From 53a632013191f117f8335664638a93aa420783ba Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Sun, 12 Dec 2021 12:36:44 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- .../{1.1.15 => 1.1.16}/CHANGELOG.md | 18 +- core/prometheus/{1.1.15 => 1.1.16}/CONFIG.md | 0 core/prometheus/{1.1.15 => 1.1.16}/Chart.lock | 2 +- core/prometheus/{1.1.15 => 1.1.16}/Chart.yaml | 2 +- core/prometheus/{1.1.15 => 1.1.16}/README.md | 0 .../{1.1.15 => 1.1.16}/app-readme.md | 0 .../charts/common-8.9.18.tgz | Bin .../charts/kube-state-metrics-2.1.19.tgz | Bin .../charts/node-exporter-2.3.17.tgz | Bin .../crds/crd-alertmanager-config.yaml | 0 .../crds/crd-alertmanager.yaml | 0 .../crds/crd-podmonitor.yaml | 0 .../{1.1.15 => 1.1.16}/crds/crd-probes.yaml | 0 .../crds/crd-prometheus.yaml | 0 .../crds/crd-prometheusrules.yaml | 0 .../crds/crd-servicemonitor.yaml | 0 .../crds/crd-thanosrulers.yaml | 0 .../{1.1.15 => 1.1.16}/helm-values.md | 6 +- .../{1.1.15 => 1.1.16}/ix_values.yaml | 6 +- .../{1.1.15 => 1.1.16}/questions.yaml | 0 .../prometheus/{1.1.15 => 1.1.16}/security.md | 4 +- .../{1.1.15 => 1.1.16}/templates/_helpers.tpl | 0 .../templates/alertmanager/_alertmanager.tpl | 0 .../templates/alertmanager/secrets.yaml | 0 .../alertmanager/serviceaccount.yaml | 0 .../alertmanager/servicemonitor.yaml | 0 .../{1.1.15 => 1.1.16}/templates/common.yaml | 0 .../templates/exporters/core-dns/service.yaml | 0 .../exporters/core-dns/servicemonitor.yaml | 0 .../kube-apiserver/servicemonitor.yaml | 0 .../kube-controller-manager/endpoints.yaml | 0 .../kube-controller-manager/service.yaml | 0 .../servicemonitor.yaml | 0 .../exporters/kube-scheduler/endpoints.yaml | 0 .../exporters/kube-scheduler/service.yaml | 0 .../kube-scheduler/servicemonitor.yaml | 0 .../exporters/kubelet/servicemonitor.yaml | 0 .../templates/operator/_args.tpl | 0 .../templates/operator/configmap.yaml | 0 .../templates/operator/servicemonitor.yaml | 0 .../prometheus/_additionalPrometheusRules.tpl | 0 .../prometheus/_additionalScrapeJobs.tpl | 0 .../templates/prometheus/_prometheus.tpl | 0 .../templates/prometheus/_servicemonitor.tpl | 0 .../templates/prometheus/clusterrole.yaml | 0 .../prometheus/clusterrolebinding.yaml | 0 .../templates/prometheus/serviceaccount.yaml | 0 .../prometheus/{1.1.15 => 1.1.16}/values.yaml | 0 core/traefik/10.0.24/CHANGELOG.md | 99 + .../1.0.30 => core/traefik/10.0.24}/CONFIG.md | 0 .../traefik/10.0.24}/Chart.lock | 2 +- core/traefik/10.0.24/Chart.yaml | 30 + core/traefik/10.0.24/README.md | 39 + core/traefik/10.0.24/app-readme.md | 3 + .../traefik/10.0.24}/charts/common-8.9.18.tgz | Bin core/traefik/10.0.24/crds/ingressroute.yaml | 198 ++ .../traefik/10.0.24/crds/ingressroutetcp.yaml | 160 ++ .../traefik/10.0.24/crds/ingressrouteudp.yaml | 84 + core/traefik/10.0.24/crds/middlewares.yaml | 563 +++++ core/traefik/10.0.24/crds/middlewarestcp.yaml | 59 + .../10.0.24/crds/serverstransports.yaml | 101 + core/traefik/10.0.24/crds/tlsoptions.yaml | 87 + core/traefik/10.0.24/crds/tlsstores.yaml | 64 + .../traefik/10.0.24/crds/traefikservices.yaml | 270 +++ core/traefik/10.0.24/helm-values.md | 48 + core/traefik/10.0.24/ix_values.yaml | 309 +++ core/traefik/10.0.24/questions.yaml | 2010 +++++++++++++++++ core/traefik/10.0.24/security.md | 104 + core/traefik/10.0.24/templates/_args.tpl | 141 ++ core/traefik/10.0.24/templates/_helpers.tpl | 22 + .../10.0.24/templates/_ingressclass.tpl | 24 + .../10.0.24/templates/_ingressroute.tpl | 25 + .../traefik/10.0.24/templates/_portalhook.tpl | 26 + .../traefik/10.0.24/templates/_tlsoptions.tpl | 12 + core/traefik/10.0.24/templates/common.yaml | 24 + .../middlewares/basic-middleware.yaml | 65 + .../templates/middlewares/basicauth.yaml | 34 + .../10.0.24/templates/middlewares/chain.yaml | 21 + .../templates/middlewares/forwardauth.yaml | 30 + .../templates/middlewares/ipwhitelist.yaml | 33 + .../templates/middlewares/ratelimit.yaml | 19 + .../templates/middlewares/redirectScheme.yaml | 19 + .../templates/middlewares/redirectregex.yaml | 20 + .../templates/middlewares/tc-nextcloud.yaml | 25 + .../traefik/10.0.24}/values.yaml | 0 .../mariadb/{1.0.30 => 1.0.31}/CHANGELOG.md | 18 +- .../1.0.30 => mariadb/1.0.31}/CONFIG.md | 0 .../mariadb/{1.0.30 => 1.0.31}/Chart.lock | 2 +- .../mariadb/{1.0.30 => 1.0.31}/Chart.yaml | 2 +- .../mariadb/{1.0.30 => 1.0.31}/README.md | 0 .../mariadb/{1.0.30 => 1.0.31}/app-readme.md | 0 .../charts/common-8.9.17.tgz | Bin .../mariadb/{1.0.30 => 1.0.31}/helm-values.md | 2 +- .../mariadb/{1.0.30 => 1.0.31}/ix_values.yaml | 2 +- .../mariadb/{1.0.30 => 1.0.31}/questions.yaml | 0 .../mariadb/{1.0.30 => 1.0.31}/security.md | 4 +- .../{1.0.30 => 1.0.31}/templates/common.yaml | 0 .../{1.0.30 => 1.0.31}/templates/secret.yaml | 0 .../1.0.30 => mariadb/1.0.31}/values.yaml | 0 .../memcached/{1.0.30 => 1.0.31}/CHANGELOG.md | 18 +- .../6.0.27 => memcached/1.0.31}/CONFIG.md | 0 .../1.0.32 => memcached/1.0.31}/Chart.lock | 2 +- .../memcached/{1.0.30 => 1.0.31}/Chart.yaml | 2 +- .../memcached/{1.0.30 => 1.0.31}/README.md | 0 .../{1.0.30 => 1.0.31}/app-readme.md | 0 .../charts/common-8.9.17.tgz | Bin .../{1.0.30 => 1.0.31}/helm-values.md | 2 +- .../{1.0.30 => 1.0.31}/ix_values.yaml | 2 +- .../{1.0.30 => 1.0.31}/questions.yaml | 0 .../memcached/{1.0.30 => 1.0.31}/security.md | 4 +- .../{1.0.30 => 1.0.31}/templates/common.yaml | 0 .../6.0.27 => memcached/1.0.31}/values.yaml | 0 .../{6.0.27 => 6.0.28}/CHANGELOG.md | 18 +- .../1.0.32 => postgresql/6.0.28}/CONFIG.md | 0 .../1.0.30 => postgresql/6.0.28}/Chart.lock | 2 +- .../postgresql/{6.0.27 => 6.0.28}/Chart.yaml | 2 +- .../postgresql/{6.0.27 => 6.0.28}/README.md | 0 .../{6.0.27 => 6.0.28}/app-readme.md | 0 .../charts/common-8.9.17.tgz | Bin .../{6.0.27 => 6.0.28}/helm-values.md | 2 +- .../{6.0.27 => 6.0.28}/ix_values.yaml | 2 +- .../{6.0.27 => 6.0.28}/questions.yaml | 0 .../postgresql/{6.0.27 => 6.0.28}/security.md | 4 +- .../templates/backup-postgres-config.yaml | 0 .../{6.0.27 => 6.0.28}/templates/common.yaml | 0 .../{6.0.27 => 6.0.28}/templates/secret.yaml | 0 .../upgrade-backup-postgres-hook.yaml | 0 .../1.0.32 => postgresql/6.0.28}/values.yaml | 0 .../redis/{1.0.32 => 1.0.33}/CHANGELOG.md | 18 +- .../redis/1.0.33}/CONFIG.md | 0 .../6.0.27 => redis/1.0.33}/Chart.lock | 2 +- .../redis/{1.0.32 => 1.0.33}/Chart.yaml | 2 +- dependency/redis/{1.0.32 => 1.0.33}/README.md | 0 .../redis/{1.0.32 => 1.0.33}/app-readme.md | 0 .../charts/common-8.9.17.tgz | Bin .../redis/{1.0.32 => 1.0.33}/helm-values.md | 2 +- .../redis/{1.0.32 => 1.0.33}/ix_values.yaml | 2 +- .../redis/{1.0.32 => 1.0.33}/questions.yaml | 0 .../redis/{1.0.32 => 1.0.33}/security.md | 4 +- .../{1.0.32 => 1.0.33}/templates/common.yaml | 0 .../templates/health-configmap.yaml | 0 .../{1.0.32 => 1.0.33}/templates/secret.yaml | 0 .../redis/1.0.33}/values.yaml | 0 .../{4.0.27 => 4.0.28}/CHANGELOG.md | 18 +- .../omada-controller/4.0.28}/CONFIG.md | 0 .../omada-controller/4.0.28}/Chart.lock | 2 +- .../{4.0.27 => 4.0.28}/Chart.yaml | 2 +- .../{4.0.27 => 4.0.28}/README.md | 0 .../{4.0.27 => 4.0.28}/app-readme.md | 0 .../4.0.28}/charts/common-8.9.18.tgz | Bin .../{4.0.27 => 4.0.28}/helm-values.md | 2 +- .../{4.0.27 => 4.0.28}/ix_values.yaml | 2 +- .../{4.0.27 => 4.0.28}/questions.yaml | 0 .../{4.0.27 => 4.0.28}/security.md | 17 +- .../{4.0.27 => 4.0.28}/templates/common.yaml | 0 .../omada-controller/4.0.28}/values.yaml | 0 .../babybuddy/{5.0.15 => 5.0.16}/CHANGELOG.md | 18 +- .../9.0.24 => babybuddy/5.0.16}/CONFIG.md | 0 .../babybuddy/{5.0.15 => 5.0.16}/Chart.lock | 2 +- .../babybuddy/{5.0.15 => 5.0.16}/Chart.yaml | 2 +- stable/babybuddy/{5.0.15 => 5.0.16}/README.md | 0 .../{5.0.15 => 5.0.16}/app-readme.md | 0 .../5.0.16}/charts/common-8.9.18.tgz | Bin .../charts/postgresql-6.0.27.tgz | Bin .../{5.0.15 => 5.0.16}/helm-values.md | 2 +- .../{5.0.15 => 5.0.16}/ix_values.yaml | 2 +- .../{5.0.15 => 5.0.16}/questions.yaml | 0 .../babybuddy/{5.0.15 => 5.0.16}/security.md | 2 +- .../{5.0.15 => 5.0.16}/templates/common.yaml | 0 .../9.0.24 => babybuddy/5.0.16}/values.yaml | 0 .../esphome/{9.0.24 => 9.0.25}/CHANGELOG.md | 18 +- .../4.0.22 => esphome/9.0.25}/CONFIG.md | 0 .../4.0.22 => esphome/9.0.25}/Chart.lock | 2 +- stable/esphome/{9.0.24 => 9.0.25}/Chart.yaml | 4 +- stable/esphome/{9.0.24 => 9.0.25}/README.md | 0 .../esphome/{9.0.24 => 9.0.25}/app-readme.md | 0 .../9.0.25}/charts/common-8.9.18.tgz | Bin .../esphome/{9.0.24 => 9.0.25}/helm-values.md | 2 +- .../esphome/{9.0.24 => 9.0.25}/ix_values.yaml | 2 +- .../esphome/{9.0.24 => 9.0.25}/questions.yaml | 0 stable/esphome/{9.0.24 => 9.0.25}/security.md | 4 +- .../{9.0.24 => 9.0.25}/templates/common.yaml | 0 .../4.0.22 => esphome/9.0.25}/values.yaml | 0 .../{4.0.22 => 4.0.23}/CHANGELOG.md | 18 +- .../2.0.1 => freeradius/4.0.23}/CONFIG.md | 0 .../2.0.1 => freeradius/4.0.23}/Chart.lock | 2 +- .../freeradius/{4.0.22 => 4.0.23}/Chart.yaml | 4 +- .../freeradius/{4.0.22 => 4.0.23}/README.md | 0 .../{4.0.22 => 4.0.23}/app-readme.md | 0 .../4.0.23}/charts/common-8.9.18.tgz | Bin .../{4.0.22 => 4.0.23}/helm-values.md | 2 +- .../{4.0.22 => 4.0.23}/ix_values.yaml | 2 +- .../{4.0.22 => 4.0.23}/questions.yaml | 0 .../freeradius/{4.0.22 => 4.0.23}/security.md | 34 +- .../{4.0.22 => 4.0.23}/templates/common.yaml | 0 .../2.0.1 => freeradius/4.0.23}/values.yaml | 0 stable/grafana/{2.0.1 => 2.0.2}/CHANGELOG.md | 18 +- .../4.0.31 => grafana/2.0.2}/CONFIG.md | 0 stable/grafana/2.0.2/Chart.lock | 6 + stable/grafana/{2.0.1 => 2.0.2}/Chart.yaml | 2 +- stable/grafana/{2.0.1 => 2.0.2}/README.md | 0 stable/grafana/{2.0.1 => 2.0.2}/app-readme.md | 0 .../2.0.2}/charts/common-8.9.18.tgz | Bin .../grafana/{2.0.1 => 2.0.2}/helm-values.md | 2 +- .../grafana/{2.0.1 => 2.0.2}/ix_values.yaml | 2 +- .../grafana/{2.0.1 => 2.0.2}/questions.yaml | 0 stable/grafana/{2.0.1 => 2.0.2}/security.md | 4 +- .../{2.0.1 => 2.0.2}/templates/common.yaml | 0 .../templates/prometheusrules.yaml | 0 .../templates/servicemonitor.yaml | 0 .../4.0.31 => grafana/2.0.2}/values.yaml | 0 stable/home-assistant/12.0.14/CHANGELOG.md | 99 + .../12.0.14}/CONFIG.md | 0 stable/home-assistant/12.0.14/Chart.lock | 9 + stable/home-assistant/12.0.14/Chart.yaml | 34 + stable/home-assistant/12.0.14/README.md | 39 + stable/home-assistant/12.0.14/app-readme.md | 3 + .../12.0.14}/charts/common-8.9.18.tgz | Bin .../12.0.14/charts/postgresql-6.0.27.tgz | Bin 0 -> 72082 bytes stable/home-assistant/12.0.14/helm-values.md | 42 + stable/home-assistant/12.0.14/ix_values.yaml | 79 + stable/home-assistant/12.0.14/questions.yaml | 1863 +++++++++++++++ stable/home-assistant/12.0.14/security.md | 671 ++++++ .../12.0.14/templates/_configmap.tpl | 90 + .../12.0.14/templates/common.yaml | 22 + .../12.0.14/templates/secret.yaml | 15 + .../12.0.14}/values.yaml | 0 stable/littlelink/4.0.31/Chart.lock | 6 - .../{4.0.31 => 4.0.32}/CHANGELOG.md | 18 +- .../4.0.21 => littlelink/4.0.32}/CONFIG.md | 0 stable/littlelink/4.0.32/Chart.lock | 6 + .../littlelink/{4.0.31 => 4.0.32}/Chart.yaml | 2 +- .../littlelink/{4.0.31 => 4.0.32}/README.md | 0 .../{4.0.31 => 4.0.32}/app-readme.md | 0 .../4.0.32}/charts/common-8.9.18.tgz | Bin .../{4.0.31 => 4.0.32}/helm-values.md | 2 +- .../{4.0.31 => 4.0.32}/ix_values.yaml | 2 +- .../{4.0.31 => 4.0.32}/questions.yaml | 0 .../littlelink/{4.0.31 => 4.0.32}/security.md | 4 +- .../templates/_configmap.tpl | 0 .../{4.0.31 => 4.0.32}/templates/common.yaml | 0 .../4.0.21 => littlelink/4.0.32}/values.yaml | 0 stable/ombi/9.0.21/Chart.lock | 6 - stable/ombi/{9.0.21 => 9.0.22}/CHANGELOG.md | 18 +- .../4.0.35 => ombi/9.0.22}/CONFIG.md | 0 stable/ombi/9.0.22/Chart.lock | 6 + stable/ombi/{9.0.21 => 9.0.22}/Chart.yaml | 4 +- stable/ombi/{9.0.21 => 9.0.22}/README.md | 0 stable/ombi/{9.0.21 => 9.0.22}/app-readme.md | 0 .../9.0.22}/charts/common-8.9.18.tgz | Bin stable/ombi/{9.0.21 => 9.0.22}/helm-values.md | 2 +- stable/ombi/{9.0.21 => 9.0.22}/ix_values.yaml | 2 +- stable/ombi/{9.0.21 => 9.0.22}/questions.yaml | 0 stable/ombi/{9.0.21 => 9.0.22}/security.md | 11 +- .../{9.0.21 => 9.0.22}/templates/common.yaml | 0 .../4.0.35 => ombi/9.0.22}/values.yaml | 0 stable/piaware/4.0.21/Chart.lock | 6 - .../piaware/{4.0.21 => 4.0.22}/CHANGELOG.md | 18 +- .../9.0.21 => piaware/4.0.22}/CONFIG.md | 0 stable/piaware/4.0.22/Chart.lock | 6 + stable/piaware/{4.0.21 => 4.0.22}/Chart.yaml | 2 +- stable/piaware/{4.0.21 => 4.0.22}/README.md | 0 .../piaware/{4.0.21 => 4.0.22}/app-readme.md | 0 .../4.0.22}/charts/common-8.9.18.tgz | Bin .../{4.0.21 => 4.0.22}/ci/ct-values.yaml | 0 .../piaware/{4.0.21 => 4.0.22}/helm-values.md | 2 +- .../piaware/{4.0.21 => 4.0.22}/ix_values.yaml | 2 +- .../piaware/{4.0.21 => 4.0.22}/questions.yaml | 0 stable/piaware/{4.0.21 => 4.0.22}/security.md | 4 +- .../{4.0.21 => 4.0.22}/templates/common.yaml | 0 .../9.0.21 => piaware/4.0.22}/values.yaml | 0 stable/prowlarr/4.0.35/Chart.lock | 6 - .../prowlarr/{4.0.35 => 4.0.36}/CHANGELOG.md | 18 +- stable/prowlarr/4.0.36/CONFIG.md | 8 + stable/prowlarr/4.0.36/Chart.lock | 6 + stable/prowlarr/{4.0.35 => 4.0.36}/Chart.yaml | 4 +- stable/prowlarr/{4.0.35 => 4.0.36}/README.md | 0 .../prowlarr/{4.0.35 => 4.0.36}/app-readme.md | 0 .../prowlarr/4.0.36/charts/common-8.9.18.tgz | Bin 0 -> 37896 bytes .../{4.0.35 => 4.0.36}/helm-values.md | 2 +- .../{4.0.35 => 4.0.36}/ix_values.yaml | 2 +- .../{4.0.35 => 4.0.36}/questions.yaml | 0 .../prowlarr/{4.0.35 => 4.0.36}/security.md | 4 +- .../{4.0.35 => 4.0.36}/templates/common.yaml | 0 stable/prowlarr/4.0.36/values.yaml | 0 stable/unifi/9.0.21/Chart.lock | 6 - stable/unifi/{9.0.21 => 9.0.22}/CHANGELOG.md | 18 +- stable/unifi/9.0.22/CONFIG.md | 8 + stable/unifi/9.0.22/Chart.lock | 6 + stable/unifi/{9.0.21 => 9.0.22}/Chart.yaml | 2 +- stable/unifi/{9.0.21 => 9.0.22}/README.md | 0 stable/unifi/{9.0.21 => 9.0.22}/app-readme.md | 0 stable/unifi/9.0.22/charts/common-8.9.18.tgz | Bin 0 -> 37896 bytes .../unifi/{9.0.21 => 9.0.22}/helm-values.md | 2 +- .../unifi/{9.0.21 => 9.0.22}/ix_values.yaml | 2 +- .../unifi/{9.0.21 => 9.0.22}/questions.yaml | 0 stable/unifi/{9.0.21 => 9.0.22}/security.md | 4 +- .../{9.0.21 => 9.0.22}/templates/common.yaml | 0 stable/unifi/9.0.22/values.yaml | 0 299 files changed, 8022 insertions(+), 298 deletions(-) rename core/prometheus/{1.1.15 => 1.1.16}/CHANGELOG.md (92%) rename core/prometheus/{1.1.15 => 1.1.16}/CONFIG.md (100%) rename core/prometheus/{1.1.15 => 1.1.16}/Chart.lock (88%) rename core/prometheus/{1.1.15 => 1.1.16}/Chart.yaml (98%) rename core/prometheus/{1.1.15 => 1.1.16}/README.md (100%) rename core/prometheus/{1.1.15 => 1.1.16}/app-readme.md (100%) rename core/prometheus/{1.1.15 => 1.1.16}/charts/common-8.9.18.tgz (100%) rename core/prometheus/{1.1.15 => 1.1.16}/charts/kube-state-metrics-2.1.19.tgz (100%) rename core/prometheus/{1.1.15 => 1.1.16}/charts/node-exporter-2.3.17.tgz (100%) rename core/prometheus/{1.1.15 => 1.1.16}/crds/crd-alertmanager-config.