-7+jp3wIID>E}v9`7A588mCCgh?otP|I~{2mh(GUy zYFoEd2|%aSeTk{-7ZA-7sufSzV3v{~eD6tkM62!9n5v_hEncVDO~>ALFt5|6PXCk7sW| zM3G<{3=^i^EX-Vbsk|R-}W$q4S=ZI1MIky{r=7+)UNq`Vw8?6C^51| zXZbLSdPQ3U@vR|h(yvv)PfNbv+0#h=D@FZq@_)Cu{_F1zp3Z+f%46lfc4u!in~56@#un^EKr7GvC&@{rqB0oPK@{-{rTl&kukI zW^jTN%&`fWf^lr3q&nd3tBcFymv2trwl?q&I>{*ih~7cVJ@@4sbm{T%o}=l z760Yt)qTw1uRO(Wb?8?qac?;A%XZ;GqP{|E?tx>za@y2Jd~IZmSIvKug<0BvI@jq# z*?)U`gVOqc|LOkkM|rIMXLEe3@!rtqYtwu?$*ij|wmB*1?R~a{Hk_z}c9gn>qYWH#9Qp9&J%ch}tZ={~ArVYwgmL?}c5M6+A(g^Ks$u$pBjryN!T4R8tj6-Dx;sbaG>FBi9p68W|Knf%S+D=?pgxrUXK=84 zQ1bsg<^Ow}r^^51UitKx{-6Bzrwx{mVgHZ2qP>6rPsq%9VE<1}n~hKW*=2e4S--qU zqdw8+MkL5!h^($!l2S4z4>(%Re`G3dYp9cQ_-C=3{ z*B?He|9F(AHvUI3?>z z(mUP5>H-Ng*lJ{PEVIRDmHzv_5a{tuW0`b z_nz+mdX%S1{+r`KYUqJc0??+gC@iTH%s3#^;L^GU(^%Gofzw4ok}Ci66tCZ0u#!2v z0uzN5n#{Uckdr$G- zkMfkxf8KTbHy|bR-CzANwE3$)t=aqaN;TQ~^(x#g*~12b-{#Hvf1h8zdH3?e>sK4> z8VlJJv8KYqZxdH+GKluCagv?o<*1kV||LW)C*RS2y+V9@Bog(kw zeYkjaIq*sh4u;*qsN3)MdxK#+e9^TcW(8AxR>630)gAKe^7L%E=VPXt{qjYcTRMyF zFhrM%A-6*kCP)Z_QC|JI`L1udXUmbglE#(@?!>R@TQ%$#0Bku4!~X5B%XY9_7i<^% zcrU~s1&BW?P=9b6>Q{3qpNwL!y6;(CMgA92usJ* zY!d7s$|iV;QpDI9B@@|@_o8XMLuXAZ4;f9-$o_lS{2%?%U|5R(d&>X&IL`y*|0u2< zI}dd`=yO-xG>z@$Bv8@rR2a$105l$A>#{3_M;0*ge0|#w z;Nf%n-1tn_y^epw`F|%5&|3db@&51OU~m6P|3AuO^?yFO?&<*w&Ys){WIuHUc*&mdzOU_@N9lt-mc=z7(82p>-QaC-kIR5VStMkk6 zj!%Ai_4cJ#GM)1FlY6P`Uiw4&mwq~Z{rddp(~FZIy)l*{gO#q9J?U!keM}GHciC&` zci9X3UCN!jeDz-^uRpwe_44hji=W@U|LOel^z7qaiJi*u3$*|9`>Yz$Zd9OMW2&rY z=0Aih2l2=;UT&`X|6)#^4W5$yr_=r4$GLy=tc(9R*xfJ0{~h#)PwT%&d1~)}g@xN+ zVPb;t-@xo%?|wCxOcc@wXfZlnB#F5nWW5i%Q#{k~24<#q4$3K2x?{HMA7aRDBz+@( zH+;{9dnDie-YuVr@LPUSbJu?$@X))QUxVB@En!J&mH?I~s+GWk;q*$~7k+a5`W5)$ z!|8hQU*@?yBD}Cyi)HhU%*LNzm1--ov!HTff{=u2Umvn=l;UobM$;}Pz2%^-WtKLL zk2#0YOe{EGBANdUlQba3@aK*YWW{U9JSh?jfu{d&Ss&*nS$=hL)duFW#N)zTzc& zzXPk!rApc6bH6sQ_#6bEXB5vNU7hQ@{>CrBm9qz8t^h1;xY!G7RQ19(%X7HkuaFDFIIkMP;;_tvBQoD`Fy_t1VO}=`^E*(#y8TMRZ_r$s<^^dQ7=9@# z=iUn|uGY~j%&}!ymKI`E>LyW5gDlk8cB#L`rCT6EEGPx@I$92@<()QUD;!d;kpJDe zqe{-EHm49x@wM%9&P`%XOUZ)EOBOj@Wdx_3wVgm@=6rB3`MW_Axh-z?SDQBDjI(aW z9r@BeaJ^q`14o)!T)X?(R%O=fvf^8hI@RjWlYWj?;$~=hQc9j`r5;b5i@M8I0q6jE zrF5R=)B$2E>uaZTMglU89nS={p8M1eh!a<)<}g_V6Lf;iWtISxZks8HH~0Sw%ZN5l z)P>VRV7Kw-2+13*LyhImllN$e#e@w?T|5Qd9GyxOB?+8zmKb5d8W>UggD#SMYfg{A zGC+PcVtMQGrtrWZ%s9{TVU@RmyUA>wO=opexHEe8tfgHKg{;(0xkjdK{(zP0-*)aX zMd{Z5AQmsI(6F!ULLn{V<6`7gmA}0OMgS*|a}~`qv-d1%F7x{a8Q#x61h#}3023Hpqck3SFV`ah%#HcQimrk(gf7(u@`C+xRRGe( ze1fQ|o?lg4>W6396fkgOSoja(=Is446&p&P|qAGv>Gm! zLletAwNeYRTrtidyo@u=xpX4bwoMU-INfkp-|3>RZW#T>m$Bh;2h zryQfsikcggzs&OxLW@kL;RulfBOdqgQET)?GK;we>}>w zvHmxEDi5LYHOtj%eRn~67mZ(B*lwilTki7rw^I3D`(-WeeyxO5v|!jWlIvT?4=tvjk}McU z^z^K~4YpJgHS=*>Yj-Z4MYdp>Nh0$}mA5}VZC@z#<%^r7#5g@Y)J&|~TS+Mg70L6u zlzfexlD^m9`B2`>3AT26)?QOGzz`L96(^HZ(a^zv=OG^|UgwfGoxPxNI>k|b@-HWl z_bEuJK;^nNT^!G)t@<9OS7uwR>g%{lnp8onWbuwaRO<$#sv8V3A#snV>h@bzrts1? zvqKf?fvP~wAZYceiYj3^O-NEHQEU+E8S@$B^la1E?ozk2#U#OO_Lgw5xLF;?v5?Y+ zC91x9)U5|m*Er6;hjW~)T>kan`TJgh;`Nl%HLyV@|6Lrub!3xvL1D*5D1{woBg3;a zy#9(;?%k4dm%#H!cU`Bnx^>WZSaEMiyL7<2wod`h1}W-&}U1Ux}K7FOJcb{Ak?bz zS}ENskxTW*?QPph^UCRhdFAN*un#0OAymLbiYoQ#cGYL00JpW2N>IcJ9fxF_`cyGX z{LfmNRG;stk}B>9Rok()wb%7#ZPl*J8cU$kD1Vj4D$?M-&GHgy*kZzvIgARe$h2qf zwXs>2?v}lctl3c7)X5vwbV%mp!sM{;ZhlqIq3{;&?SX-9#)z-P^o8e#2_IRY&4i-2Bi7TM0^iSljM2l?g4jj8o<n zyv7anzwN)W|84)Dwhe#~lCe5OmLeuZhzhG*M>D^}1)BNM?V?884A!- zp-H$20fo{x^*slig?Wuutbq8hV2UZ@)j{qKzSvAo z-#a)Mmd^k0Kl%S3-=1I|(|}H&9N!qM61qhrZnN`Jg)Y^W&Xn`C^V! zDc^sLK9>%WZAmFse5>V{14YIO3R(VKENd=t*3SE=JGZyD>-1YM-$WJZyLHM#K9lcz z`8(Zk0hHaYmwoWo&*Dwdp8euRuwKz(+^Jy#@%kc5T+3G2w6cdUz*Zg?DGEKWjPI1? z!!Qcpic6tFX`iGOp=Sp9QnY1G(idP$X&+T+Tg4ex!mL|Txp|?a>I@&l@dhIlgIum( zK713dyd79TJl8u1YWmIyxfT!;LarAXXfFqC(6&h&+HSk;yhc0kmlIMhI_Afc7x>JU zbZtZX@cT|3O5qmKdNjf3pWyK<}BoI^X*srRZG!! z)hgRdRA&)$$E_?qxgRZ4YK&DTtpoOcHtVS>aH$+l;~gxHt-}-rsT%WYlsw*^f~=PSm&-d~sFzb;j5o|&*f zpAHLA{v%0ZFVnFT$5U0yi#TH{PfaxaKE(~dOmKq zYt@TW@>N#u`YMJ<>6K0n+Ge`n_9Klpqi$Ows5+7NrgY$II~Z4`gHB3oHo=x~32~y1 zv{ZZ-u@2C4;ALlXqKNO=S0z#bjrcf_=1q0wIjvz+>Go7?-K~Y@2 z`BRY5PQYseT^5M?-4dd6zF_<%LfHw)R*u&!*J>tyR$(Dvz00J1w^Fz_IC?~y*k(NIUO1Oh-v;xE%hI+y~I^lOmO3-$& z6KrO6e@GeS6kSItrL;CDm80x_ceJ`CX*QV3c8UU=0{ruP(prbo{;N|HHlk9fYwsi%!?&TGFI zW8bi@8;o4S*v?ABbFzBZrDR#A=|XxEiMdxJ+@6fX-}4i;|7K7afR5|zA>)7gqhTrk z`)K%-|MyWIdB@g?I;Z6xrBEj|0E{Scl6_WQ{Nr%S4WZWwfpM2*NFU&C-Ip4X=H zm3g#8#p^@XT@Jh?zUCec+2lV6PCs8lt007 z)4rLh4xqxh#e(4roES!!Wt3zT3*#mC`^j*-V)o*VdgUgP%R8lx$F{Y|!Rb|32qcwB z-1l!YG+!cmLgtyw`1kLF?%=2$@W!pBXxC5WpfQ*r4!tIWOHC#4XDGV1#9&;tx7v&x zd3MoGVXwDYm%O}u+w~OGQSx*VN|5?wVc!0!lmGez!JR#T>*RmG?El*zKIQ*;l*hII z^m*mYOh2>7Ats;6epXb=m%W37qWwSGJ$Q=$c$7!VsaKyfsPEX8M>)t;rEd{zP$`~V z!QzApsQgE7-6)FUDHSKw<6|Lfk{8nv0QCZF*|WHT&t}=6K6$Ym+m+`=@>Pjc4^r;g zRt!WhEF{ph+%Kn#GyGjuJe_9L4Iobj-lkWF?3A z<=b;n7N=M8(%tQD>vRgJ(f|sGzQdVmZjkS=z6*YWz=8=p8GsUbjcq;4s7Yrp`EIboFcbw2+VWuJMpx3 z?DZiz&on5U2Gf{?%aj`ME9IHsWz@P4qv`1~yF^rTP*rO-6M>$I4vPzUsBK5V-jdDr zoKdBub+$%0YCE^!D{wmMNF4olZkbY)B{IJL|FuE;vc0){F}*5^b#1a9M-f@1T!;iA zLF#+LygF|Sv)6Ik`USfxDVR5UhF42Yf>H?Kb`{jrPbyhrU7MrGo~LLCsM2BLoscCN zqR9$GP%wpI5~DLo$|*?_L}jX#bqr!lU#zl#BgMIoRF~6n^D)X2vYOki*n%tQW$E)5 zKVeTbV2I`4a6;>rI9+Fkiyd;X;jroY7LI+gcJoaVDMmjYcO1sY8RS0t))H+Pc|#{R3b z{~6+oyWjr2-v2WgmhwODJ>CEJI8T6O<*+-E-@R|a8$_?vJV;0c6RiSupoCdE=xmSb zo0hx`eA~+d5ej^6&R2GU)70^TlPi=WDrR0r7{8*3{gQwTGIm2~%;foTgklue!H!Xe z(io)?mM2pTm@ZELA-ySetx^s;n1?~K3jlsri zDP(!JB%I#2Ko$fUiI4MOlGm7Vl|amYuSlOCmvz6r#1XeCb@EdBQXzX@v($_OFb{JL zfL049HONk-{6wz738pELw3QtTw;XICgozzbzr06k-R5=$UDYOvM^g2wL{0U&5h0zm zMUum>qNM}4F&Ps$DO0i3Y!Q474V}uMZMN`yGA3{mq+(t($fUu~K6QgdHl;Ld!n)Nh zH6wjqKg`HseCpb5Iwr7!zkQ6>3{a8Vi(jgSUjmWSSzcJ8E|bv|RudV~GEKjfZwAC1%_}atk!_Scz+Uc;1T!w(i(BT}J?ALj zwx4}M<}2W6-c7x$^jzm``TLi0@&#AK>0YY(sx!s?b)SYYTH^KOTSFuV$Qt^nlD~5b z}%hn@U_MkEr2lP{q|@OC*S-TF0AkLDem71c^m^FUOxZ9*7l}u1Fn~I+vZRi`Q zCIx1#B^HEvi?Q}@fheNusjJc`uTf2UfJ5e)*FuA#^#)c4VCKVVGLyN=3a3}MQdTbT z-?ySNJ!~L`1wth;Y^Y`d)rnwT*c(NAG^{xDbm5@rEq~i&?irk$&AW12_a$yCAm5*; z)eVHiY(?9*5V1}pn~PU7Q3|5fd;Q=;dvD^j4DVh+VZIV81@xJNn;A-7dlu`^0Y|cWo8_wZiK^Xo0GD=G19on;yeUGKIej(g zb}@{;L2Y?^&zS-7ibXJy)1d^*;dMzd2A2r1MV2LKj#3VjA1GO53~&PE-sMbX_A%#l zeHAptpHZwUj9&nuF2Mfi(CN2it}DMp{xwF+AF94xWsCARgLSsxV%TU0r5sT)%uWw< zb2tt5pkkym5}y|aJ3y6i$6nkPN`ZTivrN2^7bS{LUD=@s0NIR@^MWDjo1p`PJ{b1F zuzc;n?NOA6=6^W*ux_TAVj&LD`0ee1LI0oUM^rmE)(xS1BJG7A_%M`r$@>YV9 zdanLqc?d2znL~~vm?SIN%E|HB<=a;mm*1VfeR+BQ>ix&llUHSReFC%NI1VV>Xu&v{ zSALeVukvfWO5q$wmETR%FDc3D+OGI+8n5`Aw;nD~W6^mBA7LC<^!UXs02FiVHi8g~ z4pel!Ard}_Dl9C?tGe&;!;8lCHfXQVSDy)LTMTy5&QFS$Cgr@!uTzk9MG0CIh5B|5 zC(TUx3Nw}W*IvPz-$k|!w!k$`<5THV$g=_YWn55OrE|wGz@R_e6VlSk$RHFqm9Xvg z3uW?GND;kQ@zKv}5!YXDk8^fwY}ZOdi;%p>EeE^pBxRlv#^0)=%N`EC%+fNWU6i2Z zG|=_-raKj@EX`a@dS<46?FpU&mL3cv?216-dtY=EMWm<6OE1?hI6Z*_+G0Akb2t_1 zOgH6sW5bqU9Jei$@~Sp8%S+yDBba#crc?9_FwxL>o+aq)<4HS+Drj>V4c^X{QJFs~ z;r)2F2Ats3GstIt0{AXN{0z}KmKSNVa|x>gkYBXDu5L+K8w_e2$6p;``PAyYat)Uw;LvPpZrmVsn}0GD~%q=pA|Ld_@*w;8W4hx8I*H_rUSVYxe)i zPAXEWlz3tWUhaVBvrM`miwy2yE0|Bqfv;cH-7DF=t0a=TOof?@E`>f+V_k;w^=m!; zYZ|t_6Fi{oOx2UI>x6vpA=V72ru;HX6bgO)wzMQNaD6h@pWyW5sA*#2$ z>)7OHwwU-I^@|)psYC$#C+oH9S!@648~}*k{v1%f{Wlowj|%y}hW*{Wr~HqP@_bQe z1TTbL2XPAQaGN85F~Di@WV>@vu-c9j;7$xQWyLvyVg3C{hJjY@0Zp$ZlksCRX|&mU`y9l%W*Ww0oO+++ zn~J^_18S=62mBDB4-~?U+Nhs-PZoN>0#)KQhr9j9Kwh5SMM+H4CKxL-W;F*v>t>k zRtw|u{ME%B;hg)wc?Gy1-oN{BR!8AmfV>ZAA;DYRL!b!8@6u%To)9j~cD7<1 z%{{4Hsv?%dZ%HbufReF(KDvDW>iFg5ySK0Z`||y}cZIQP58B~yMSZjWRypjc)WqA5 zr!P;BFF&51pMLlH)#b}qA5TwSofq0!5*+7EIl{F7<>mX+kFVZeo*bVYe|P%&^y0Jx z2_{JZXA9@ze=0}n;(y9nI(@y7E&~gd>mBfXsqXOb76vwYJVN;y`F7Rku0*gjVm-)FrR` ze(a2mZ71)M2Sd%wVjuNmE?TUrD^L$sbtjIl7@5nF3y8b#*CFnf-4t=J?s~+FVzF`x z9#%7XiDfmTpmZq%1$`!Q&LnuwdHqTE*ZlG(i_1=4@c?HRAQWg&UVZ3PW$iPSOOs_N z!qb&(u%|#w2?Ze~5xR%m{*Zs8bZL0KykD$8`r8#iGoZsn9bjMO{Nr&?UMI*jF0+Cl zpLQy^)Nf@iclyK)3bcw`gaZ9${cY%v@EVt4TV@bSS03b^5FMD=)mhoXi!W)@lrK)m zp}3CZ9GKQUAuqGjO4T~74rxjzD2%m@Ywdm80xEfo+AF-E3-tE*9GssVzkUTw&Z!v4 z`22KAR3}Br@*a%P-Yww8G36i4u3cN^v6X?oB@_2oyR9aRx}jJ(ARASizpB^{3hx~~ zzx}4s@6-9b*8e*rjAxKXvxoBk_6Pg>#r^;O?$iCRkMlh8{{O|hm+!_PMhW5w#3Z^# z6hvg65r))TnMyT{5WxQ>mJYz|X#vce1P@ql^&QUk^>4n_&FKPdw12z>*os9w0i7E# zWnG*Sj;E{c9DcrBFhnnJM7I!ou|M1!9v<3l&NiZyP{0tEyUe;;dmH@U|GO5XxetQ9 z*dGiVLezV$pFvO1y0>6dc1aC!#|&`+Rzjj{0n0B{0rK|Xg8H%JZGpN-w_MXeeCR9~ z?U)aNdciv4jRlB`%t z;p+XrZmZD-U`Ap$|DWfyv%7TX(k7SIRPkNywnh1DRXIg@jbR_kXWp%FFa}Om%I2Ey z-c%g~^P8cVNPr1s%v`=xdf9wig+((IFA_uzEbm2gIPUp|uU}iv&&^<%g|+#+wzhk= zIA!^Ekp1B)aIc8JFsKYJ2E|`S+r|eX%P=dlouU_&2ahLti%U`{- zp`P>7oU^{xm&jkE6{~6HSFlL&FW^_e2<7s|;O)YGRUWBhu7$6L<~z%s?Tj3XA8`!I zQO9|E`Ywbr(9)(!fI=?-R7oBJ-<&o=E>Jz)vjl9Jt)dc)ZRtE*r+7=cCg+9^*%gH` z3Ub3jeXHPx^4D8(LmALrxSO7+e#wR3YoITU1mBDi_V}@qY7n7PYad`D;Vk?5S@rlzf-k4ReH0^ zpj1}}qR*mskN*Gcy=!~hHr6QG&;AwIN@q_z+mcC9SHIKQ+p*KsXVS#ScGB}sr%wZs zkc2TsumogB)AaoI{oqD|AR&pglcw`T9}-Ih7uLdM-LTdIw^8K*nhyUnN^&Wpzb@!7 zh!s?PofnC*2dJD_VFa-JT13N`gM!fSl=S#CBaDQkY}$)Z zUi6FcwDaA~&1FZ#>sEiiu6uBECfds=5cTT`xH-G5M5`1}IpS4>s^xRsKucoF5@4>s zckTb({9nX@JV*fS%KsmY`!@d{4Zhs}^hrLF|BE>WGM5UI1jJ;4!~M9v3KPon?b8ge zV75{IQ*Ec(%)X+&s|P*xy14YxhN-J=b&Bo;&n)+73LxV>WiOW-E4fiMCSpiwfv#*; z;PzAoBdMqI^k^@NI{I2H3y;IY+D-hm7~PvqD(|%xTqnPlQ3(gp`g!JbPRRc1C?|2eUm$kUshc&swbmw55k2vzyN;$Tl{xg4G(8sp8ZHr6cnS~# zStkVNXbT!xm|m0cb~_bYhqN^3hI&%dTRsLtolykTzPyu~=FrpKaO;+mhALtMV0?~Z zxXF*PjA`WCxL4B%Y#&w)o~xYe4BadwrvOw=B+01kjSkQIrii`KGW^kHsbwJssK(1@wzqTJWhh8)c0?*^zlOd`(Zf zVzY))>Y>O&FnpG>eF0$$=w1a{8GWJWl*(^EO^^wq)9oBeUw~C*#j3DUq`b)L=_Qm5 ztV?xO%&IHB9R~;o44oM(8|ZIMp-2KUlEQ^>^vZ_zuREZ+n5!+=i`7zdyP&H6$RI=W zbxaZKY&r6~3rnd=?t+tQHQa?PPfjgOjn*;lLRKkBUV5vpL3JgGjU}2E`>L{N_;csN z(S6#wxOmICZmLgrP1BZ%`r^HRoX?)}|3MC*9rAxL9FOh%4{!J-|KpQ*XaI4<;5O* z%!;$W!)kGY#6DN5I0qgBAxjZ;^=%LEoMh6gxDBD5Z`3KJMe3@4nY}I466v%H`JZ`+ zc-~|AkV5;%ti1&~XqB?fInK)aOaEFbzgpJxOi(Kn;dRARSRCf%;5xEpr$&3;-UG$| zMlbOS+oyW9o#c({`Vn7s+Y^i28jt3nI+7%-?iV?ld1`d$(A7jHHFru^+;iiMrVm%3iYrOpcg&Yo3G3*(osLB%B7N_2hzD8I|~S+IWt za;=wG4vleP`#8{3saV#UZYP@x0 zTE+kMSJ_*tb@ZZqO>X3>^-r2`(E&+{`)8S)Z~AogswA0K}sSj_q198AYT_7u!MIAKoFrAZcqgHAi5K@w(R^zVcir`dQY;* zmDT<^Rb2-^c4m++J4c|?MPcVBqtq!!