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/crds/crd-alertmanager.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/crds/crd-podmonitor.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/crds/crd-probes.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/crds/crd-prometheus.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/crds/crd-prometheusrules.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/crds/crd-servicemonitor.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/crds/crd-thanosrulers.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/helm-values.md (98%) rename core/prometheus/{1.1.15 => 1.1.16}/ix_values.yaml (99%) rename core/prometheus/{1.1.15 => 1.1.16}/questions.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/security.md (99%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/_helpers.tpl (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/alertmanager/_alertmanager.tpl (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/alertmanager/secrets.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/alertmanager/serviceaccount.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/alertmanager/servicemonitor.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/common.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/exporters/core-dns/service.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/exporters/core-dns/servicemonitor.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/exporters/kube-apiserver/servicemonitor.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/exporters/kube-controller-manager/endpoints.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/exporters/kube-controller-manager/service.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/exporters/kube-controller-manager/servicemonitor.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/exporters/kube-scheduler/endpoints.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/exporters/kube-scheduler/service.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/exporters/kube-scheduler/servicemonitor.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/exporters/kubelet/servicemonitor.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/operator/_args.tpl (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/operator/configmap.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/operator/servicemonitor.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/prometheus/_additionalPrometheusRules.tpl (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/prometheus/_additionalScrapeJobs.tpl (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/prometheus/_prometheus.tpl (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/prometheus/_servicemonitor.tpl (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/prometheus/clusterrole.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/prometheus/clusterrolebinding.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/templates/prometheus/serviceaccount.yaml (100%) rename core/prometheus/{1.1.15 => 1.1.16}/values.yaml (100%) create mode 100644 core/traefik/10.0.24/CHANGELOG.md rename {dependency/mariadb/1.0.30 => core/traefik/10.0.24}/CONFIG.md (100%) rename {incubator/omada-controller/4.0.27 => core/traefik/10.0.24}/Chart.lock (78%) create mode 100644 core/traefik/10.0.24/Chart.yaml create mode 100644 core/traefik/10.0.24/README.md create mode 100644 core/traefik/10.0.24/app-readme.md rename {incubator/omada-controller/4.0.27 => core/traefik/10.0.24}/charts/common-8.9.18.tgz (100%) create mode 100644 core/traefik/10.0.24/crds/ingressroute.yaml create mode 100644 core/traefik/10.0.24/crds/ingressroutetcp.yaml create mode 100644 core/traefik/10.0.24/crds/ingressrouteudp.yaml create mode 100644 core/traefik/10.0.24/crds/middlewares.yaml create mode 100644 core/traefik/10.0.24/crds/middlewarestcp.yaml create mode 100644 core/traefik/10.0.24/crds/serverstransports.yaml create mode 100644 core/traefik/10.0.24/crds/tlsoptions.yaml create mode 100644 core/traefik/10.0.24/crds/tlsstores.yaml create mode 100644 core/traefik/10.0.24/crds/traefikservices.yaml create mode 100644 core/traefik/10.0.24/helm-values.md create mode 100644 core/traefik/10.0.24/ix_values.yaml create mode 100644 core/traefik/10.0.24/questions.yaml create mode 100644 core/traefik/10.0.24/security.md create mode 100644 core/traefik/10.0.24/templates/_args.tpl create mode 100644 core/traefik/10.0.24/templates/_helpers.tpl create mode 100644 core/traefik/10.0.24/templates/_ingressclass.tpl create mode 100644 core/traefik/10.0.24/templates/_ingressroute.tpl create mode 100644 core/traefik/10.0.24/templates/_portalhook.tpl create mode 100644 core/traefik/10.0.24/templates/_tlsoptions.tpl create mode 100644 core/traefik/10.0.24/templates/common.yaml create mode 100644 core/traefik/10.0.24/templates/middlewares/basic-middleware.yaml create mode 100644 core/traefik/10.0.24/templates/middlewares/basicauth.yaml create mode 100644 core/traefik/10.0.24/templates/middlewares/chain.yaml create mode 100644 core/traefik/10.0.24/templates/middlewares/forwardauth.yaml create mode 100644 core/traefik/10.0.24/templates/middlewares/ipwhitelist.yaml create mode 100644 core/traefik/10.0.24/templates/middlewares/ratelimit.yaml create mode 100644 core/traefik/10.0.24/templates/middlewares/redirectScheme.yaml create mode 100644 core/traefik/10.0.24/templates/middlewares/redirectregex.yaml create mode 100644 core/traefik/10.0.24/templates/middlewares/tc-nextcloud.yaml rename {dependency/mariadb/1.0.30 => core/traefik/10.0.24}/values.yaml (100%) rename dependency/mariadb/{1.0.30 => 1.0.31}/CHANGELOG.md (91%) rename dependency/{memcached/1.0.30 => mariadb/1.0.31}/CONFIG.md (100%) rename dependency/mariadb/{1.0.30 => 1.0.31}/Chart.lock (78%) rename dependency/mariadb/{1.0.30 => 1.0.31}/Chart.yaml (98%) rename dependency/mariadb/{1.0.30 => 1.0.31}/README.md (100%) rename dependency/mariadb/{1.0.30 => 1.0.31}/app-readme.md (100%) rename dependency/mariadb/{1.0.30 => 1.0.31}/charts/common-8.9.17.tgz (100%) rename dependency/mariadb/{1.0.30 => 1.0.31}/helm-values.md (97%) rename dependency/mariadb/{1.0.30 => 1.0.31}/ix_values.yaml (97%) rename dependency/mariadb/{1.0.30 => 1.0.31}/questions.yaml (100%) rename dependency/mariadb/{1.0.30 => 1.0.31}/security.md (99%) rename dependency/mariadb/{1.0.30 => 1.0.31}/templates/common.yaml (100%) rename dependency/mariadb/{1.0.30 => 1.0.31}/templates/secret.yaml (100%) rename dependency/{memcached/1.0.30 => mariadb/1.0.31}/values.yaml (100%) rename dependency/memcached/{1.0.30 => 1.0.31}/CHANGELOG.md (90%) rename dependency/{postgresql/6.0.27 => memcached/1.0.31}/CONFIG.md (100%) rename dependency/{redis/1.0.32 => memcached/1.0.31}/Chart.lock (78%) rename dependency/memcached/{1.0.30 => 1.0.31}/Chart.yaml (97%) rename dependency/memcached/{1.0.30 => 1.0.31}/README.md (100%) rename dependency/memcached/{1.0.30 => 1.0.31}/app-readme.md (100%) rename dependency/memcached/{1.0.30 => 1.0.31}/charts/common-8.9.17.tgz (100%) rename dependency/memcached/{1.0.30 => 1.0.31}/helm-values.md (89%) rename dependency/memcached/{1.0.30 => 1.0.31}/ix_values.yaml (65%) rename dependency/memcached/{1.0.30 => 1.0.31}/questions.yaml (100%) rename dependency/memcached/{1.0.30 => 1.0.31}/security.md (99%) rename dependency/memcached/{1.0.30 => 1.0.31}/templates/common.yaml (100%) rename dependency/{postgresql/6.0.27 => memcached/1.0.31}/values.yaml (100%) rename dependency/postgresql/{6.0.27 => 6.0.28}/CHANGELOG.md (90%) rename dependency/{redis/1.0.32 => postgresql/6.0.28}/CONFIG.md (100%) rename dependency/{memcached/1.0.30 => postgresql/6.0.28}/Chart.lock (78%) rename dependency/postgresql/{6.0.27 => 6.0.28}/Chart.yaml (97%) rename dependency/postgresql/{6.0.27 => 6.0.28}/README.md (100%) rename dependency/postgresql/{6.0.27 => 6.0.28}/app-readme.md (100%) rename dependency/postgresql/{6.0.27 => 6.0.28}/charts/common-8.9.17.tgz (100%) rename dependency/postgresql/{6.0.27 => 6.0.28}/helm-values.md (96%) rename dependency/postgresql/{6.0.27 => 6.0.28}/ix_values.yaml (95%) rename dependency/postgresql/{6.0.27 => 6.0.28}/questions.yaml (100%) rename dependency/postgresql/{6.0.27 => 6.0.28}/security.md (99%) rename dependency/postgresql/{6.0.27 => 6.0.28}/templates/backup-postgres-config.yaml (100%) rename dependency/postgresql/{6.0.27 => 6.0.28}/templates/common.yaml (100%) rename dependency/postgresql/{6.0.27 => 6.0.28}/templates/secret.yaml (100%) rename dependency/postgresql/{6.0.27 => 6.0.28}/templates/upgrade-backup-postgres-hook.yaml (100%) rename dependency/{redis/1.0.32 => postgresql/6.0.28}/values.yaml (100%) rename dependency/redis/{1.0.32 => 1.0.33}/CHANGELOG.md (91%) rename {incubator/omada-controller/4.0.27 => dependency/redis/1.0.33}/CONFIG.md (100%) rename dependency/{postgresql/6.0.27 => redis/1.0.33}/Chart.lock (78%) rename dependency/redis/{1.0.32 => 1.0.33}/Chart.yaml (97%) rename dependency/redis/{1.0.32 => 1.0.33}/README.md (100%) rename dependency/redis/{1.0.32 => 1.0.33}/app-readme.md (100%) rename dependency/redis/{1.0.32 => 1.0.33}/charts/common-8.9.17.tgz (100%) rename dependency/redis/{1.0.32 => 1.0.33}/helm-values.md (97%) rename dependency/redis/{1.0.32 => 1.0.33}/ix_values.yaml (97%) rename dependency/redis/{1.0.32 => 1.0.33}/questions.yaml (100%) rename dependency/redis/{1.0.32 => 1.0.33}/security.md (99%) rename dependency/redis/{1.0.32 => 1.0.33}/templates/common.yaml (100%) rename dependency/redis/{1.0.32 => 1.0.33}/templates/health-configmap.yaml (100%) rename dependency/redis/{1.0.32 => 1.0.33}/templates/secret.yaml (100%) rename {incubator/omada-controller/4.0.27 => dependency/redis/1.0.33}/values.yaml (100%) rename incubator/omada-controller/{4.0.27 => 4.0.28}/CHANGELOG.md (92%) rename {stable/babybuddy/5.0.15 => incubator/omada-controller/4.0.28}/CONFIG.md (100%) rename {stable/esphome/9.0.24 => incubator/omada-controller/4.0.28}/Chart.lock (78%) rename incubator/omada-controller/{4.0.27 => 4.0.28}/Chart.yaml (97%) rename incubator/omada-controller/{4.0.27 => 4.0.28}/README.md (100%) rename incubator/omada-controller/{4.0.27 => 4.0.28}/app-readme.md (100%) rename {stable/babybuddy/5.0.15 => incubator/omada-controller/4.0.28}/charts/common-8.9.18.tgz (100%) rename incubator/omada-controller/{4.0.27 => 4.0.28}/helm-values.md (92%) rename incubator/omada-controller/{4.0.27 => 4.0.28}/ix_values.yaml (95%) rename incubator/omada-controller/{4.0.27 => 4.0.28}/questions.yaml (100%) rename incubator/omada-controller/{4.0.27 => 4.0.28}/security.md (98%) rename incubator/omada-controller/{4.0.27 => 4.0.28}/templates/common.yaml (100%) rename {stable/babybuddy/5.0.15 => incubator/omada-controller/4.0.28}/values.yaml (100%) rename stable/babybuddy/{5.0.15 => 5.0.16}/CHANGELOG.md (92%) rename stable/{esphome/9.0.24 => babybuddy/5.0.16}/CONFIG.md (100%) rename stable/babybuddy/{5.0.15 => 5.0.16}/Chart.lock (84%) rename stable/babybuddy/{5.0.15 => 5.0.16}/Chart.yaml (98%) rename stable/babybuddy/{5.0.15 => 5.0.16}/README.md (100%) rename stable/babybuddy/{5.0.15 => 5.0.16}/app-readme.md (100%) rename stable/{esphome/9.0.24 => babybuddy/5.0.16}/charts/common-8.9.18.tgz (100%) rename stable/babybuddy/{5.0.15 => 5.0.16}/charts/postgresql-6.0.27.tgz (100%) rename stable/babybuddy/{5.0.15 => 5.0.16}/helm-values.md (95%) rename stable/babybuddy/{5.0.15 => 5.0.16}/ix_values.yaml (92%) rename stable/babybuddy/{5.0.15 => 5.0.16}/questions.yaml (100%) rename stable/babybuddy/{5.0.15 => 5.0.16}/security.md (99%) rename stable/babybuddy/{5.0.15 => 5.0.16}/templates/common.yaml (100%) rename stable/{esphome/9.0.24 => babybuddy/5.0.16}/values.yaml (100%) rename stable/esphome/{9.0.24 => 9.0.25}/CHANGELOG.md (92%) rename stable/{freeradius/4.0.22 => esphome/9.0.25}/CONFIG.md (100%) rename stable/{freeradius/4.0.22 => esphome/9.0.25}/Chart.lock (78%) rename stable/esphome/{9.0.24 => 9.0.25}/Chart.yaml (95%) rename stable/esphome/{9.0.24 => 9.0.25}/README.md (100%) rename stable/esphome/{9.0.24 => 9.0.25}/app-readme.md (100%) rename stable/{freeradius/4.0.22 => esphome/9.0.25}/charts/common-8.9.18.tgz (100%) rename stable/esphome/{9.0.24 => 9.0.25}/helm-values.md (90%) rename stable/esphome/{9.0.24 => 9.0.25}/ix_values.yaml (82%) rename stable/esphome/{9.0.24 => 9.0.25}/questions.yaml (100%) rename stable/esphome/{9.0.24 => 9.0.25}/security.md (99%) rename stable/esphome/{9.0.24 => 9.0.25}/templates/common.yaml (100%) rename