<8KP3b;59*qqo}7Ut$=oa00q(PBQ2&J7525 z&hc*@&`pisN;B|V2c$SzfPdx?|L6aF44{-jwx<7;LyZWaF+wTm>)#@hpt{Po7xPzy zU1o@)gw@HH*6}|M{{Jr#kK9}a?BM^yp>O+t{PCCjKR(T;hX3ojJrqEY!6YIppqYa> zh0yW=Gp!j>0K<$>3f5^P77>atquQ?^!UmhlhJUH5&P6E9f-_2P&g7Q(UH4CSog#Nj zDDxc!q62iC%nr%Y?H<4szvYCG4FS<5(CLT=Y7=-l}o(2)pO^wAWC1(5+$z<6mq%I0f*oNn2iPz3XRMBivITjR+2Wa;$~6my(QeMrNTdc$vV|&Cs^Ob-`>7 z?qAU?v>=I}=r6HM@fTxUvj!e#lz3lVp;px)As>7K1QhT(6x5@Sh=g>JyiVaSYjp5y z?LC&-B-8VGnKPuP28)moa~8E5%#~siIVgi`>;pb!B_sL=!fsz zntt}!v@JVx5ccRDhGdn-h@o;{zaz_UhCbhvWz;_wyE5=i?5{ zHSzzcUe8Z&PM@7#KR0`>C072Q^D0Tqf2I>pmV1n5y=5cU4Q8p-lW{ePw`c#!|k0Q7tL|CA_x9RHsJw$uM-b-K%CSA$~- zP9y)H3&)S=|Er^RhyTw>*n|9k3T(+BR6hw}TDAyHtz>_Tu>96uPQa=Qa1TWPH>L46 zEL)@B17jA`78tXb{yrGHe1Rs?bt~a(p#Cbk><;(V~yNoplfF$K|ZsV}@Jy=JM7(dXM$)y5E~aH>1JfvwM8D@}KCkd(_V! z_Mfip+u8xR%m3FORs4T}_oe>VC;9B<|0}9HKaLBqQZ2f%l~+LMfT{=4fM4T8ES_%h zBNmOeyAthog*WlDcfct}Tc`HgnU3(gfpqaRrWu0K26W$mTDpxtb3yXkZ=k!B=_7JN zfBWsf3||`fFX2Y({0I5b{-~cu{J*6Ga0mY%`J<7=|NH*vOZ?v_`Fvjfzmi~R?E!Ai~jAN!JTyKUR$^a3)rUpY5Y1I1pSf)x?O$PZim*syO;N^n~+LanFjHBV_p~T zxbLXD10R0}T6Q|&wsP~w@f7X@(dGHH2EBf%Jl=rq;aoI~GlR00F2*`wsR=4)5)D8# z^fB7g)2^p|J&ljko6FzG*ThHc(&cpgINjEJ9zQ$g-VNxwVEcau{+IfXpXBp-+5cjxJ;d}E0BWs%3HtXk_(kszxA_Y& zJIwxQb|H+`lW+3-5jtMS8VvET5jOfr&H({-n*m>Lu*1l%LTh7I*L1nfT;5^t3TUQE zAb%JI<7r77Fot=D4vaIBa!0TUjp8t&cmHWR2U+#bTG#^p_ z`wp*8WDPhRBhJXbS@B^Bm*_+mgA_Me9b6%{&Jq9tC36N65}{Llv!GDw#C?tjHFxeC z3yHr)dmKQ1jmj{=~h7^|;>FA*=uFywwlw~M7 zUuQU3T+3VVak98rBqaa&`Fj+uMH%S>0J^F`CrU!3Pv%#Uh0Evf(+tULw#^fJk<9b! zub@}DAeDbe%2jESoq&tP_*s%^CJUJrqkRmwKTpdH#xb8Q=@Y43JDLs^0tqCHHG^OsI!wbf#PE8W%J&7+EJ-=fVC_*(2* zaTh>kz-^4wZQiOhzj&{f9aTC`v_GQ6H#t93qgLa&s6f^i1pl40+wy>L6NUHDP>wy` zZY)W)-)A=#V(-)K#^wUHTfgfbZ_iDDtGxKO4fpWvRlQrC8`)sf+ zTk6qv)2C52WKWNvX&AEb@e~bXOYhP%KDGU~&Hfj$xev7czuM#euaR%X|NEoiIQU}! ze~Qn3_P@y+*b;#>zQk)*icTr^C(juB@ zNpIv_EFt|n+T@^$cdNaYJFT=dEZ&+aEZ}UJLZi{goI$nx&q;WTG9VH^z!h3x%Ce0* zJ_JHAgQpQnGZaFGq7$&D2$UyDUJ8G?j$`>21vsG$!RTreNA73+ z!(!j*M)LbUo3Mn{BaR^A+5u#I4wWkf7H8FT%P>{O_R$B+RPJ{VPz^r6xA5N~|CN^h zvE{!v4D9>gN5j#V`Y)g4(?I_JJvSl%WiW}j(JhyVbLp!Uq?;S%zMKIRwVXrQRg4H8 zN)iyEG$tE)(XN(sra37BRp?zeTvs=^omTji|P zS67EBe61b`B)KXHdZnwt%%_DyN!Bb~GZj|VH3G_><|=OqNfS(QUA~T`Ds^IAANUmg z0y^DJxl!dBVujB)p!3hpKRcc3HGdk?_1Wpm=iPsNdu>4khL5Zav4{o1@4M=it{6pe z)g4e;U^zJCu!?~LyqkFYp0>R9tnq@pvPM?eJeM@nf0hHEm%hg`vE_|@Uu}%K7G?pgU12uqM`v1rq+wnia;EVqM zNj{C_KQ~~hycTbbVPzlT|Zlf{EQ z06X@-?*#*U|NBGl%l`iqp9cH?2e}*ooRKwCuIr4%v2bC-#kP%~uO!v}1}?U^|E~yP z+xB=ZG*d+vN5r-V_yfq$0=@qhClTm$vw!|G`d?pvpi9^vj!xwDxj&p7{=9>#x9cJ*zrEvf$6*5lDq%R&;km!_B74V9KT1AENu2a4twBr5^n%W#G4!?kfIF4 zI6=LG-ud;<*NkN7;0ZVrOBTF6y9N=?=s|CR*|GRnqJPkv{X07r|LPx>i(~$e{z~tX z;{wnOhPUff$Ub`Tmma-O5B}1d!P|qs^w^63O)|VV_{;x)@C3YtnaGE`IDbwLdTB=f zg+g}F!x4hVvUx`Sb8lsdU%r0PTSbrF$JYJtdqY34^FR8* zm;8@U^LYZ!mM~eMm@NJ}%l>w7aPU_sViUem+E#bk^LzfF^S8eq!@nIodGZAOSbFf& zQ>~3GFk7x?LJwit8i}-DdJNN)il94~p=0ySpx5h_ARU6IeXrl|dO^28Iy~TgaqRex zJ@|`CEe4T1F_t;XF-S<#UBQ2mOf~-&zvqovw&Cn-j^Be$gd?F4&bi`;-ltNV>vTH+ zClL-IBN=%56JZ$n>|6>AA@C+LAf7sPrDRA|=VgX)}_C)5F8|t9|Mill_pW8InnPNT%k9 zc-FlC05Jn|k^!7xCaLd_no-{$xhH($pl#BYwo#e3NiA*d7&eR|u+Czk3z9Vhzr+Ai zK*XPBnx$Lm@Jq9 zGL*^F1{cah2g>`2u^N;IWt4~8QQl`a`_ugvo1P+nI@xD8E7;BUia*`5S6uo{YxTy` zZcOFIAGRCIhWd%WO+Rs|C#|#-hA8U>y})LE!6OjuHC#X*UqG^>a}rX`Tb|)8dImGZ zxe64A78#zcx$4LH?`*vgy?K-UM4|4@n|Oy7PtVYb+#&FeWbdRIO|(%9v&DLa63M&# zQNzVM+Ol|E8e4mXtvrvWy5_ZG1m2(-z20C8y-t0tExoq3X40EmBHtp&#Bz#bat~G{ zL*Vkw#rg4@i*s?PBpfJolZ4Wt@q#~lad9rm51MH;UNCi&@6zL1s&Sq@-QHI6XX{le zqU%z~!ljz^uE?UI2&fXH`7qHX%uobys)k`d{!$D>;2H+cF$`Y2VVLy%ahYd(<#7nC zeg5p~`RU&;UcCU)a{|8SyI$xkD7ow2!Hfd3W)w#VkU9SiP$d2NVj%X^x$}YWz50QW zc-M@Ce9(F*3|mt|+BO#4%)a>tm?4}jz`Z)|kY_d#w`-JI!xxQWkC;)AS6HB6o{^Ot zybP@%7N<<7X-ef-dClaW=Q-q_B+NBdt(c{F)3?T|V3+-Ff6|6s`qO5Dh_~NDa~;2w z4_edgSv315%|mN_ge1#Q$oQg=>;Z^kZWikhbdUB^xN^EjgDrH|aR~XKCEcUSTze+n zg9@*VNqAdJEZ+-ZhWJ9@k0meVW?+6Ur^cg^iNo7F$7AGL2cy>OU}UX>QF$Ho?eRFJ z;<)qXAL7~=nUX96CIqoT!^scalRt7z{;2ij4^8_>LNbZp+Gnxvfj zGXik3$PlHH=6)kb7H{vQd01=3$Oo-y4oWl+4MV2i^;@}k{K>QtL+94m4B*eUSLToZ>r1bLkTWEGLuVHKE zHME%5u*AID**X4X)JVhS?e}$f_>*D7eKXv)Zyfw_*qT2MOqZ90WR7R!6CFwOpy3)C zOb=@raU!HEhB3eiVR*h#_KO_YW`bujbPJwAty@k$Xg#oH!80&CbA3Y_Z#J+&LxvQ% z8PdQdcm}Nn&%hEq14Hom-N0{5vw9#RtOWi2h8wl-FhwP@F8bRFp@AiY28Iwa>DOyq z`j6kedV6txar*Pyi|dPLFQ5N>{`~F5+4JiY(77Wx>L`y?Lcoj5Hvm%rDa8wJq=^yn z8*Vk<&8`P75jAKnq6U_T8WpmBW1TKC7$JGwR0IGz>2ZjNL2D5aSR!Izh=>wB2ItmDa{@Fm zG({nv<4{m?wu_L!#gc>8EIF`Pa$vAz-!OcdEyjk%?|6&x8@O0<(3&L&7E2CFEV~^Q9{%a&^C!tG{@2A?7PV?4D$|^72+4`qpOYmp4n_VgL~dr z6@qE6Kd{DgXpUz)g<#lF2^zYUAdaAm=9UV zOqy-F!DQQ}b16}KYQA+uT1u2}DpBt6B8$jzGq?3%>~vdC>$AA!g9mLzdwC985!y^W z9JsQZ1O}$6RQlaOteTJ{LepU!7iZ&UkUAsa=IrcBV%yLKFc`?ZHhFb+J$#rUP_Bt_ zckmYw#t0_sR9>Ww#m1G_1%&GivkgeOfeOJ4Go70u=@qF+EW?Wh%5(s}&L?zDL9?7B z-rlr$EMN@-w+4ghHek*4%E2Jm0<56{Kj@FQ0c(g^zl52Zs}lbft1v<-6@^LovRf=e znWvVJ`<`>nyVS#WS?u}dwoC-yR1s_T&?By_M;R5D0@*ILyo57@6pj|L=2HH&>XI9g;M^;l?wDfBUR1=~Yx?MpUERaaBOd^z_$jHBw z)Hl<#gKdsjr_#}uddnl_o76jU2ql3nd1(35R(;lxLK$m0Jr0xLBJ4MLsUnpc$4NJqF?GCgUIrOPfTYYL& z)~7~geac=MI8j0-DMBf#(qk+nRKzen&EWq@udLn}x8?#Q7GjoK3>!+Hp;P*d9NN>Ut@bo3Yfqz+_T)P=^eh4g&D7ao;8bTv4((~wR(rA% z^hYJ_$z6iTBCug9=0{9hh>v` zSTd<=(&&ZP7pzktZn(+oUiv{pQ!)^yq-&iwG|>ZTqUV^hiioQp%lh-9VcQtpVOa=StH{K#Bud?3sn*1L4OfY`WtH@smD%I% zZQreojF2}c3FnDyE3;8mP9IJdt|6|M@~w+nST!w%B`I&5rsi5aC4zmb@#SOqDD zB|%9#u!qHq}&%SguLj`vNSew9GVG*{>16Gb=8c+|QjL?#icbolYHCu}p&<<8c~Adis^y zfzv4~V!k9WdIn>dgeU{2d|VXy%~Zg?+fy320-J)?flYxG*c6z7O@7zg(_h#hHFJpe zM^1-m;0kvNT82A`H^&x{6O+h251jf9Lo@sC(9FOU;}o=xaSE&$r@)MHGKth7YK1ui zl87*I6zPlI&6SNPp(K?qQX>VlKWe5H^+!&_HE=~m1+Al^0xK#iFr%WpEjJ>l`=5>r zmE=Sej_`DdTZ9*gGCo41aWI|_MshS7o#@1Z_KWoZBnvpvkA)s!5l*EV26^XzcVtJef*NmhnTVYCt^cN#BY-Z8; zL#IU(I0CqWwgFs0&r)Eg<}g(K)!eeXgBj;3YFS8&hGht@Vw@ll&A>W~DS!)SNO$0f zhzi<9L|MW3fe{gzZ3u$*rJgs%-AO9ZPOD^q>3gP%Kx4 zt=0v$tom9(&s5b!Hhw)CF14t&R%9tf!G37C^nv#3KpBnxerPx)d0RAWIldnnE`ixn zUiR%t@%BN(Ri~(RnIfx7QNKJX11B2wlhV3ykX1LRU!D{<8ugRXzFdzz8s0u=)L&mR zX?uOiq-PfmDvyRM7TsCKr|oEXr5hb5#XTb1@$g)Bo!8o~^DMj0GweEVDg%5SsMPNl zueDL*Sw@X#7&SXksh=LNwaV?4Rc_Bvxwm6dukw2BR9@wm@XMNuSLnSQmx&XXdd1ai ztGIe)#nmemSB}QWiAKHR>a|r|t@>A9p}1~Gqh6hCUHr)K3KX(q4G zgE$&4Yr<6@sbzVje4P%;xCHy*;^HIi*+?0U{(flGOPbcDg{;a#ULk3=qv2v@4@trD z?N#FK#%0V=u3N40K^ttwmfVw&3{-skvey;7MLmslz-QyTtCewb&h7Vs~tdUH4@nB@=Dh?EHD^I({Cz#QC_jI3HW$d~Azz-;thi zk2ADb!z>c_fQh@o7Ko|)e`-TUWLGZiTWw$Qre|SqZs1BCh-7^$bN}96zEbgme0@R& z?h%Mc@@FOv44!TfI|O9S0GX>R^_?Wuae{GcrDj}KYR0xwQ=y2zA0vk1jlPI%ovbN} za_WTtKHqUD5tmh!TFgnt$HPToow77;t1OMn3d-2hlPcsXnn>)3EjMpmlVqrN$281v zTJIkpJM^7#TYYC-)_2C1zEd-4@}S}_P3*`W7ru3h(YUQ*G%hPfV@ok|lqVH$InZe3 z0pl+Y%4iI?4V&UUFi8j#=|V3tWpag!^b`42Zez}k(u{ zmywShI^(#l&NwdXjAKh@+|xNYZ5AFdmC*s^s?0dqnk+3(;^kmAi^rJCa17Dg#VXCn zorrJ}e<2Vha$@-wF|W#}n}oslSj}FeXuqi|*l+Amwa0B$ZT_OAIF$5;YJiL2a-s;l zbYL&nGvhi7KF}||JG%laoMmcihmDeFro)NjTHk1$#yI3lM{}Z3#Sn^AJWHc<4WCOb zX|I)(hp(iQc=jSKZYq_pSVKqF8CN|^_k)P{uh1OIWV^qpqit0lGlm;3{Ta~$GcPtI zw;AP%0mTstIT3O`8ij{UT^Cu69X8Imt&KA-+c;y(#;Fdbs5s6ADc6Lc2&=q=Y?;?- zk@9tpVmsbN!|EHiwfaWZWjJHY;w!2Zo6GbHQI@SkCW~H(#V+o?;k?oakS&I)SjrLBQmBF}Z+J&sUBr04&4ihK5SwWAf ztIDy$vYzs`Ar|sguS9xKwr4zN%}zxlLzESvOISwyPMcL8nYs#(ClTo@i4e7jC$9AJ!R8O%09lex*(=uAb>?P_q1MVbwWiEs#UC8&5R zZ*}M5SACxop@~31@e0Q<11V$-Wyuj>OHA`V?jZ%UHI9X7&X7pzSV5dHltA8HNGJm{ z#O@JFq~0aL3vU%y&6Ln**#^LHiP0TLaY10rag-O=pI`lVkMmA&B`=iX%#t1){Czz` zS%Mg%C*a-RzVXGy&t31GXnJl)kAs5`;0mRLVn(tJ_y9z(-Usj&W!xG79}Yfrjn9YD zfBY{2@gh%$6Lg4SIykuDgMlf4;5!trz)LkOGCTC(htsQ97q4ENfSd0wuEE)Nr&l-N z;u^eqeFMIKe){SL+`Ie7LE_W9A}jE4!YnPAwlksKj2&J>f!L93(gAE&M^&178R`{`9p89IA(9@<;{0L z+^~$l^g2ZefZ#_VpqhxX1l=EpOF}3*Jm_}22d8liuJB^XC|4~}c84O+1vlj-u7ZUB zAQDjV|0Rl7UFAA>bRn>n|NGv+AC4{l9|V5?3;+KVAI`&MoH6Gt-M3;192^+y8B>sE zcm*>YZv+#LI1?5M-~*s6 z;~f73c-MJzbJlqWK7eb)Kz_9;xWOy*Z;~Jm*)Uy;yHCLf<*MaCe*H~A5Vxdm08BQu z)-DB0l!^R5ZtU`h*#=;SRFDY^e5m;SIRm=5m+Y?%H#qP z2o;_7LJ~=So!R}H?$Qz#TJ^~BfI@%)2sp5=f+mp?E|oAul!7^q5nst{4+Os@nRH{~ zWKNE9vCF`Ze04@7RKk|aHWJdFVX6zMMb=qYFm5HflvSuO@2UYieqtbeSU)N~adqGa z5MwG9(2t#N7p~c|bJR&lf;vCx6=@74?@jCxoFD+Rh1j07#}_Td5i0KD>~_}_W!(re z*o|-|2CGQ7WgsT9o|)W=5`1ZpH6ZDAqz)3K^DzP+z>E++neXN>rif$yT=^x}Nm8A{ zVrk<JDa@_es?aghh8^&pE-rloOE8gBWm z`*kWgiIf9e<(K;ff)|*9tk9ch8&OO_6$XP`_6T3{_4Rjr*SLG`$&`P|oehR6xak$V z7Z5bGJs~}V6paQo@Z^IoO8A?R4Y~(@SfT{X2wNHx2j#7`M`D~ag%C$X7Dr1n6e4a* zAP4IzqjoLNbgQU6e~+oyF6z`*O+5d_9)TNeDFO686~}y7SXeV8H)6tao`t|W9Q~Y8 z_-+ex?crpRAxihyi!cGIvEeJX`KqfMmA+on4OisNUh-0b%{#d#*)2{M=Qt}5@^Qx$ zt{kRn2?TQ!@eyiIk`yHlHD=W3Ynyfhk{`NIzKySC^@}BH9XF`6YHJA6*aLwiK zHC%H&u_$c3`C3aMTT;0|79zoucO#jd1JEt55s4hso2!=`&`Z&xc=aw#_FnRqVUjQS zx0kPSS@Kya{(0bG_byEiEwXzO!EbSl$}6&?c0lKZOVgu{KGg1Nh&<5%>s$(1Ee&ZS18O?bWp-d?`yxyk9} z$M9vrT|%BC@xu~_OR>oG+Tw3&6L+TMZrOl!^`-m)Mt@>73|&DkmQs5dMO+1z3t)!k zd`+-Sv}8o~E_W7W%br-Ag*)2XgM7ECq9+w}>zPh-#vnrQn(+j_H}+%)3e!hoVjmw@ zuHDtJkHX?X35TeV4Xu@353I*cm=4!g6TSS08@YxvR*80MC@pht;~_jE#0}{BGMFBV3oUKl`W&g4l61)?|?V& zfwwTmkzVP-rqVAR0X-umGh(hqr}H^ZFx%AZf^#&-3AfI4laM4-T!_X%wieEuAAiiy z{HNmJ;5OfbJxm0LJ`PC|qLk5N8ZJ?^j&ZW+qC4qUJLcx>BI%|i>Lw&Y$4_)$U6@2& zm@wSczbGahr#L|uVktUSmu#|iaTP#%={k-tNsL3wHolm@BJ5I{dX+Ihm0idk!6ATD zfv})w=BbwfeX$HPK0@Z{ig;~%S2lPC7iGA2qE=G>|Ij7u4@W2cDT;!@#Dg9}gJ3>} z^U=hgqi7fn=3(C-4*e0F&HZrTBN(C4G?>i#qi7ON!+tm(PJ->&h~7CybvowjJCtQy zj0xk7x6pQ`HsFd~A%LtIp&^VVCHchuRWIScaaI>a0D|vGhX2jqjkyU0PSuMFPGP2Q zT_mO($h}Z3VC@!*Y2Mba7`vMWtHuDnN5^%YRoBp<*YA0H2~GN_A5FYI8ct{Z(R4WQ zrlVnh3ZXYalVFBsQQz|h5gd&MbA+aFHVUV{j|TH0|8p?e11r6bv?a22DXB(J>EVtA zRYVdxmcW_TLW|1#hQ~!Hv|NVv__8yc{ko;nWu;`DZ3>;&I5N0JoBa4*38Ozt5Pw!U z^~$&^^{H3Hrq>-`oElHL{TLbEO?`(zE!YS$SOc$kOEeIHy9u+-EmR0=AMfatAu!C}zkvK-#j-ljY8kkL#wp$cQJ=Qg!C}PJEL@Sa|#J2QOtECAu z)+jvs@E+YBJ{4=MMn$)`-**l#N42?xK8o`yz_Ywzpss5ufr# z1XK1>m@zD6iNRkJ9P5EFhy+*WtH5}5TMu-dEszU(F`5?e6?_lWo7;e|6L<%4EY?z+ zE=up0JK|a-LyL_IZh7f~b-Ku4gh2k)trh#t7GZuk;0EPnC2y6t1-r zmeSjBttR0b)dG5*oTC^qRDHbw-2>-hiEYLrzgx7+$A&~VOCt;75-Q2ChM3!