stable/{freeradius/4.0.22 => esphome/9.0.25}/values.yaml (100%) rename stable/freeradius/{4.0.22 => 4.0.23}/CHANGELOG.md (92%) rename stable/{grafana/2.0.1 => freeradius/4.0.23}/CONFIG.md (100%) rename stable/{grafana/2.0.1 => freeradius/4.0.23}/Chart.lock (78%) rename stable/freeradius/{4.0.22 => 4.0.23}/Chart.yaml (94%) rename stable/freeradius/{4.0.22 => 4.0.23}/README.md (100%) rename stable/freeradius/{4.0.22 => 4.0.23}/app-readme.md (100%) rename stable/{grafana/2.0.1 => freeradius/4.0.23}/charts/common-8.9.18.tgz (100%) rename stable/freeradius/{4.0.22 => 4.0.23}/helm-values.md (94%) rename stable/freeradius/{4.0.22 => 4.0.23}/ix_values.yaml (91%) rename stable/freeradius/{4.0.22 => 4.0.23}/questions.yaml (100%) rename stable/freeradius/{4.0.22 => 4.0.23}/security.md (81%) rename stable/freeradius/{4.0.22 => 4.0.23}/templates/common.yaml (100%) rename stable/{grafana/2.0.1 => freeradius/4.0.23}/values.yaml (100%) rename stable/grafana/{2.0.1 => 2.0.2}/CHANGELOG.md (92%) rename stable/{littlelink/4.0.31 => grafana/2.0.2}/CONFIG.md (100%) create mode 100644 stable/grafana/2.0.2/Chart.lock rename stable/grafana/{2.0.1 => 2.0.2}/Chart.yaml (98%) rename stable/grafana/{2.0.1 => 2.0.2}/README.md (100%) rename stable/grafana/{2.0.1 => 2.0.2}/app-readme.md (100%) rename stable/{littlelink/4.0.31 => grafana/2.0.2}/charts/common-8.9.18.tgz (100%) rename stable/grafana/{2.0.1 => 2.0.2}/helm-values.md (95%) rename stable/grafana/{2.0.1 => 2.0.2}/ix_values.yaml (95%) rename stable/grafana/{2.0.1 => 2.0.2}/questions.yaml (100%) rename stable/grafana/{2.0.1 => 2.0.2}/security.md (99%) rename stable/grafana/{2.0.1 => 2.0.2}/templates/common.yaml (100%) rename stable/grafana/{2.0.1 => 2.0.2}/templates/prometheusrules.yaml (100%) rename stable/grafana/{2.0.1 => 2.0.2}/templates/servicemonitor.yaml (100%) rename stable/{littlelink/4.0.31 => grafana/2.0.2}/values.yaml (100%) create mode 100644 stable/home-assistant/12.0.14/CHANGELOG.md rename stable/{ombi/9.0.21 => home-assistant/12.0.14}/CONFIG.md (100%) create mode 100644 stable/home-assistant/12.0.14/Chart.lock create mode 100644 stable/home-assistant/12.0.14/Chart.yaml create mode 100644 stable/home-assistant/12.0.14/README.md create mode 100644 stable/home-assistant/12.0.14/app-readme.md rename stable/{ombi/9.0.21 => home-assistant/12.0.14}/charts/common-8.9.18.tgz (100%) create mode 100644 stable/home-assistant/12.0.14/charts/postgresql-6.0.27.tgz create mode 100644 stable/home-assistant/12.0.14/helm-values.md create mode 100644 stable/home-assistant/12.0.14/ix_values.yaml create mode 100644 stable/home-assistant/12.0.14/questions.yaml create mode 100644 stable/home-assistant/12.0.14/security.md create mode 100644 stable/home-assistant/12.0.14/templates/_configmap.tpl create mode 100644 stable/home-assistant/12.0.14/templates/common.yaml create mode 100644 stable/home-assistant/12.0.14/templates/secret.yaml rename stable/{ombi/9.0.21 => home-assistant/12.0.14}/values.yaml (100%) delete mode 100644 stable/littlelink/4.0.31/Chart.lock rename stable/littlelink/{4.0.31 => 4.0.32}/CHANGELOG.md (91%) rename stable/{piaware/4.0.21 => littlelink/4.0.32}/CONFIG.md (100%) create mode 100644 stable/littlelink/4.0.32/Chart.lock rename stable/littlelink/{4.0.31 => 4.0.32}/Chart.yaml (97%) rename stable/littlelink/{4.0.31 => 4.0.32}/README.md (100%) rename stable/littlelink/{4.0.31 => 4.0.32}/app-readme.md (100%) rename stable/{piaware/4.0.21 => littlelink/4.0.32}/charts/common-8.9.18.tgz (100%) rename stable/littlelink/{4.0.31 => 4.0.32}/helm-values.md (95%) rename stable/littlelink/{4.0.31 => 4.0.32}/ix_values.yaml (93%) rename stable/littlelink/{4.0.31 => 4.0.32}/questions.yaml (100%) rename stable/littlelink/{4.0.31 => 4.0.32}/security.md (99%) rename stable/littlelink/{4.0.31 => 4.0.32}/templates/_configmap.tpl (100%) rename stable/littlelink/{4.0.31 => 4.0.32}/templates/common.yaml (100%) rename stable/{piaware/4.0.21 => littlelink/4.0.32}/values.yaml (100%) delete mode 100644 stable/ombi/9.0.21/Chart.lock rename stable/ombi/{9.0.21 => 9.0.22}/CHANGELOG.md (92%) rename stable/{prowlarr/4.0.35 => ombi/9.0.22}/CONFIG.md (100%) create mode 100644 stable/ombi/9.0.22/Chart.lock rename stable/ombi/{9.0.21 => 9.0.22}/Chart.yaml (94%) rename stable/ombi/{9.0.21 => 9.0.22}/README.md (100%) rename stable/ombi/{9.0.21 => 9.0.22}/app-readme.md (100%) rename stable/{prowlarr/4.0.35 => ombi/9.0.22}/charts/common-8.9.18.tgz (100%) rename stable/ombi/{9.0.21 => 9.0.22}/helm-values.md (92%) rename stable/ombi/{9.0.21 => 9.0.22}/ix_values.yaml (87%) rename stable/ombi/{9.0.21 => 9.0.22}/questions.yaml (100%) rename stable/ombi/{9.0.21 => 9.0.22}/security.md (93%) rename stable/ombi/{9.0.21 => 9.0.22}/templates/common.yaml (100%) rename stable/{prowlarr/4.0.35 => ombi/9.0.22}/values.yaml (100%) delete mode 100644 stable/piaware/4.0.21/Chart.lock rename stable/piaware/{4.0.21 => 4.0.22}/CHANGELOG.md (91%) rename stable/{unifi/9.0.21 => piaware/4.0.22}/CONFIG.md (100%) create mode 100644 stable/piaware/4.0.22/Chart.lock rename stable/piaware/{4.0.21 => 4.0.22}/Chart.yaml (97%) rename stable/piaware/{4.0.21 => 4.0.22}/README.md (100%) rename stable/piaware/{4.0.21 => 4.0.22}/app-readme.md (100%) rename stable/{unifi/9.0.21 => piaware/4.0.22}/charts/common-8.9.18.tgz (100%) rename stable/piaware/{4.0.21 => 4.0.22}/ci/ct-values.yaml (100%) rename stable/piaware/{4.0.21 => 4.0.22}/helm-values.md (93%) rename stable/piaware/{4.0.21 => 4.0.22}/ix_values.yaml (93%) rename stable/piaware/{4.0.21 => 4.0.22}/questions.yaml (100%) rename stable/piaware/{4.0.21 => 4.0.22}/security.md (99%) rename stable/piaware/{4.0.21 => 4.0.22}/templates/common.yaml (100%) rename stable/{unifi/9.0.21 => piaware/4.0.22}/values.yaml (100%) delete mode 100644 stable/prowlarr/4.0.35/Chart.lock rename stable/prowlarr/{4.0.35 => 4.0.36}/CHANGELOG.md (92%) create mode 100644 stable/prowlarr/4.0.36/CONFIG.md create mode 100644 stable/prowlarr/4.0.36/Chart.lock rename stable/prowlarr/{4.0.35 => 4.0.36}/Chart.yaml (94%) rename stable/prowlarr/{4.0.35 => 4.0.36}/README.md (100%) rename stable/prowlarr/{4.0.35 => 4.0.36}/app-readme.md (100%) create mode 100644 stable/prowlarr/4.0.36/charts/common-8.9.18.tgz rename stable/prowlarr/{4.0.35 => 4.0.36}/helm-values.md (91%) rename stable/prowlarr/{4.0.35 => 4.0.36}/ix_values.yaml (89%) rename stable/prowlarr/{4.0.35 => 4.0.36}/questions.yaml (100%) rename stable/prowlarr/{4.0.35 => 4.0.36}/security.md (99%) rename stable/prowlarr/{4.0.35 => 4.0.36}/templates/common.yaml (100%) create mode 100644 stable/prowlarr/4.0.36/values.yaml delete mode 100644 stable/unifi/9.0.21/Chart.lock rename stable/unifi/{9.0.21 => 9.0.22}/CHANGELOG.md (92%) create mode 100644 stable/unifi/9.0.22/CONFIG.md create mode 100644 stable/unifi/9.0.22/Chart.lock rename stable/unifi/{9.0.21 => 9.0.22}/Chart.yaml (97%) rename stable/unifi/{9.0.21 => 9.0.22}/README.md (100%) rename stable/unifi/{9.0.21 => 9.0.22}/app-readme.md (100%) create mode 100644 stable/unifi/9.0.22/charts/common-8.9.18.tgz rename stable/unifi/{9.0.21 => 9.0.22}/helm-values.md (96%) rename stable/unifi/{9.0.21 => 9.0.22}/ix_values.yaml (92%) rename stable/unifi/{9.0.21 => 9.0.22}/questions.yaml (100%) rename stable/unifi/{9.0.21 => 9.0.22}/security.md (99%) rename stable/unifi/{9.0.21 => 9.0.22}/templates/common.yaml (100%) create mode 100644 stable/unifi/9.0.22/values.yaml diff --git a/core/prometheus/1.1.15/CHANGELOG.md b/core/prometheus/1.1.16/CHANGELOG.md similarity index 92% rename from core/prometheus/1.1.15/CHANGELOG.md rename to core/prometheus/1.1.16/CHANGELOG.md index 19912be3a4c..d3567065a07 100644 --- a/core/prometheus/1.1.15/CHANGELOG.md +++ b/core/prometheus/1.1.16/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [prometheus-1.1.16](https://github.com/truecharts/apps/compare/prometheus-1.1.15...prometheus-1.1.16) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + ### [prometheus-1.1.15](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-2.0.0...prometheus-1.1.15) (2021-12-11) @@ -88,12 +97,3 @@ ### [prometheus-1.1.7](https://github.com/truecharts/apps/compare/prometheus-1.1.6...prometheus-1.1.7) (2021-12-05) - -#### Chore - -* update non-major ([#1466](https://github.com/truecharts/apps/issues/1466)) - - - - -### [prometheus-1.1.6](https://github.com/truecharts/apps/compare/prometheus-1.1.5...prometheus-1.1.6) (2021-12-04) diff --git a/core/prometheus/1.1.15/CONFIG.md b/core/prometheus/1.1.16/CONFIG.md similarity index 100% rename from core/prometheus/1.1.15/CONFIG.md rename to core/prometheus/1.1.16/CONFIG.md diff --git a/core/prometheus/1.1.15/Chart.lock b/core/prometheus/1.1.16/Chart.lock similarity index 88% rename from core/prometheus/1.1.15/Chart.lock rename to core/prometheus/1.1.16/Chart.lock index 74a938ad964..30606a39598 100644 --- a/core/prometheus/1.1.15/Chart.lock +++ b/core/prometheus/1.1.16/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://charts.bitnami.com/bitnami version: 2.1.19 digest: sha256:1fec7158baacd5fe11f11277061889b3defbade918588412fec6de5339d721ec -generated: "2021-12-11T14:12:51.541212052Z" +generated: "2021-12-12T12:31:33.115206719Z" diff --git a/core/prometheus/1.1.15/Chart.yaml b/core/prometheus/1.1.16/Chart.yaml similarity index 98% rename from core/prometheus/1.1.15/Chart.yaml rename to core/prometheus/1.1.16/Chart.yaml index b6d34653a7b..f0b3661ed74 100644 --- a/core/prometheus/1.1.15/Chart.yaml +++ b/core/prometheus/1.1.16/Chart.yaml @@ -28,7 +28,7 @@ sources: - https://github.com/prometheus-community/helm-charts - https://github.com/prometheus-operator/kube-prometheus type: application -version: 1.1.15 +version: 1.1.16 annotations: truecharts.org/catagories: | - metrics diff --git a/core/prometheus/1.1.15/README.md b/core/prometheus/1.1.16/README.md similarity index 100% rename from core/prometheus/1.1.15/README.md rename to core/prometheus/1.1.16/README.md diff --git a/core/prometheus/1.1.15/app-readme.md b/core/prometheus/1.1.16/app-readme.md similarity index 100% rename from core/prometheus/1.1.15/app-readme.md rename to core/prometheus/1.1.16/app-readme.md diff --git a/core/prometheus/1.1.15/charts/common-8.9.18.tgz b/core/prometheus/1.1.16/charts/common-8.9.18.tgz similarity index 100% rename from core/prometheus/1.1.15/charts/common-8.9.18.tgz rename to core/prometheus/1.1.16/charts/common-8.9.18.tgz diff --git a/core/prometheus/1.1.15/charts/kube-state-metrics-2.1.19.tgz b/core/prometheus/1.1.16/charts/kube-state-metrics-2.1.19.tgz similarity index 100% rename from core/prometheus/1.1.15/charts/kube-state-metrics-2.1.19.tgz rename to core/prometheus/1.1.16/charts/kube-state-metrics-2.1.19.tgz diff --git a/core/prometheus/1.1.15/charts/node-exporter-2.3.17.tgz b/core/prometheus/1.1.16/charts/node-exporter-2.3.17.tgz similarity index 100% rename from core/prometheus/1.1.15/charts/node-exporter-2.3.17.tgz rename to core/prometheus/1.1.16/charts/node-exporter-2.3.17.tgz diff --git a/core/prometheus/1.1.15/crds/crd-alertmanager-config.yaml b/core/prometheus/1.1.16/crds/crd-alertmanager-config.yaml similarity index 100% rename from core/prometheus/1.1.15/crds/crd-alertmanager-config.yaml rename to core/prometheus/1.1.16/crds/crd-alertmanager-config.yaml diff --git a/core/prometheus/1.1.15/crds/crd-alertmanager.yaml b/core/prometheus/1.1.16/crds/crd-alertmanager.yaml similarity index 100% rename from core/prometheus/1.1.15/crds/crd-alertmanager.yaml rename to core/prometheus/1.1.16/crds/crd-alertmanager.yaml diff --git a/core/prometheus/1.1.15/crds/crd-podmonitor.yaml b/core/prometheus/1.1.16/crds/crd-podmonitor.yaml similarity index 100% rename from core/prometheus/1.1.15/crds/crd-podmonitor.yaml rename to core/prometheus/1.1.16/crds/crd-podmonitor.yaml diff --git a/core/prometheus/1.1.15/crds/crd-probes.yaml b/core/prometheus/1.1.16/crds/crd-probes.yaml similarity index 100% rename from core/prometheus/1.1.15/crds/crd-probes.yaml rename to core/prometheus/1.1.16/crds/crd-probes.yaml diff --git a/core/prometheus/1.1.15/crds/crd-prometheus.yaml b/core/prometheus/1.1.16/crds/crd-prometheus.yaml similarity index 100% rename from core/prometheus/1.1.15/crds/crd-prometheus.yaml rename to core/prometheus/1.1.16/crds/crd-prometheus.yaml diff --git a/core/prometheus/1.1.15/crds/crd-prometheusrules.yaml b/core/prometheus/1.1.16/crds/crd-prometheusrules.yaml similarity index 100% rename from core/prometheus/1.1.15/crds/crd-prometheusrules.yaml rename to core/prometheus/1.1.16/crds/crd-prometheusrules.yaml diff --git a/core/prometheus/1.1.15/crds/crd-servicemonitor.yaml b/core/prometheus/1.1.16/crds/crd-servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.15/crds/crd-servicemonitor.yaml rename to core/prometheus/1.1.16/crds/crd-servicemonitor.yaml diff --git a/core/prometheus/1.1.15/crds/crd-thanosrulers.yaml b/core/prometheus/1.1.16/crds/crd-thanosrulers.yaml similarity index 100% rename from core/prometheus/1.1.15/crds/crd-thanosrulers.yaml rename to core/prometheus/1.1.16/crds/crd-thanosrulers.yaml diff --git a/core/prometheus/1.1.15/helm-values.md b/core/prometheus/1.1.16/helm-values.md similarity index 98% rename from core/prometheus/1.1.15/helm-values.md rename to core/prometheus/1.1.16/helm-values.md index b864ffb8863..20aece2ac3d 100644 --- a/core/prometheus/1.1.15/helm-values.md +++ b/core/prometheus/1.1.16/helm-values.md @@ -88,7 +88,7 @@ You will, however, be able to use all values referenced in the common chart here | alertmanager.volumeMounts | list | `[]` | | | alertmanager.volumes | list | `[]` | | | alertmanagerImage.repository | string | `"tccr.io/truecharts/alertmanager"` | | -| alertmanagerImage.tag | string | `"v0.23.0@sha256:22a070c099fe1d8595dc9b9a9809a129ce9bfd975065abad2314e334e11b8da6"` | | +| alertmanagerImage.tag | string | `"v0.23.0@sha256:9108e55d3b7e9f4d1a5688d08c99b3fb27fcaaeb301c09b5990f50ec7b57e6ce"` | | | coreDns.enabled | bool | `true` | | | coreDns.namespace | string | `"kube-system"` | | | coreDns.service.enabled | bool | `true` | | @@ -104,7 +104,7 @@ You will, however, be able to use all values referenced in the common chart here | exporters.node-exporter.enabled | bool | `true` | | | global.labels | object | `{}` | | | image.repository | string | `"tccr.io/truecharts/prometheus-operator"` | | -| image.tag | string | `"v0.52.1@sha256:70de2cab41c589ac36ed04ed7de2491ba9ef97c860fa49532ef98538e2da6991"` | | +| image.tag | string | `"v0.52.1@sha256:488e425c9e6601339a2630ea48846df1fbdfac5c483b93da1b9f4fbf2a2b9261"` | | | ingress.alertmanager.enabled | bool | `false` | | | ingress.main.enabled | bool | `false` | | | ingress.thanos.enabled | bool | `false` | | @@ -317,7 +317,7 @@ You will, however, be able to use all values referenced in the common chart here | prometheus.volumes | list | `[]` | | | prometheus.walCompression | bool | `false` | | | prometheusImage.repository | string | `"tccr.io/truecharts/prometheus"` | | -| prometheusImage.tag | string | `"v2.31.1@sha256:14aa0a97170a4c1bbf1c04e19bb77e7222962dd54f8961fb5fe7dba27d813f2d"` | | +| prometheusImage.tag | string | `"v2.31.1@sha256:5982fbaa92bf8825f4b6b917ab2a495b5cd1e02f128cd76c154f8b0ead5a27fb"` | | | rbac | object | `{"enabled":true,"rules":[{"apiGroups":["apiextensions.k8s.io"],"resources":["customresourcedefinitions"],"verbs":["create"]},{"apiGroups":["apiextensions.k8s.io"],"resourceNames":["alertmanagers.monitoring.coreos.com","podmonitors.monitoring.coreos.com","prometheuses.monitoring.coreos.com","prometheusrules.monitoring.coreos.com","servicemonitors.monitoring.coreos.com","thanosrulers.monitoring.coreos.com","probes.monitoring.coreos.com"],"resources":["customresourcedefinitions"],"verbs":["get","update"]},{"apiGroups":["monitoring.coreos.com"],"resources":["alertmanagers","alertmanagers/finalizers","alertmanagerconfigs","prometheuses","prometheuses/finalizers","thanosrulers","thanosrulers/finalizers","servicemonitors","podmonitors","probes","prometheusrules"],"verbs":["*"]},{"apiGroups":["apps"],"resources":["statefulsets"],"verbs":["*"]},{"apiGroups":[""],"resources":["configmaps","secrets"],"verbs":["*"]},{"apiGroups":[""],"resources":["pods"],"verbs":["list","delete"]},{"apiGroups":[""],"resources":["services","services/finalizers","endpoints"],"verbs":["get","create","update","delete"]},{"apiGroups":[""],"resources":["nodes"],"verbs":["list","watch"]},{"apiGroups":[""],"resources":["namespaces"],"verbs":["get","list","watch"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses"],"verbs":["get","list","watch"]}]}` | Whether Role Based Access Control objects like roles and rolebindings should be created | | securityContext.readOnlyRootFilesystem | bool | `false` | | | service.alertmanager.enabled | bool | `true` | | diff --git a/core/prometheus/1.1.15/ix_values.yaml b/core/prometheus/1.1.16/ix_values.yaml similarity index 99% rename from core/prometheus/1.1.15/ix_values.yaml rename to core/prometheus/1.1.16/ix_values.yaml index 54e9986a2e6..063d59b7002 100644 --- a/core/prometheus/1.1.15/ix_values.yaml +++ b/core/prometheus/1.1.16/ix_values.yaml @@ -1,10 +1,10 @@ image: repository: tccr.io/truecharts/prometheus-operator - tag: v0.52.1@sha256:70de2cab41c589ac36ed04ed7de2491ba9ef97c860fa49532ef98538e2da6991 + tag: v0.52.1@sha256:488e425c9e6601339a2630ea48846df1fbdfac5c483b93da1b9f4fbf2a2b9261 prometheusImage: repository: tccr.io/truecharts/prometheus - tag: v2.31.1@sha256:14aa0a97170a4c1bbf1c04e19bb77e7222962dd54f8961fb5fe7dba27d813f2d + tag: v2.31.1@sha256:5982fbaa92bf8825f4b6b917ab2a495b5cd1e02f128cd76c154f8b0ead5a27fb thanosImage: repository: tccr.io/truecharts/thanos @@ -12,7 +12,7 @@ thanosImage: alertmanagerImage: repository: tccr.io/truecharts/alertmanager - tag: v0.23.0@sha256:22a070c099fe1d8595dc9b9a9809a129ce9bfd975065abad2314e334e11b8da6 + tag: v0.23.0@sha256:9108e55d3b7e9f4d1a5688d08c99b3fb27fcaaeb301c09b5990f50ec7b57e6ce global: labels: {} diff --git a/core/prometheus/1.1.15/questions.yaml b/core/prometheus/1.1.16/questions.yaml similarity index 100% rename from core/prometheus/1.1.15/questions.yaml rename to core/prometheus/1.1.16/questions.yaml diff --git a/core/prometheus/1.1.15/security.md b/core/prometheus/1.1.16/security.md similarity index 99% rename from core/prometheus/1.1.15/security.md rename to core/prometheus/1.1.16/security.md index 2d9c2599f99..0cd420463e3 100644 --- a/core/prometheus/1.1.15/security.md +++ b/core/prometheus/1.1.16/security.md @@ -176,7 +176,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/prometheus-operator:v0.52.1@sha256:70de2cab41c589ac36ed04ed7de2491ba9ef97c860fa49532ef98538e2da6991 + tccr.io/truecharts/prometheus-operator:v0.52.1@sha256:488e425c9e6601339a2630ea48846df1fbdfac5c483b93da1b9f4fbf2a2b9261 bitnami/kube-state-metrics:2.3.0-debian-10-r0 bitnami/node-exporter:1.3.1-debian-10-r0 @@ -215,7 +215,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/prometheus-operator:v0.52.1@sha256:70de2cab41c589ac36ed04ed7de2491ba9ef97c860fa49532ef98538e2da6991 (debian 10.11) +#### Container: tccr.io/truecharts/prometheus-operator:v0.52.1@sha256:488e425c9e6601339a2630ea48846df1fbdfac5c483b93da1b9f4fbf2a2b9261 (debian 10.11) **debian** diff --git a/core/prometheus/1.1.15/templates/_helpers.tpl b/core/prometheus/1.1.16/templates/_helpers.tpl similarity index 100% rename from core/prometheus/1.1.15/templates/_helpers.tpl rename to core/prometheus/1.1.16/templates/_helpers.tpl diff --git a/core/prometheus/1.1.15/templates/alertmanager/_alertmanager.tpl b/core/prometheus/1.1.16/templates/alertmanager/_alertmanager.tpl similarity index 100% rename from core/prometheus/1.1.15/templates/alertmanager/_alertmanager.tpl rename to core/prometheus/1.1.16/templates/alertmanager/_alertmanager.tpl diff --git a/core/prometheus/1.1.15/templates/alertmanager/secrets.yaml b/core/prometheus/1.1.16/templates/alertmanager/secrets.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/alertmanager/secrets.yaml rename to core/prometheus/1.1.16/templates/alertmanager/secrets.yaml diff --git a/core/prometheus/1.1.15/templates/alertmanager/serviceaccount.yaml b/core/prometheus/1.1.16/templates/alertmanager/serviceaccount.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/alertmanager/serviceaccount.yaml rename to core/prometheus/1.1.16/templates/alertmanager/serviceaccount.yaml diff --git a/core/prometheus/1.1.15/templates/alertmanager/servicemonitor.yaml b/core/prometheus/1.1.16/templates/alertmanager/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/alertmanager/servicemonitor.yaml rename to core/prometheus/1.1.16/templates/alertmanager/servicemonitor.yaml diff --git a/core/prometheus/1.1.15/templates/common.yaml b/core/prometheus/1.1.16/templates/common.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/common.yaml rename to core/prometheus/1.1.16/templates/common.yaml diff --git a/core/prometheus/1.1.15/templates/exporters/core-dns/service.yaml b/core/prometheus/1.1.16/templates/exporters/core-dns/service.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/exporters/core-dns/service.yaml rename to core/prometheus/1.1.16/templates/exporters/core-dns/service.yaml diff --git a/core/prometheus/1.1.15/templates/exporters/core-dns/servicemonitor.yaml b/core/prometheus/1.1.16/templates/exporters/core-dns/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/exporters/core-dns/servicemonitor.yaml rename to core/prometheus/1.1.16/templates/exporters/core-dns/servicemonitor.yaml diff --git a/core/prometheus/1.1.15/templates/exporters/kube-apiserver/servicemonitor.yaml b/core/prometheus/1.1.16/templates/exporters/kube-apiserver/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/exporters/kube-apiserver/servicemonitor.yaml rename to core/prometheus/1.1.16/templates/exporters/kube-apiserver/servicemonitor.yaml diff --git a/core/prometheus/1.1.15/templates/exporters/kube-controller-manager/endpoints.yaml b/core/prometheus/1.1.16/templates/exporters/kube-controller-manager/endpoints.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/exporters/kube-controller-manager/endpoints.yaml rename to core/prometheus/1.1.16/templates/exporters/kube-controller-manager/endpoints.yaml diff --git a/core/prometheus/1.1.15/templates/exporters/kube-controller-manager/service.yaml b/core/prometheus/1.1.16/templates/exporters/kube-controller-manager/service.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/exporters/kube-controller-manager/service.yaml rename to core/prometheus/1.1.16/templates/exporters/kube-controller-manager/service.yaml diff --git a/core/prometheus/1.1.15/templates/exporters/kube-controller-manager/servicemonitor.yaml b/core/prometheus/1.1.16/templates/exporters/kube-controller-manager/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/exporters/kube-controller-manager/servicemonitor.yaml rename to core/prometheus/1.1.16/templates/exporters/kube-controller-manager/servicemonitor.yaml diff --git a/core/prometheus/1.1.15/templates/exporters/kube-scheduler/endpoints.yaml b/core/prometheus/1.1.16/templates/exporters/kube-scheduler/endpoints.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/exporters/kube-scheduler/endpoints.yaml rename to core/prometheus/1.1.16/templates/exporters/kube-scheduler/endpoints.yaml diff --git a/core/prometheus/1.1.15/templates/exporters/kube-scheduler/service.yaml b/core/prometheus/1.1.16/templates/exporters/kube-scheduler/service.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/exporters/kube-scheduler/service.yaml rename to core/prometheus/1.1.16/templates/exporters/kube-scheduler/service.yaml diff --git a/core/prometheus/1.1.15/templates/exporters/kube-scheduler/servicemonitor.yaml b/core/prometheus/1.1.16/templates/exporters/kube-scheduler/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/exporters/kube-scheduler/servicemonitor.yaml rename to core/prometheus/1.1.16/templates/exporters/kube-scheduler/servicemonitor.yaml diff --git a/core/prometheus/1.1.15/templates/exporters/kubelet/servicemonitor.yaml b/core/prometheus/1.1.16/templates/exporters/kubelet/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/exporters/kubelet/servicemonitor.yaml rename to core/prometheus/1.1.16/templates/exporters/kubelet/servicemonitor.yaml diff --git a/core/prometheus/1.1.15/templates/operator/_args.tpl b/core/prometheus/1.1.16/templates/operator/_args.tpl similarity index 100% rename from core/prometheus/1.1.15/templates/operator/_args.tpl rename to core/prometheus/1.1.16/templates/operator/_args.tpl diff --git a/core/prometheus/1.1.15/templates/operator/configmap.yaml b/core/prometheus/1.1.16/templates/operator/configmap.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/operator/configmap.yaml rename to core/prometheus/1.1.16/templates/operator/configmap.yaml diff --git a/core/prometheus/1.1.15/templates/operator/servicemonitor.yaml b/core/prometheus/1.1.16/templates/operator/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/operator/servicemonitor.yaml rename to core/prometheus/1.1.16/templates/operator/servicemonitor.yaml diff --git a/core/prometheus/1.1.15/templates/prometheus/_additionalPrometheusRules.tpl b/core/prometheus/1.1.16/templates/prometheus/_additionalPrometheusRules.tpl similarity index 100% rename from core/prometheus/1.1.15/templates/prometheus/_additionalPrometheusRules.tpl rename to core/prometheus/1.1.16/templates/prometheus/_additionalPrometheusRules.tpl diff --git a/core/prometheus/1.1.15/templates/prometheus/_additionalScrapeJobs.tpl b/core/prometheus/1.1.16/templates/prometheus/_additionalScrapeJobs.tpl similarity index 100% rename from core/prometheus/1.1.15/templates/prometheus/_additionalScrapeJobs.tpl rename to core/prometheus/1.1.16/templates/prometheus/_additionalScrapeJobs.tpl diff --git a/core/prometheus/1.1.15/templates/prometheus/_prometheus.tpl b/core/prometheus/1.1.16/templates/prometheus/_prometheus.tpl similarity index 100% rename from core/prometheus/1.1.15/templates/prometheus/_prometheus.tpl rename to core/prometheus/1.1.16/templates/prometheus/_prometheus.tpl diff --git a/core/prometheus/1.1.15/templates/prometheus/_servicemonitor.tpl b/core/prometheus/1.1.16/templates/prometheus/_servicemonitor.tpl similarity index 100% rename from core/prometheus/1.1.15/templates/prometheus/_servicemonitor.tpl rename to core/prometheus/1.1.16/templates/prometheus/_servicemonitor.tpl diff --git a/core/prometheus/1.1.15/templates/prometheus/clusterrole.yaml b/core/prometheus/1.1.16/templates/prometheus/clusterrole.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/prometheus/clusterrole.yaml rename to core/prometheus/1.1.16/templates/prometheus/clusterrole.yaml diff --git a/core/prometheus/1.1.15/templates/prometheus/clusterrolebinding.yaml b/core/prometheus/1.1.16/templates/prometheus/clusterrolebinding.