}Qs<#^sMSn%PJWaRJ0~4c zt+jL15sR;L((yaL{dCl!2xj3D(R^O?aUnQ=b*;~T=~1q{>hL&O`&D)WR&WC{L`i&y zKtf|eZr7i|3#{+w6& z;Rg`bqX zwd$>|I_JU3;#fH#x-gYVQGBYqs^Rey>F?)uFk2%1^P!@#&K>nV#7RBgJ#bS|&#pyk zo8}cK;PepO{Nn_?xj6&R4#DN=_4NgoXzkNMkge+Fko1Mxx0-M1N8 zsc!)EdU`Iz?-lW`AKs*K4ITQa2pCfD*SC4kP?o^>B4H?-!w^;N%QqCMh$yUbk|ARv zG)EjTh)4>#@398b(@~s!Z{NcVod6LEHQS`J*!k^*=8Hh%k-^hC^H!Lm`~fZ)k5)yC zLln+5XB%yx^uT2vEv8wTM3M6=-rpi7GZ^>g>p132Avb)sh)I+%oFS26!TZ5Up*ARJ zm@4L5-7IFaeL92*Ai9aBK;Dd-AHOQp1!TUJMa6W-{F%>{Hm~l3LkY{U{Ph^I@R+xx zpbJ(oO*vW@m%Md`sCtz@7d-aidlyDgS9RZIM7X993%de??mcEp@n;uGypIoaN;T7} z8Rs90gc7r5QSf3z*0OSU&TSb1?;LFMUEXEI9jfN)G>*x=b_NTdIeO1I5oX0}I&_G` z!rQzX3TD0Q0&jCzl-@Mkl*?~>XUdRG$-lp$y-4=0(_AoNH-wG z;jK2$=OXb~pZ{`m{RrSyN-_o$=Gd7!B4ej7fxoI6qn+-AqG4Na!V2Q#&l*n8M775s z?XZ6Hqo#Vx^j;hSaphsg=TF4`M|GX78Q}uCZt0({8HxEbV_+nA*6}CeYAuqnBN-JW zeDmTWf4)lPjl$G?y9NO%`@Y5RQS?2Iq8M@RPHRl#TrD74Plrj)pTUa1t6r_|qLF_i zUo$qWc@@zjyf9osoOEZ9;!p+`3Kf{lC3flsb(GFBi01g#e8Odz;Djj*k>;v=f>w~> zP(+!X36+@&ojITFV%$w=A{{hMQ4&eWGE+o!TJ%EmSe*P#`OuJeYh6B}Y!GPtiuL!D zqLgcE=&*zc$BwK;G!~&s$6e`uQ4)zj%IZi9uKlC;llY^|I>eUjqW5r>#;6yQ5XOR$ za3-sTi|qnayHuzPbsHh?PMpr`Kk9;{F2%9sqkyj-uU-m~EZL%1VdTWc;d7%fz4KbDH$_;uIskwXiDq8Q|tNKzD5#OS0 znQdh}n+~AQJIR@p%9Wy~VI`8Jrd1rAzPK6&t=jI(n^*O0Mk}!z>K~ZNR7l>X$(GI& zq%O3ca~*caj8;05$sd~F~;Z?0Zm^QLQxjDSr}!1=SD+2htT=lq&g_kptsrrl|??xfya zE5UDY%&gwq(Oad5>e;gI^~SwGA1;rA@gSJ_9t?-0{%kTI1#lJx(H!;%qyBUfjz;52 zI7hQ78V`rla5U_XhV!8}8U>T#Je-eq;G+#l9r3$$c8YLf_wHlOozv=Lz(rP%e=AU;WTUh2%^~ zWO`z3&iaZ(Tn&%ag-J%d*rNxEB_fPPVj_KTD#UH;Cf_6S&;-+t1?yP5Fvf+O$=>dz zZW`=%^>gVe>*n*EDYdqH0y`{bO;BtL5POoXgr^JVc(n1gNYZ6hJ7E+qQD~!RUt!GxRzMrQ`FoXqmg@iwshk5zvzci8L69+M&WUlbXzmL@2j@ zR207)t_@jd`Gra<8$A0T&9<|A`?$cWt4hY|qp&XTpB_5LVtX(YH$BS%QI~Je@@DlQ zTQG8SHif?K0`>AT)6x1VWMibhyr;D&@Y0Jzj;(xr|M`Wf6mD(xrz+2 zSA)=;WFe|}Hl$z>&vaa!C;%*=i*A45#z7+U+Jq&fPkJ(KFFQJPdNcS`#d+}7?pYG2 z^_6S|HH<$9ORSU&pweHI-=b_=^h$@-?~ebE z1=NH-TeI@QFft6CbMVM63B9Wwy=4eSBC@?^d26WQFAYgeay+0uu?Z<;z9Q zH`j?c;zbd7YIJ=lwxk4_tmF6yB&2#bB3F3?dq?aDh|)beRHTLi_wcW0t_}G{IkiHP z{7YBD68^q-C6@TEr`90XV^Fs#N{rFWqY zuBx(f(Yz8}by8f6ex&~V?(ztvci|C0tCVfdadxB}VMj&m=}}SUl*@a0mR*nM3a0w- z!KFt$SC7eD)Me1&%&R{W(&9QHT{F9}^ z-uuEp_;c7E209;oml%DOH%q=iKF*d|)9jHngEh_m zklKM70he%6WIe`y)IDw06w3X5^o1^M(nhAGs)kl?L6qV3l&?TJrd6`scsv%tm4zCd zM^p-!E7LixdfU;Dblw|>V!w87(WZ0K(N!QiN1aqwURiCrqHh23YSYc1{`Qlln5%9j z-0e1>h01?`*Cj$i1v*tKW}ou+b&VgipWz3@J|((+(Wn2_rzfnwLp0 zT~tLM#NR|;5zeX#gv7SDLJ?lqo)hSxL)C&2(D@#%NVe$|>kR_7O6L?jy*mBAJA;Bp zii4#MWoUJ1`pv}LDd(sLxr7Yxx71NJiE8|=3QvmvjdYG|-H`?d@a`J_8%Z3W30$NZ zOy7Yyg5s)~1)l;@U`5p>*^sq3%b+^q3JABd$kh{ofTBu`Xca$(R_+x4)^jen6Y%Rp@^Hn^zekNp(&-uf;Wc-($LhEL?VuI^y;{^F8sy8;UaZ-MoNHv@3Gm z%i+TsIiRuAtKu>zAY(9gm24EM=5OW()p7aiz3QoL0d!l$h^n_zPBWJSE8rTHhy*;! z78#CD%&PAtN1MLhdx5V06z}kh|8C}(f+S$D{h_)+U-Q8_n zS2Y39rRrM#VB|*uoQ=lbJPZf^v>$}i{yYf0a2oWzNq;^X4Flu_K0@=z4@1B2_X8Ns z{JuB$!fJuG3RZcPU51I++1v7*&gAKpZVSRZh@!}vWn3nUDg>(Hs0!Cq;rlYB#kDN< zI0j>o-U{g~cfJVu%musgdyMZ;f++2Bix7*yMDg%-+Lbuyb2IU!r<=Pld#Rs`_H}Eu z45z10_iId9!CtU5@ugQ0tC%lLmqK+>Gq%xJ%4(>WqVu}$b{2G(2^J+H>fqQ3iJjw) z)B_;+?&juFy{RLPbcq|W2Ke)1{?Bz@CE?J>tkdt*^-8USQ~Q1s@qCVvyq}%VH7z_| z)zX2b;p*v#IvLi8BJfVm&50-;@=jftCZR7$98nER7fVp=+Jag~haFtfxjDP!<45z* z5;1(DnW$}_5T?Ah`AL0cZt?}}8lfu`LA=l6%ppDQ>de7bmS@r7UhA`<)IA8Fc7+z* zKJpSRkJ+QGQ5$S6DIaB(D(31MqHFbd#|l+Y9(R2zpq16BJKJk*(h>nRP(JCp)SW)^ zsx(LH(bi-cXblmMz8*zM`|bK?UZ{VI_GtoYse6{|`d2j1QV&h^PW9rh4y&D1HO_u- zP*eo=$3F5VQ5Z#jGzz`xY(Ae3reQD+(O^Cp4@a{pLY^P==aXnM7zO@xGMYo!?+3$C zAJ(LHSO{r#Gn+x@y47ACpz7OPkyvID8{ePdB+}JsIILb+Jlk!mm+f1#n>u)^uLpqL zhOK(G)ucbIdIR=^{s6EAycXFIO{PxN3U{D*C7x|Vj;_UPu6%<0u{tBIBGLmm3FEb{ z5&>uA4yhxxNV8)YhWY7dh9bO86~lD9SuWoHgcf;*C|PG=rL3cxbs`dbE5myq5Kpa%ZjMfk=iX$%}qs@ z0a`6wl?#Bv%*^YH>7(SzFz3bL7y&6s*RkX`s(oIBLJ3JB17(jr@J!W)lRj1^GUknP zpj6~iRuVnxr273Re@&kQUlGE-&7I!*QWW7Id_{yG zQU2D%7g$qKK-Y!Yt9Dmj|8IxOIdAu{%3Zp`jfv>Tt=v`WWS3@KW&HVI+MsayEnMLk z*VLKeiYiXQTt63Et2o-1=`DF4^2O!d;E4Y_a(1$*Q`D|Sp^9q;!`q6Mf>WiI8T}aT zkHDqKIXPd$SpA^N_vF7+ae3ULJtfeOoG#{^GkIInUi;$OEUtu;ImuR1ZqozTG8x)b0p9Vp?~dgE*Zhy0v&(m4y5GGyzkJsN($eQYD4Rcp z_X&XD=IpXm^>Be$u~S8vTE2hYT)h-e#lAKUm9`PZV75SP*UBwwE*kAE=ZbXnmsq_R zfO$q%QhzRL8jB~wjqt7j_)a7l>T9T!6Tw_xnmwrixk6SOo(1dp`&}vki%Ag0lazkN zhbU4EM{8$A`g+d)gbTy9D$3`j^$gJ9YEdI>$F9-v_uM$tUF;(l zLb-D(Z)-!T=42`}?c%Z&F=28^Q&6wc7(M08b*7l>;Zcd#9)TR*QNeQ!G)}dBx78z2 zV+@wxZ+$OIzU$qfRUvz4Xe3vh?w5$qxmi3_0W7pBZQ0gz;kZ5RrV`; zQbf`6p~Z^?L~)~C0acw&Gm?^+EH>9EH;T{lf=N~M^lf~uH`-jur^ikVnH)C_zDouC zZc)QYAE+}{8^GOoYu()ZcX?x}YhFHj2}1>V`^tXp4B%xhWR85ft}B*J$%TEm!|D!001xhN$`8O-mz&u?wqdhGE7&d>{S zx8s&`k20us2OmX8^(P-z9}SK^@;7((S<_EVyiL#R^}W9DP5nV$-)aoeU_SBuNiZ2s zP&5k0)7fY~nU6>F37QY){%kNF%=-QQY~l^a$ea2z=*(EOW@7Q6*d>yd16{4*B-I6P(1PPdr>ah8}r|rw<%je7I%jdzL R{~G`R|NphR!}$Ot1OOKFJN*Cv literal 0 HcmV?d00001 diff --git a/stable/zwavejs2mqtt/10.0.29/helm-values.md b/stable/zwavejs2mqtt/10.0.29/helm-values.md new file mode 100644 index 00000000000..057e0504ea9 --- /dev/null +++ b/stable/zwavejs2mqtt/10.0.29/helm-values.md @@ -0,0 +1,31 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env | object | `{}` | https://zwave-js.github.io/zwavejs2mqtt/#/guide/env-vars | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/zwavejs2mqtt"` | | +| image.tag | string | `"v6.6.2@sha256:868ccbcd90a1b38cfadec87ca933b3bf613ccb08df17d2a26b2baf7e743294bc"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/usr/src/app/store"` | | +| probes.liveness.enabled | bool | `true` | | +| probes.readiness.enabled | bool | `true` | | +| probes.startup.enabled | bool | `false` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| service.main.ports.main.port | int | `8091` | | +| service.main.ports.main.targetPort | int | `8091` | | +| service.ws.enabled | bool | `true` | | +| service.ws.ports.ws.enabled | bool | `true` | | +| service.ws.ports.ws.port | int | `10046` | | +| service.ws.ports.ws.targetPort | int | `3000` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/zwavejs2mqtt/10.0.29/ix_values.yaml b/stable/zwavejs2mqtt/10.0.29/ix_values.yaml new file mode 100644 index 00000000000..99e0de68e00 --- /dev/null +++ b/stable/zwavejs2mqtt/10.0.29/ix_values.yaml @@ -0,0 +1,86 @@ +image: + repository: tccr.io/truecharts/zwavejs2mqtt + pullPolicy: IfNotPresent + tag: v6.10.0@sha256:68a8e133af1910b942ec390898ac70b7aaf149768358e5f406525962833d712c + +securityContext: + readOnlyRootFilesystem: false + +# # See more environment variables in the zwavejs2mqtt documentation +# https://zwave-js.github.io/zwavejs2mqtt/#/guide/env-vars +env: {} + # OZW_NETWORK_KEY: + +probes: + liveness: + enabled: true + # custom: true + # spec: + # failureThreshold: 5 + # httpGet: + # path: /health + # port: http + # httpHeaders: + # - name: Accept + # value: text/plain + # initialDelaySeconds: 30 + # periodSeconds: 10 + # timeoutSeconds: 10 + readiness: + enabled: true + # custom: true + # spec: + # failureThreshold: 5 + # httpGet: + # path: /health + # port: http + # httpHeaders: + # - name: Accept + # value: text/plain + # initialDelaySeconds: 30 + # periodSeconds: 10 + # timeoutSeconds: 10 + startup: + enabled: false + # custom: true + # spec: + # failureThreshold: 5 + # httpGet: + # path: /health + # port: http + # httpHeaders: + # - name: Accept + # value: text/plain + # initialDelaySeconds: 30 + # periodSeconds: 10 + # timeoutSeconds: 10 + +service: + main: + ports: + main: + port: 8091 + targetPort: 8091 + ws: + enabled: true + ports: + ws: + enabled: true + port: 10046 + targetPort: 3000 + +persistence: + config: + enabled: true + mountPath: "/usr/src/app/store" + + +# affinity: +# nodeAffinity: +# requiredDuringSchedulingIgnoredDuringExecution: +# nodeSelectorTerms: +# - matchExpressions: +# - key: app +# operator: In +# values: +# - zwave-controller diff --git a/stable/zwavejs2mqtt/10.0.29/questions.yaml b/stable/zwavejs2mqtt/10.0.29/questions.yaml new file mode 100644 index 00000000000..fd90bd36903 --- /dev/null +++ b/stable/zwavejs2mqtt/10.0.29/questions.yaml @@ -0,0 +1,2532 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 8091 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 8091 + + + - variable: ws + label: "WebSocket Service" + description: "WebSocket Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ws + label: "WebSocket Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10046 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 3000 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: "The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/zwavejs2mqtt/10.0.29/security.md b/stable/zwavejs2mqtt/10.0.29/security.md new file mode 100644 index 00000000000..76087be881d --- /dev/null +++ b/stable/zwavejs2mqtt/10.0.29/security.md @@ -0,0 +1,157 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: zwavejs2mqtt/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-zwavejs2mqtt' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-zwavejs2mqtt' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-zwavejs2mqtt' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-zwavejs2mqtt' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-zwavejs2mqtt' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-zwavejs2mqtt' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/zwavejs2mqtt:v6.10.0@sha256:68a8e133af1910b942ec390898ac70b7aaf149768358e5f406525962833d712c + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/zwavejs2mqtt:v6.10.0@sha256:68a8e133af1910b942ec390898ac70b7aaf149768358e5f406525962833d712c (alpine 3.12.7) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apk-tools | CVE-2021-36159 | CRITICAL | 2.10.6-r0 | 2.10.7-r0 |
Expand...https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch
https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
| +| busybox | CVE-2022-28391 | CRITICAL | 1.31.1-r20 | 1.31.1-r22 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| busybox | CVE-2021-42378 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42378