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/prometheus/clusterrolebinding.yaml rename to core/prometheus/1.1.16/templates/prometheus/clusterrolebinding.yaml diff --git a/core/prometheus/1.1.15/templates/prometheus/serviceaccount.yaml b/core/prometheus/1.1.16/templates/prometheus/serviceaccount.yaml similarity index 100% rename from core/prometheus/1.1.15/templates/prometheus/serviceaccount.yaml rename to core/prometheus/1.1.16/templates/prometheus/serviceaccount.yaml diff --git a/core/prometheus/1.1.15/values.yaml b/core/prometheus/1.1.16/values.yaml similarity index 100% rename from core/prometheus/1.1.15/values.yaml rename to core/prometheus/1.1.16/values.yaml diff --git a/core/traefik/10.0.24/CHANGELOG.md b/core/traefik/10.0.24/CHANGELOG.md new file mode 100644 index 00000000000..c210610fc26 --- /dev/null +++ b/core/traefik/10.0.24/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [traefik-10.0.24](https://github.com/truecharts/apps/compare/traefik-10.0.23...traefik-10.0.24) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + + +### [traefik-10.0.23](https://github.com/truecharts/apps/compare/traefik-10.0.22...traefik-10.0.23) (2021-12-11) + +#### Chore + +* update general helm non-major helm releases ([#1509](https://github.com/truecharts/apps/issues/1509)) + + + + +### [traefik-10.0.22](https://github.com/truecharts/apps/compare/traefik-10.0.21...traefik-10.0.22) (2021-12-07) + +#### Chore + +* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) + + + + +### traefik-10.0.21 (2021-12-05) + +#### Chore + +* bump apps to generate security page +* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) +* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) +* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) +* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) +* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) +* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) + +#### Fix + +* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) + + + + +### [traefik-10.0.20](https://github.com/truecharts/apps/compare/traefik-10.0.19...traefik-10.0.20) (2021-12-05) + +#### Chore + +* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) + + + + +### [traefik-10.0.19](https://github.com/truecharts/apps/compare/traefik-10.0.18...traefik-10.0.19) (2021-12-04) + +#### Chore + +* bump apps to generate security page + + + + +### [traefik-10.0.18](https://github.com/truecharts/apps/compare/traefik-10.0.17...traefik-10.0.18) (2021-12-04) + +#### Chore + +* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) + + + + +### [traefik-10.0.17](https://github.com/truecharts/apps/compare/traefik-10.0.16...traefik-10.0.17) (2021-12-03) + +#### Chore + +* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) +* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449)) + + + + +### [traefik-10.0.16](https://github.com/truecharts/apps/compare/traefik-10.0.15...traefik-10.0.16) (2021-11-30) + +#### Chore + +* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) + +#### Fix + +* correct some ports mistakes ([#1416](https://github.com/truecharts/apps/issues/1416)) +* move conflicting ports to 10xxx range ([#1415](https://github.com/truecharts/apps/issues/1415)) + + diff --git a/dependency/mariadb/1.0.30/CONFIG.md b/core/traefik/10.0.24/CONFIG.md similarity index 100% rename from dependency/mariadb/1.0.30/CONFIG.md rename to core/traefik/10.0.24/CONFIG.md diff --git a/incubator/omada-controller/4.0.27/Chart.lock b/core/traefik/10.0.24/Chart.lock similarity index 78% rename from incubator/omada-controller/4.0.27/Chart.lock rename to core/traefik/10.0.24/Chart.lock index b5334e1bff0..436894a87bf 100644 --- a/incubator/omada-controller/4.0.27/Chart.lock +++ b/core/traefik/10.0.24/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.18 digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c -generated: "2021-12-11T14:14:27.614459421Z" +generated: "2021-12-12T12:31:25.302061047Z" diff --git a/core/traefik/10.0.24/Chart.yaml b/core/traefik/10.0.24/Chart.yaml new file mode 100644 index 00000000000..ff904e82293 --- /dev/null +++ b/core/traefik/10.0.24/Chart.yaml @@ -0,0 +1,30 @@ +apiVersion: v2 +appVersion: "2.5.5" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.18 +deprecated: false +description: Test App for Traefik +home: https://github.com/truecharts/apps/tree/master/charts/stable/traefik +icon: https://raw.githubusercontent.com/traefik/traefik/v2.3/docs/content/assets/img/traefik.logo.png +keywords: +- traefik +- ingress +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: traefik +sources: +- https://github.com/traefik/traefik +- https://github.com/traefik/traefik-helm-chart +- https://traefik.io/ +type: application +version: 10.0.24 +annotations: + truecharts.org/catagories: | + - network + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/core/traefik/10.0.24/README.md b/core/traefik/10.0.24/README.md new file mode 100644 index 00000000000..ebd162054ca --- /dev/null +++ b/core/traefik/10.0.24/README.md @@ -0,0 +1,39 @@ +# Introduction + +Test App for Traefik + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org | common | 8.9.18 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/core/traefik/10.0.24/app-readme.md b/core/traefik/10.0.24/app-readme.md new file mode 100644 index 00000000000..823c75135e0 --- /dev/null +++ b/core/traefik/10.0.24/app-readme.md @@ -0,0 +1,3 @@ +Test App for Traefik + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/incubator/omada-controller/4.0.27/charts/common-8.9.18.tgz b/core/traefik/10.0.24/charts/common-8.9.18.tgz similarity index 100% rename from incubator/omada-controller/4.0.27/charts/common-8.9.18.tgz rename to core/traefik/10.0.24/charts/common-8.9.18.tgz diff --git a/core/traefik/10.0.24/crds/ingressroute.yaml b/core/traefik/10.0.24/crds/ingressroute.yaml new file mode 100644 index 00000000000..3391ba532a4 --- /dev/null +++ b/core/traefik/10.0.24/crds/ingressroute.yaml @@ -0,0 +1,198 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: ingressroutes.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: IngressRoute + listKind: IngressRouteList + plural: ingressroutes + singular: ingressroute + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: IngressRoute is an Ingress CRD specification. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: IngressRouteSpec is a specification for a IngressRouteSpec + resource. + properties: + entryPoints: + items: + type: string + type: array + routes: + items: + description: Route contains the set of routes. + properties: + kind: + enum: + - Rule + type: string + match: + type: string + middlewares: + items: + description: MiddlewareRef is a ref to the Middleware resources. + properties: + name: + type: string + namespace: + type: string + required: + - name + type: object + type: array + priority: + type: integer + services: + items: + description: Service defines an upstream to proxy traffic. + properties: + kind: + enum: + - Service + - TraefikService + type: string + name: + description: Name is a reference to a Kubernetes Service + object (for a load-balancer of servers), or to a TraefikService + object (service load-balancer, mirroring, etc). The + differentiation between the two is specified in the + Kind field. + type: string + namespace: + type: string + passHostHeader: + type: boolean + port: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + responseForwarding: + description: ResponseForwarding holds configuration for + the forward of the response. + properties: + flushInterval: + type: string + type: object + scheme: + type: string + serversTransport: + type: string + sticky: + description: Sticky holds the sticky configuration. + properties: + cookie: + description: Cookie holds the sticky configuration + based on cookie. + properties: + httpOnly: + type: boolean + name: + type: string + sameSite: + type: string + secure: + type: boolean + type: object + type: object + strategy: + type: string + weight: + description: Weight should only be specified when Name + references a TraefikService object (and to be precise, + one that embeds a Weighted Round Robin). + type: integer + required: + - name + type: object + type: array + required: + - kind + - match + type: object + type: array + tls: + description: "TLS contains the TLS certificates configuration of the + routes. To enable Let's Encrypt, use an empty TLS struct, e.g. in + YAML: \n \t tls: {} # inline format \n \t tls: \t secretName: + # block format" + properties: + certResolver: + type: string + domains: + items: + description: Domain holds a domain name with SANs. + properties: + main: + type: string + sans: + items: + type: string + type: array + type: object + type: array + options: + description: Options is a reference to a TLSOption, that specifies + the parameters of the TLS connection. + properties: + name: + type: string + namespace: + type: string + required: + - name + type: object + secretName: + description: SecretName is the name of the referenced Kubernetes + Secret to specify the certificate details. + type: string + store: + description: Store is a reference to a TLSStore, that specifies + the parameters of the TLS store. + properties: + name: + type: string + namespace: + type: string + required: + - name + type: object + type: object + required: + - routes + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.24/crds/ingressroutetcp.yaml b/core/traefik/10.0.24/crds/ingressroutetcp.yaml new file mode 100644 index 00000000000..67e099b47da --- /dev/null +++ b/core/traefik/10.0.24/crds/ingressroutetcp.yaml @@ -0,0 +1,160 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: ingressroutetcps.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: IngressRouteTCP + listKind: IngressRouteTCPList + plural: ingressroutetcps + singular: ingressroutetcp + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: IngressRouteTCP is an Ingress CRD specification. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: IngressRouteTCPSpec is a specification for a IngressRouteTCPSpec + resource. + properties: + entryPoints: + items: + type: string + type: array + routes: + items: + description: RouteTCP contains the set of routes. + properties: + match: + type: string + middlewares: + description: Middlewares contains references to MiddlewareTCP + resources. + items: + description: ObjectReference is a generic reference to a Traefik + resource. + properties: + name: + type: string + namespace: + type: string + required: + - name + type: object + type: array + services: + items: + description: ServiceTCP defines an upstream to proxy traffic. + properties: + name: + type: string + namespace: + type: string + port: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + proxyProtocol: + description: ProxyProtocol holds the ProxyProtocol configuration. + properties: + version: + type: integer + type: object + terminationDelay: + type: integer + weight: + type: integer + required: + - name + - port + type: object + type: array + required: + - match + type: object + type: array + tls: + description: "TLSTCP contains the TLS certificates configuration of + the routes. To enable Let's Encrypt, use an empty TLS struct, e.g. + in YAML: \n \t tls: {} # inline format \n \t tls: \t secretName: + # block format" + properties: + certResolver: + type: string + domains: + items: + description: Domain holds a domain name with SANs. + properties: + main: + type: string + sans: + items: + type: string + type: array + type: object + type: array + options: + description: Options is a reference to a TLSOption, that specifies + the parameters of the TLS connection. + properties: + name: + type: string + namespace: + type: string + required: + - name + type: object + passthrough: + type: boolean + secretName: + description: SecretName is the name of the referenced Kubernetes + Secret to specify the certificate details. + type: string + store: + description: Store is a reference to a TLSStore, that specifies + the parameters of the TLS store. + properties: + name: + type: string + namespace: + type: string + required: + - name + type: object + type: object + required: + - routes + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.24/crds/ingressrouteudp.yaml b/core/traefik/10.0.24/crds/ingressrouteudp.yaml new file mode 100644 index 00000000000..910acd6c270 --- /dev/null +++ b/core/traefik/10.0.24/crds/ingressrouteudp.yaml @@ -0,0 +1,84 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: ingressrouteudps.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: IngressRouteUDP + listKind: IngressRouteUDPList + plural: ingressrouteudps + singular: ingressrouteudp + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: IngressRouteUDP is an Ingress CRD specification. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: IngressRouteUDPSpec is a specification for a IngressRouteUDPSpec + resource. + properties: + entryPoints: + items: + type: string + type: array + routes: + items: + description: RouteUDP contains the set of routes. + properties: + services: + items: + description: ServiceUDP defines an upstream to proxy traffic. + properties: + name: + type: string + namespace: + type: string + port: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + weight: + type: integer + required: + - name + - port + type: object + type: array + type: object + type: array + required: + - routes + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.24/crds/middlewares.yaml b/core/traefik/10.0.24/crds/middlewares.yaml new file mode 100644 index 00000000000..1770587a327 --- /dev/null +++ b/core/traefik/10.0.24/crds/middlewares.yaml @@ -0,0 +1,563 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: middlewares.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: Middleware + listKind: MiddlewareList + plural: middlewares + singular: middleware + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: Middleware is a specification for a Middleware resource. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: MiddlewareSpec holds the Middleware configuration. + properties: + addPrefix: + description: AddPrefix holds the AddPrefix configuration. + properties: + prefix: + type: string + type: object + basicAuth: + description: BasicAuth holds the HTTP basic authentication configuration. + properties: + headerField: + type: string + realm: + type: string + removeHeader: + type: boolean + secret: + type: string + type: object + buffering: + description: Buffering holds the request/response buffering configuration. + properties: + maxRequestBodyBytes: + format: int64 + type: integer + maxResponseBodyBytes: + format: int64 + type: integer + memRequestBodyBytes: + format: int64 + type: integer + memResponseBodyBytes: + format: int64 + type: integer + retryExpression: + type: string + type: object + chain: + description: Chain holds a chain of middlewares. + properties: + middlewares: + items: + description: MiddlewareRef is a ref to the Middleware resources. + properties: + name: + type: string + namespace: + type: string + required: + - name + type: object + type: array + type: object + circuitBreaker: + description: CircuitBreaker holds the circuit breaker configuration. + properties: + expression: + type: string + type: object + compress: + description: Compress holds the compress configuration. + properties: + excludedContentTypes: + items: + type: string + type: array + type: object + contentType: + description: ContentType middleware - or rather its unique `autoDetect` + option - specifies whether to let the `Content-Type` header, if + it has not been set by the backend, be automatically set to a value + derived from the contents of the response. As a proxy, the default + behavior should be to leave the header alone, regardless of what + the backend did with it. However, the historic default was to always + auto-detect and set the header if it was nil, and it is going to + be kept that way in order to support users currently relying on + it. This middleware exists to enable the correct behavior until + at least the default one can be changed in a future version. + properties: + autoDetect: + type: boolean + type: object + digestAuth: + description: DigestAuth holds the Digest HTTP authentication configuration. + properties: + headerField: + type: string + realm: + type: string + removeHeader: + type: boolean + secret: + type: string + type: object + errors: + description: ErrorPage holds the custom error page configuration. + properties: + query: + type: string + service: + description: Service defines an upstream to proxy traffic. + properties: + kind: + enum: + - Service + - TraefikService + type: string + name: + description: Name is a reference to a Kubernetes Service object + (for a load-balancer of servers), or to a TraefikService + object (service load-balancer, mirroring, etc). The differentiation + between the two is specified in the Kind field. + type: string + namespace: + type: string + passHostHeader: + type: boolean + port: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + responseForwarding: + description: ResponseForwarding holds configuration for the + forward of the response. + properties: + flushInterval: + type: string + type: object + scheme: + type: string + serversTransport: + type: string + sticky: + description: Sticky holds the sticky configuration. + properties: + cookie: + description: Cookie holds the sticky configuration based + on cookie. + properties: + httpOnly: + type: boolean + name: + type: string + sameSite: + type: string + secure: + type: boolean + type: object + type: object + strategy: + type: string + weight: + description: Weight should only be specified when Name references + a TraefikService object (and to be precise, one that embeds + a Weighted Round Robin). + type: integer + required: + - name + type: object + status: + items: + type: string + type: array + type: object + forwardAuth: + description: ForwardAuth holds the http forward authentication configuration. + properties: + address: + type: string + authRequestHeaders: + items: + type: string + type: array + authResponseHeaders: + items: + type: string + type: array + authResponseHeadersRegex: + type: string + tls: + description: ClientTLS holds TLS specific configurations as client. + properties: + caOptional: + type: boolean + caSecret: + type: string + certSecret: + type: string + insecureSkipVerify: + type: boolean + type: object + trustForwardHeader: + type: boolean + type: object + headers: + description: Headers holds the custom header configuration. + properties: + accessControlAllowCredentials: + description: AccessControlAllowCredentials is only valid if true. + false is ignored. + type: boolean + accessControlAllowHeaders: + description: AccessControlAllowHeaders must be used in response + to a preflight request with Access-Control-Request-Headers set. + items: + type: string + type: array + accessControlAllowMethods: + description: AccessControlAllowMethods must be used in response + to a preflight request with Access-Control-Request-Method set. + items: + type: string + type: array + accessControlAllowOriginList: + description: AccessControlAllowOriginList is a list of allowable + origins. Can also be a wildcard origin "*". + items: + type: string + type: array + accessControlAllowOriginListRegex: + description: AccessControlAllowOriginListRegex is a list of allowable + origins written following the Regular Expression syntax (https://golang.org/pkg/regexp/). + items: + type: string + type: array + accessControlExposeHeaders: + description: AccessControlExposeHeaders sets valid headers for + the response. + items: + type: string + type: array + accessControlMaxAge: + description: AccessControlMaxAge sets the time that a preflight + request may be cached. + format: int64 + type: integer + addVaryHeader: + description: AddVaryHeader controls if the Vary header is automatically + added/updated when the AccessControlAllowOriginList is set. + type: boolean + allowedHosts: + items: + type: string + type: array + browserXssFilter: + type: boolean + contentSecurityPolicy: + type: string + contentTypeNosniff: + type: boolean + customBrowserXSSValue: + type: string + customFrameOptionsValue: + type: string + customRequestHeaders: + additionalProperties: + type: string + type: object + customResponseHeaders: + additionalProperties: + type: string + type: object + featurePolicy: + type: string + forceSTSHeader: + type: boolean + frameDeny: + type: boolean + hostsProxyHeaders: + items: + type: string + type: array + isDevelopment: + type: boolean + publicKey: + type: string + referrerPolicy: + type: string + sslForceHost: + description: 'Deprecated: use RedirectRegex instead.' + type: boolean + sslHost: + description: 'Deprecated: use RedirectRegex instead.' + type: string + sslProxyHeaders: + additionalProperties: + type: string + type: object + sslRedirect: + description: 'Deprecated: use EntryPoint redirection or RedirectScheme + instead.' + type: boolean + sslTemporaryRedirect: + description: 'Deprecated: use EntryPoint redirection or RedirectScheme + instead.' + type: boolean + stsIncludeSubdomains: + type: boolean + stsPreload: + type: boolean + stsSeconds: + format: int64 + type: integer + type: object + inFlightReq: + description: InFlightReq limits the number of requests being processed + and served concurrently. + properties: + amount: + format: int64 + type: integer + sourceCriterion: + description: SourceCriterion defines what criterion is used to + group requests as originating from a common source. If none + are set, the default is to use the request's remote address + field. All fields are mutually exclusive. + properties: + ipStrategy: + description: IPStrategy holds the ip strategy configuration. + properties: + depth: + type: integer + excludedIPs: + items: + type: string + type: array + type: object + requestHeaderName: + type: string + requestHost: + type: boolean + type: object + type: object + ipWhiteList: + description: IPWhiteList holds the ip white list configuration. + properties: + ipStrategy: + description: IPStrategy holds the ip strategy configuration. + properties: + depth: + type: integer + excludedIPs: + items: + type: string + type: array + type: object + sourceRange: + items: + type: string + type: array + type: object + passTLSClientCert: + description: PassTLSClientCert holds the TLS client cert headers configuration. + properties: + info: + description: TLSClientCertificateInfo holds the client TLS certificate + info configuration. + properties: + issuer: + description: TLSCLientCertificateDNInfo holds the client TLS + certificate distinguished name info configuration. cf https://tools.ietf.org/html/rfc3739 + properties: + commonName: + type: boolean + country: + type: boolean + domainComponent: + type: boolean + locality: + type: boolean + organization: + type: boolean + province: + type: boolean + serialNumber: + type: boolean + type: object + notAfter: + type: boolean + notBefore: + type: boolean + sans: + type: boolean + serialNumber: + type: boolean + subject: + description: TLSCLientCertificateDNInfo holds the client TLS + certificate distinguished name info configuration. cf https://tools.ietf.org/html/rfc3739 + properties: + commonName: + type: boolean + country: + type: boolean + domainComponent: + type: boolean + locality: + type: boolean + organization: + type: boolean + province: + type: boolean + serialNumber: + type: boolean + type: object + type: object + pem: + type: boolean + type: object + plugin: + additionalProperties: + x-kubernetes-preserve-unknown-fields: true + type: object + rateLimit: + description: RateLimit holds the rate limiting configuration for a + given router. + properties: + average: + format: int64 + type: integer + burst: + format: int64 + type: integer + period: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + sourceCriterion: + description: SourceCriterion defines what criterion is used to + group requests as originating from a common source. If none + are set, the default is to use the request's remote address + field. All fields are mutually exclusive. + properties: + ipStrategy: + description: IPStrategy holds the ip strategy configuration. + properties: + depth: + type: integer + excludedIPs: + items: + type: string + type: array + type: object + requestHeaderName: + type: string + requestHost: + type: boolean + type: object + type: object + redirectRegex: + description: RedirectRegex holds the redirection configuration. + properties: + permanent: + type: boolean + regex: + type: string + replacement: + type: string + type: object + redirectScheme: + description: RedirectScheme holds the scheme redirection configuration. + properties: + permanent: + type: boolean + port: + type: string + scheme: + type: string + type: object + replacePath: + description: ReplacePath holds the ReplacePath configuration. + properties: + path: + type: string + type: object + replacePathRegex: + description: ReplacePathRegex holds the ReplacePathRegex configuration. + properties: + regex: + type: string + replacement: + type: string + type: object + retry: + description: Retry holds the retry configuration. + properties: + attempts: + type: integer + initialInterval: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + type: object + stripPrefix: + description: StripPrefix holds the StripPrefix configuration. + properties: + forceSlash: + type: boolean + prefixes: + items: + type: string + type: array + type: object + stripPrefixRegex: + description: StripPrefixRegex holds the StripPrefixRegex configuration. + properties: + regex: + items: + type: string + type: array + type: object + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.24/crds/middlewarestcp.yaml b/core/traefik/10.0.24/crds/middlewarestcp.yaml new file mode 100644 index 00000000000..f0d1d5640bd --- /dev/null +++ b/core/traefik/10.0.24/crds/middlewarestcp.yaml @@ -0,0 +1,59 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: middlewaretcps.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: MiddlewareTCP + listKind: MiddlewareTCPList + plural: middlewaretcps + singular: middlewaretcp + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: MiddlewareTCP is a specification for a MiddlewareTCP resource. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: MiddlewareTCPSpec holds the MiddlewareTCP configuration. + properties: + ipWhiteList: + description: TCPIPWhiteList holds the TCP ip white list configuration. + properties: + sourceRange: + items: + type: string + type: array + type: object + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.24/crds/serverstransports.yaml b/core/traefik/10.0.24/crds/serverstransports.yaml new file mode 100644 index 00000000000..78241697d1a --- /dev/null +++ b/core/traefik/10.0.24/crds/serverstransports.yaml @@ -0,0 +1,101 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: serverstransports.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: ServersTransport + listKind: ServersTransportList + plural: serverstransports + singular: serverstransport + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: ServersTransport is a specification for a ServersTransport resource. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: ServersTransportSpec options to configure communication between + Traefik and the servers. + properties: + certificatesSecrets: + description: Certificates for mTLS. + items: + type: string + type: array + disableHTTP2: + description: Disable HTTP/2 for connections with backend servers. + type: boolean + forwardingTimeouts: + description: Timeouts for requests forwarded to the backend servers. + properties: + dialTimeout: + anyOf: + - type: integer + - type: string + description: The amount of time to wait until a connection to + a backend server can be established. If zero, no timeout exists. + x-kubernetes-int-or-string: true + idleConnTimeout: + anyOf: + - type: integer + - type: string + description: The maximum period for which an idle HTTP keep-alive + connection will remain open before closing itself. + x-kubernetes-int-or-string: true + responseHeaderTimeout: + anyOf: + - type: integer + - type: string + description: The amount of time to wait for a server's response + headers after fully writing the request (including its body, + if any). If zero, no timeout exists. + x-kubernetes-int-or-string: true + type: object + insecureSkipVerify: + description: Disable SSL certificate verification. + type: boolean + maxIdleConnsPerHost: + description: If non-zero, controls the maximum idle (keep-alive) to + keep per-host. If zero, DefaultMaxIdleConnsPerHost is used. + type: integer + rootCAsSecrets: + description: Add cert file for self-signed certificate. + items: + type: string + type: array + serverName: + description: ServerName used to contact the server. + type: string + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.24/crds/tlsoptions.yaml b/core/traefik/10.0.24/crds/tlsoptions.yaml new file mode 100644 index 00000000000..c901ac2df5e --- /dev/null +++ b/core/traefik/10.0.24/crds/tlsoptions.yaml @@ -0,0 +1,87 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: tlsoptions.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: TLSOption + listKind: TLSOptionList + plural: tlsoptions + singular: tlsoption + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: TLSOption is a specification for a TLSOption resource. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: TLSOptionSpec configures TLS for an entry point. + properties: + cipherSuites: + items: + type: string + type: array + clientAuth: + description: ClientAuth defines the parameters of the client authentication + part of the TLS connection, if any. + properties: + clientAuthType: + description: ClientAuthType defines the client authentication + type to apply. + enum: + - NoClientCert + - RequestClientCert + - VerifyClientCertIfGiven + - RequireAndVerifyClientCert + type: string + secretNames: + description: SecretName is the name of the referenced Kubernetes + Secret to specify the certificate details. + items: + type: string + type: array + type: object + curvePreferences: + items: + type: string + type: array + maxVersion: + type: string + minVersion: + type: string + preferServerCipherSuites: + type: boolean + sniStrict: + type: boolean + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.24/crds/tlsstores.yaml b/core/traefik/10.0.24/crds/tlsstores.yaml new file mode 100644 index 00000000000..7bb6193b026 --- /dev/null +++ b/core/traefik/10.0.24/crds/tlsstores.yaml @@ -0,0 +1,64 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: tlsstores.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: TLSStore + listKind: TLSStoreList + plural: tlsstores + singular: tlsstore + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: TLSStore is a specification for a TLSStore resource. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: TLSStoreSpec configures a TLSStore resource. + properties: + defaultCertificate: + description: DefaultCertificate holds a secret name for the TLSOption + resource. + properties: + secretName: + description: SecretName is the name of the referenced Kubernetes + Secret to specify the certificate details. + type: string + required: + - secretName + type: object + required: + - defaultCertificate + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.24/crds/traefikservices.yaml b/core/traefik/10.0.24/crds/traefikservices.yaml new file mode 100644 index 00000000000..1d98c25d68d --- /dev/null +++ b/core/traefik/10.0.24/crds/traefikservices.yaml @@ -0,0 +1,270 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + "helm.sh/resource-policy": keep + "helm.sh/hook": pre-install,pre-upgrade,pre-rollback + controller-gen.kubebuilder.io/version: v0.4.1 + creationTimestamp: null + name: traefikservices.traefik.containo.us +spec: + group: traefik.containo.us + names: + kind: TraefikService + listKind: TraefikServiceList + plural: traefikservices + singular: traefikservice + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: TraefikService is the specification for a service (that an IngressRoute + refers to) that is usually not a terminal service (i.e. not a pod of servers), + as opposed to a Kubernetes Service. That is to say, it usually refers to + other (children) services, which themselves can be TraefikServices or Services. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: ServiceSpec defines whether a TraefikService is a load-balancer + of services or a mirroring service. + properties: + mirroring: + description: Mirroring defines a mirroring service, which is composed + of a main load-balancer, and a list of mirrors. + properties: + kind: + enum: + - Service + - TraefikService + type: string + maxBodySize: + format: int64 + type: integer + mirrors: + items: + description: MirrorService defines one of the mirrors of a Mirroring + service. + properties: + kind: + enum: + - Service + - TraefikService + type: string + name: + description: Name is a reference to a Kubernetes Service + object (for a load-balancer of servers), or to a TraefikService + object (service load-balancer, mirroring, etc). The differentiation + between the two is specified in the Kind field. + type: string + namespace: + type: string + passHostHeader: + type: boolean + percent: + type: integer + port: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + responseForwarding: + description: ResponseForwarding holds configuration for + the forward of the response. + properties: + flushInterval: + type: string + type: object + scheme: + type: string + serversTransport: + type: string + sticky: + description: Sticky holds the sticky configuration. + properties: + cookie: + description: Cookie holds the sticky configuration based + on cookie. + properties: + httpOnly: + type: boolean + name: + type: string + sameSite: + type: string + secure: + type: boolean + type: object + type: object + strategy: + type: string + weight: + description: Weight should only be specified when Name references + a TraefikService object (and to be precise, one that embeds + a Weighted Round Robin). + type: integer + required: + - name + type: object + type: array + name: + description: Name is a reference to a Kubernetes Service object + (for a load-balancer of servers), or to a TraefikService object + (service load-balancer, mirroring, etc). The differentiation + between the two is specified in the Kind field. + type: string + namespace: + type: string + passHostHeader: + type: boolean + port: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + responseForwarding: + description: ResponseForwarding holds configuration for the forward + of the response. + properties: + flushInterval: + type: string + type: object + scheme: + type: string + serversTransport: + type: string + sticky: + description: Sticky holds the sticky configuration. + properties: + cookie: + description: Cookie holds the sticky configuration based on + cookie. + properties: + httpOnly: + type: boolean + name: + type: string + sameSite: + type: string + secure: + type: boolean + type: object + type: object + strategy: + type: string + weight: + description: Weight should only be specified when Name references + a TraefikService object (and to be precise, one that embeds + a Weighted Round Robin). + type: integer + required: + - name + type: object + weighted: + description: WeightedRoundRobin defines a load-balancer of services. + properties: + services: + items: + description: Service defines an upstream to proxy traffic. + properties: + kind: + enum: + - Service + - TraefikService + type: string + name: + description: Name is a reference to a Kubernetes Service + object (for a load-balancer of servers), or to a TraefikService + object (service load-balancer, mirroring, etc). The differentiation + between the two is specified in the Kind field. + type: string + namespace: + type: string + passHostHeader: + type: boolean + port: + anyOf: + - type: integer + - type: string + x-kubernetes-int-or-string: true + responseForwarding: + description: ResponseForwarding holds configuration for + the forward of the response. + properties: + flushInterval: + type: string + type: object + scheme: + type: string + serversTransport: + type: string + sticky: + description: Sticky holds the sticky configuration. + properties: + cookie: + description: Cookie holds the sticky configuration based + on cookie. + properties: + httpOnly: + type: boolean + name: + type: string + sameSite: + type: string + secure: + type: boolean + type: object + type: object + strategy: + type: string + weight: + description: Weight should only be specified when Name references + a TraefikService object (and to be precise, one that embeds + a Weighted Round Robin). + type: integer + required: + - name + type: object + type: array + sticky: + description: Sticky holds the sticky configuration. + properties: + cookie: + description: Cookie holds the sticky configuration based on + cookie. + properties: + httpOnly: + type: boolean + name: + type: string + sameSite: + type: string + secure: + type: boolean + type: object + type: object + type: object + type: object + required: + - metadata + - spec + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] diff --git a/core/traefik/10.0.24/helm-values.md b/core/traefik/10.0.24/helm-values.md new file mode 100644 index 00000000000..b0900e7e4ee --- /dev/null +++ b/core/traefik/10.0.24/helm-values.md @@ -0,0 +1,48 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| additionalArguments[0] | string | `"--metrics.prometheus"` | | +| additionalArguments[1] | string | `"--ping"` | | +| additionalArguments[2] | string | `"--serverstransport.insecureskipverify=true"` | | +| additionalArguments[3] | string | `"--providers.kubernetesingress.allowexternalnameservices=true"` | | +| globalArguments[0] | string | `"--global.checknewversion"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/traefik"` | | +| image.tag | string | `"v2.5.5@sha256:2c12cf3ee1d67468d4f16bd8a86478458fd97cf72038bdd9d96df4ba32fdb769"` | | +| ingressClass | object | `{"enabled":false,"fallbackApiVersion":"","isDefaultClass":false}` | Use ingressClass. Ignored if Traefik version < 2.3 / kubernetes < 1.18.x | +| ingressRoute | object | `{"dashboard":{"annotations":{},"enabled":true,"labels":{}}}` | Create an IngressRoute for the dashboard | +| logs | object | `{"access":{"enabled":false,"fields":{"general":{"defaultmode":"keep","names":{}},"headers":{"defaultmode":"drop","names":{}}},"filters":{}},"general":{"level":"ERROR"}}` | Logs https://docs.traefik.io/observability/logs/ | +| metrics.prometheus.entryPoint | string | `"metrics"` | | +| middlewares | object | `{"basicAuth":[],"chain":[],"forwardAuth":[],"ipWhiteList":[],"rateLimit":[],"redirectRegex":[],"redirectScheme":[]}` | SCALE Middleware Handlers | +| pilot | object | `{"enabled":false,"token":""}` | Activate Pilot integration | +| portalhook.enabled | bool | `true` | | +| probes.liveness | object | See below | Liveness probe configuration | +| probes.liveness.path | string | "/" | If a HTTP probe is used (default for HTTP/HTTPS services) this path is used | +| probes.liveness.type | string | "TCP" | sets the probe type when not using a custom probe | +| probes.readiness | object | See below | Redainess probe configuration | +| probes.readiness.path | string | "/" | If a HTTP probe is used (default for HTTP/HTTPS services) this path is used | +| probes.readiness.type | string | "TCP" | sets the probe type when not using a custom probe | +| probes.startup | object | See below | Startup probe configuration | +| probes.startup.path | string | "/" | If a HTTP probe is used (default for HTTP/HTTPS services) this path is used | +| probes.startup.type | string | "TCP" | sets the probe type when not using a custom probe | +| providers.kubernetesCRD.enabled | bool | `true` | | +| providers.kubernetesCRD.namespaces | list | `[]` | | +| providers.kubernetesIngress.enabled | bool | `true` | | +| providers.kubernetesIngress.namespaces | list | `[]` | | +| providers.kubernetesIngress.publishedService.enabled | bool | `true` | | +| rbac | object | `{"enabled":true,"rules":[{"apiGroups":[""],"resources":["services","endpoints","secrets"],"verbs":["get","list","watch"]},{"apiGroups":["extensions","networking.k8s.io"],"resources":["ingresses","ingressclasses"],"verbs":["get","list","watch"]},{"apiGroups":["extensions","networking.k8s.io"],"resources":["ingresses/status"],"verbs":["update"]},{"apiGroups":["traefik.containo.us"],"resources":["ingressroutes","ingressroutetcps","ingressrouteudps","middlewares","middlewaretcps","tlsoptions","tlsstores","traefikservices","serverstransports"],"verbs":["get","list","watch"]}]}` | Whether Role Based Access Control objects like roles and rolebindings should be created | +| service | object | `{"main":{"ports":{"main":{"port":9000,"protocol":"HTTP","targetPort":9000}},"type":"LoadBalancer"},"metrics":{"enabled":true,"ports":{"metrics":{"enabled":true,"port":9100,"protocol":"HTTP","targetPort":9100}},"type":"LoadBalancer"},"tcp":{"enabled":true,"ports":{"web":{"enabled":true,"port":9080,"protocol":"HTTP","redirectTo":"websecure"},"websecure":{"enabled":true,"port":9443,"protocol":"HTTPS"}},"type":"LoadBalancer"},"udp":{"enabled":false}}` | Options