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42379
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42380
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42381
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42382
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42383
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42384
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42385
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42385
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42386
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42374
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| libcrypto1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/security/cve/CVE-2021-3711
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-3711
https://rustsec.org/advisories/RUSTSEC-2021-0097.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| libcrypto1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1k-r0 | 1.1.1n-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
| +| libssl1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/security/cve/CVE-2021-3711
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-3711
https://rustsec.org/advisories/RUSTSEC-2021-0097.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| libssl1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1k-r0 | 1.1.1n-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
| +| openssl | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.31.1-r20 | 1.31.1-r22 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| ssl_client | CVE-2021-42378 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42378
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42379
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42380
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42381
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42382
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42383
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42384
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42385
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42385
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42386
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.31.1-r20 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42374
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| xz-libs | CVE-2022-1271 | HIGH | 5.2.5-r0 | 5.2.5-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-2191.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + +**node-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| @npmcli/arborist | CVE-2021-39134 | MEDIUM | 2.6.1 | 2.8.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-39134
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-2h3h-q99f-3fhc
https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc
https://nvd.nist.gov/vuln/detail/CVE-2021-39134
https://www.npmjs.com/package/@npmcli/arborist
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| @npmcli/arborist | CVE-2021-39135 | MEDIUM | 2.6.1 | 2.8.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-39135
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-gmw6-94gg-2rc2
https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2
https://nvd.nist.gov/vuln/detail/CVE-2021-39135
https://www.npmjs.com/package/@npmcli/arborist
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| ansi-regex | CVE-2021-3807 | HIGH | 3.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| ansi-regex | CVE-2021-3807 | HIGH | 5.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| bl | CVE-2020-8244 | HIGH | 0.8.2 | 2.2.1, 1.2.3, 4.0.3, 3.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2020-8244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8244
https://github.com/advisories/GHSA-pp7h-53gx-mx7r
https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e
https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190
https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466
https://hackerone.com/reports/966347
https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8244
https://ubuntu.com/security/notices/USN-5098-1
| +| bl | GHSA-wrw9-m778-g6mc | MEDIUM | 0.8.2 | 1.0.1, 0.9.5 |
Expand...https://github.com/advisories/GHSA-wrw9-m778-g6mc
https://github.com/rvagg/bl/pull/22
https://www.npmjs.com/advisories/596
| +| bl | NSWG-ECO-391 | MEDIUM | 0.8.2 | >=1.0.1, >=0.9.5 <1.0.0 |
Expand...https://github.com/rvagg/bl/pull/22
| +| json-schema | CVE-2021-3918 | MEDIUM | 0.2.3 | 0.4.0 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3918
https://github.com/advisories/GHSA-896r-f27r-55mw
https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741
https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a
https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa
https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9
https://linux.oracle.com/cve/CVE-2021-3918.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3918
| +| marked | CVE-2022-21680 | HIGH | 1.2.9 | 4.0.10 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21680
https://github.com/advisories/GHSA-rrrm-qjm4-v8hf
https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0
https://github.com/markedjs/marked/releases/tag/v4.0.10
https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf
https://nvd.nist.gov/vuln/detail/CVE-2022-21680
| +| marked | CVE-2022-21681 | HIGH | 1.2.9 | 4.0.10 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21681
https://github.com/advisories/GHSA-5v2h-r2cx-5xgj
https://github.com/markedjs/marked/commit/8f806573a3f6c6b7a39b8cdb66ab5ebb8d55a5f5
https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj
https://nvd.nist.gov/vuln/detail/CVE-2022-21681
| +| marked | CVE-2021-21306 | MEDIUM | 1.2.9 | 2.0.0 |
Expand...https://access.redhat.com/security/cve/CVE-2021-21306
https://github.com/advisories/GHSA-4r62-v4vq-hr96
https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd
https://github.com/markedjs/marked/issues/1927
https://github.com/markedjs/marked/pull/1864
https://github.com/markedjs/marked/security/advisories/GHSA-4r62-v4vq-hr96
https://nvd.nist.gov/vuln/detail/CVE-2021-21306
https://www.npmjs.com/package/marked
| +| path-parse | CVE-2021-23343 | MEDIUM | 1.0.6 | 1.0.7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json
https://access.redhat.com/security/cve/CVE-2021-23343
https://errata.almalinux.org/8/ALSA-2021-3666.html
https://github.com/advisories/GHSA-hj48-42vr-x3v9
https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7
https://github.com/jbgutierrez/path-parse/issues/8
https://github.com/jbgutierrez/path-parse/pull/10
https://linux.oracle.com/cve/CVE-2021-23343.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-23343
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028
https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067
| +| tar | CVE-2021-32803 | HIGH | 6.1.0 | 6.1.2, 5.0.7, 4.4.15, 3.2.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-32803
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://errata.almalinux.org/8/ALSA-2021-3666.html
https://github.com/advisories/GHSA-r628-mhmh-qjhw
https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20
https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw
https://linux.oracle.com/cve/CVE-2021-32803.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://nvd.nist.gov/vuln/detail/CVE-2021-32803
https://www.npmjs.com/advisories/1771
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-32804 | HIGH | 6.1.0 | 6.1.1, 5.0.6, 4.4.14, 3.2.2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-32804
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://errata.almalinux.org/8/ALSA-2021-3666.html
https://github.com/advisories/GHSA-3jfq-g458-7qm9
https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4
https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9
https://linux.oracle.com/cve/CVE-2021-32804.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://nvd.nist.gov/vuln/detail/CVE-2021-32804
https://www.npmjs.com/advisories/1770
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-37701 | HIGH | 6.1.0 | 6.1.7, 5.0.8, 4.4.16 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37701
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-9r2w-394v-53qc
https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc
https://linux.oracle.com/cve/CVE-2021-37701.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-37701
https://www.debian.org/security/2021/dsa-5008
https://www.npmjs.com/advisories/1779
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-37712 | HIGH | 6.1.0 | 6.1.9, 5.0.10, 4.4.18 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37712
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-qq89-hq3f-393p
https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p
https://linux.oracle.com/cve/CVE-2021-37712.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-37712
https://www.debian.org/security/2021/dsa-5008
https://www.npmjs.com/advisories/1780
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-37713 | HIGH | 6.1.0 | 6.1.9, 5.0.10, 4.4.18 |
Expand...https://access.redhat.com/security/cve/CVE-2021-37713
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-5955-9wpr-37jh
https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh
https://nvd.nist.gov/vuln/detail/CVE-2021-37713
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| diff --git a/stable/zwavejs2mqtt/10.0.29/templates/common.yaml b/stable/zwavejs2mqtt/10.0.29/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/stable/zwavejs2mqtt/10.0.29/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/stable/zwavejs2mqtt/10.0.29/values.yaml b/stable/zwavejs2mqtt/10.0.29/values.yaml new file mode 100644 index 00000000000..e69de29bb2d