for the main traefik service, where the entrypoints traffic comes from from. | +| serviceAccount | object | `{"create":true}` | The service account the pods will use to interact with the Kubernetes API | +| tlsOptions | object | `{"default":{"cipherSuites":["TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305","TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","TLS_CHACHA20_POLY1305_SHA256"],"curvePreferences":["CurveP521","CurveP384"],"minVersion":"VersionTLS12","sniStrict":false}}` | TLS Options to be created as TLSOption CRDs https://doc.traefik.io/tccr.io/truecharts/https/tls/#tls-options Example: | + +All Rights Reserved - The TrueCharts Project diff --git a/core/traefik/10.0.24/ix_values.yaml b/core/traefik/10.0.24/ix_values.yaml new file mode 100644 index 00000000000..bce4dd7b848 --- /dev/null +++ b/core/traefik/10.0.24/ix_values.yaml @@ -0,0 +1,309 @@ +image: + repository: tccr.io/truecharts/traefik + # defaults to appVersion + tag: v2.5.5@sha256:2c12cf3ee1d67468d4f16bd8a86478458fd97cf72038bdd9d96df4ba32fdb769 + pullPolicy: IfNotPresent + +# -- Use ingressClass. Ignored if Traefik version < 2.3 / kubernetes < 1.18.x +ingressClass: + # true is not unit-testable yet, pending https://github.com/rancher/helm-unittest/pull/12 + enabled: false + isDefaultClass: false + # Use to force a networking.k8s.io API Version for certain CI/CD applications. E.g. "v1beta1" + fallbackApiVersion: "" + +# -- Activate Pilot integration +pilot: + enabled: false + token: "" + # Toggle Pilot Dashboard + # dashboard: false + +# -- Create an IngressRoute for the dashboard +ingressRoute: + dashboard: + enabled: true + # Additional ingressRoute annotations (e.g. for kubernetes.io/ingress.class) + annotations: {} + # Additional ingressRoute labels (e.g. for filtering IngressRoute by custom labels) + labels: {} + +# +# -- Configure providers +providers: + kubernetesCRD: + enabled: true + namespaces: [] + # - "default" + kubernetesIngress: + enabled: true + # labelSelector: environment=production,method=traefik + namespaces: [] + # - "default" + # IP used for Kubernetes Ingress endpoints + publishedService: + enabled: true + # Published Kubernetes Service to copy status from. Format: namespace/servicename + # By default this Traefik service + # pathOverride: "" + +# -- Logs +# https://docs.traefik.io/observability/logs/ +logs: + # Traefik logs concern everything that happens to Traefik itself (startup, configuration, events, shutdown, and so on). + general: + # By default, the logs use a text format (common), but you can + # also ask for the json format in the format option + # format: json + # By default, the level is set to ERROR. Alternative logging levels are DEBUG, PANIC, FATAL, ERROR, WARN, and INFO. + level: ERROR + access: + # To enable access logs + enabled: false + # By default, logs are written using the Common Log Format (CLF). + # To write logs in JSON, use json in the format option. + # If the given format is unsupported, the default (CLF) is used instead. + # format: json + # To write the logs in an asynchronous fashion, specify a bufferingSize option. + # This option represents the number of log lines Traefik will keep in memory before writing + # them to the selected output. In some cases, this option can greatly help performances. + # bufferingSize: 100 + # Filtering https://docs.traefik.io/observability/access-logs/#filtering + filters: {} + # statuscodes: "200,300-302" + # retryattempts: true + # minduration: 10ms + # Fields + # https://docs.traefik.io/observability/access-logs/#limiting-the-fieldsincluding-headers + fields: + general: + defaultmode: keep + names: {} + # Examples: + # ClientUsername: drop + headers: + defaultmode: drop + names: {} + # Examples: + # User-Agent: redact + # Authorization: drop + # Content-Type: keep + +metrics: + # datadog: + # address: 127.0.0.1:8125 + # influxdb: + # address: localhost:8089 + # protocol: udp + prometheus: + entryPoint: metrics + # statsd: + # address: localhost:8125 + +globalArguments: + - "--global.checknewversion" + +## +# -- Additional arguments to be passed at Traefik's binary +# All available options available on https://docs.traefik.io/reference/static-configuration/cli/ +## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress.ingressclass=traefik-internal,--log.level=DEBUG}"` +additionalArguments: + - "--metrics.prometheus" + - "--ping" + - "--serverstransport.insecureskipverify=true" + - "--providers.kubernetesingress.allowexternalnameservices=true" + +# -- TLS Options to be created as TLSOption CRDs +# https://doc.traefik.io/tccr.io/truecharts/https/tls/#tls-options +# Example: +tlsOptions: + default: + sniStrict: false + minVersion: VersionTLS12 + curvePreferences: + - CurveP521 + - CurveP384 + cipherSuites: + - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 + - TLS_AES_128_GCM_SHA256 + - TLS_AES_256_GCM_SHA384 + - TLS_CHACHA20_POLY1305_SHA256 + +# -- Options for the main traefik service, where the entrypoints traffic comes from +# from. +service: + main: + type: LoadBalancer + ports: + main: + port: 9000 + targetPort: 9000 + protocol: HTTP + tcp: + enabled: true + type: LoadBalancer + ports: + web: + enabled: true + port: 9080 + protocol: HTTP + redirectTo: websecure + websecure: + enabled: true + port: 9443 + protocol: HTTPS +# tcpexample: +# enabled: true +# targetPort: 9443 +# protocol: TCP +# tls: +# enabled: false +# # this is the name of a TLSOption definition +# options: "" +# certResolver: "" +# domains: [] +# # - main: example.com +# # sans: +# # - foo.example.com +# # - bar.example.com + metrics: + enabled: true + type: LoadBalancer + ports: + metrics: + enabled: true + port: 9100 + targetPort: 9100 + protocol: HTTP + udp: + enabled: false + +probes: + # -- Liveness probe configuration + # @default -- See below + liveness: + # -- sets the probe type when not using a custom probe + # @default -- "TCP" + type: HTTP + # -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used + # @default -- "/" + path: "/ping" + + # -- Redainess probe configuration + # @default -- See below + readiness: + # -- sets the probe type when not using a custom probe + # @default -- "TCP" + type: HTTP + # -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used + # @default -- "/" + path: "/ping" + + # -- Startup probe configuration + # @default -- See below + startup: + # -- sets the probe type when not using a custom probe + # @default -- "TCP" + type: HTTP + # -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used + # @default -- "/" + path: "/ping" + +# -- Whether Role Based Access Control objects like roles and rolebindings should be created +rbac: + enabled: true + rules: + - apiGroups: + - "" + resources: + - services + - endpoints + - secrets + verbs: + - get + - list + - watch + - apiGroups: + - extensions + - networking.k8s.io + resources: + - ingresses + - ingressclasses + verbs: + - get + - list + - watch + - apiGroups: + - extensions + - networking.k8s.io + resources: + - ingresses/status + verbs: + - update + - apiGroups: + - traefik.containo.us + resources: + - ingressroutes + - ingressroutetcps + - ingressrouteudps + - middlewares + - middlewaretcps + - tlsoptions + - tlsstores + - traefikservices + - serverstransports + verbs: + - get + - list + - watch + +# -- The service account the pods will use to interact with the Kubernetes API +serviceAccount: + create: true + +# -- SCALE Middleware Handlers +middlewares: + basicAuth: [] + # - name: basicauthexample + # users: + # - username: testuser + # password: testpassword + forwardAuth: [] + # - name: forwardAuthexample + # address: https://auth.example.com/ + # authResponseHeaders: + # - X-Secret + # - X-Auth-User + # authRequestHeaders: + # - "Accept" + # - "X-CustomHeader" + # authResponseHeadersRegex: "^X-" + # trustForwardHeader: true + chain: [] + # - name: chainname + # middlewares: + # - name: compress + redirectScheme: [] + # - name: redirectSchemeName + # scheme: https + # permanent: true + rateLimit: [] + # - name: rateLimitName + # average: 300 + # burst: 200 + redirectRegex: [] + # - name: redirectRegexName + # regex: putregexhere + # replacement: replacementurlhere + # permanent: false + ipWhiteList: [] + # - name: ipWhiteListName + # sourceRange: [] + # ipStrategy: + # depth: 2 + # excludedIPs: [] + +portalhook: + enabled: true diff --git a/core/traefik/10.0.24/questions.yaml b/core/traefik/10.0.24/questions.yaml new file mode 100644 index 00000000000..0a54be1ba6f --- /dev/null +++ b/core/traefik/10.0.24/questions.yaml @@ -0,0 +1,2010 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "http" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" + path: "/dashboard/" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "RollingUpdate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: argItem + label: "Arg" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: pilot + label: "Traefik Pilot" + group: "App Configuration" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: token + label: "token" + schema: + type: string + default: "" + - variable: dashboard + label: "Pilot Dashboard" + schema: + type: boolean + default: false + + - variable: ingressClass + label: "ingressClass" + group: "App Configuration" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: isDefaultClass + label: "isDefaultClass" + schema: + type: boolean + default: false + + - variable: logs + label: "Logs" + group: "App Configuration" + schema: + type: dict + attrs: + - variable: general + label: "General Logs" + schema: + type: dict + attrs: + - variable: level + label: "Log Level" + schema: + type: string + default: "ERROR" + enum: + - value: "INFO" + description: "Info" + - value: "WARN" + description: "Warnings" + - value: "ERROR" + description: "Errors" + - value: "FATAL" + description: "Fatal Errors" + - value: "PANIC" + description: "Panics" + - value: "DEBUG" + description: "Debug" + - variable: access + label: "Access Logs" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enabledFilters + label: "Enable Filters" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: filters + label: "Filters" + schema: + type: dict + attrs: + - variable: statuscodes + label: "Status codes" + schema: + type: string + default: "200,300-302" + - variable: retryattempts + label: "retryattempts" + schema: + type: boolean + default: true + - variable: minduration + label: "minduration" + schema: + type: string + default: "10ms" + - variable: fields + label: "Fields" + schema: + type: dict + attrs: + - variable: general + label: "General" + schema: + type: dict + attrs: + - variable: defaultmode + label: "Default Mode" + schema: + type: string + default: "keep" + enum: + - value: "keep" + description: "Keep" + - value: "drop" + description: "Drop" + - variable: headers + label: "Headers" + schema: + type: dict + attrs: + - variable: defaultmode + label: "Default Mode" + schema: + type: string + default: "drop" + enum: + - value: "keep" + description: "Keep" + - value: "drop" + description: "Drop" + + - variable: middlewares + label: "" + group: "Middlewares" + schema: + type: dict + attrs: + - variable: basicAuth + label: "basicAuth" + schema: + type: list + default: [] + items: + - variable: basicAuthEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + default: "" + - variable: users + label: "Users" + schema: + type: list + default: [] + items: + - variable: usersEntry + label: "" + schema: + type: dict + attrs: + - variable: username + label: "Username" + schema: + type: string + required: true + default: "" + - variable: password + label: "Password" + schema: + type: string + required: true + default: "" + + - variable: forwardAuth + label: "forwardAuth" + schema: + type: list + default: [] + items: + - variable: basicAuthEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + default: "" + - variable: address + label: "Address" + schema: + type: string + required: true + default: "" + - variable: trustForwardHeader + label: "trustForwardHeader" + schema: + type: boolean + default: false + - variable: authResponseHeadersRegex + label: "authResponseHeadersRegex" + schema: + type: string + default: "" + - variable: authResponseHeaders + label: "authResponseHeaders" + schema: + type: list + default: [] + items: + - variable: authResponseHeadersEntry + label: "" + schema: + type: string + default: "" + - variable: authRequestHeaders + label: "authRequestHeaders" + schema: + type: list + default: [] + items: + - variable: authRequestHeadersEntry + label: "" + schema: + type: string + default: "" + - variable: chain + label: "chain" + schema: + type: list + default: [] + items: + - variable: chainEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: middlewares + label: "Middlewares to Chain" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + required: true + default: "" + + - variable: redirectScheme + label: "redirectScheme" + schema: + type: list + default: [] + items: + - variable: redirectSchemeEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: scheme + label: "Scheme" + schema: + type: string + required: true + default: "https" + enum: + - value: "https" + description: "https" + - value: "http" + description: "http" + - variable: permanent + label: "Permanent" + schema: + type: boolean + required: true + default: false + + - variable: rateLimit + label: "rateLimit" + schema: + type: list + default: [] + items: + - variable: rateLimitEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: average + label: "Average" + schema: + type: int + required: true + default: 300 + - variable: burst + label: "Burst" + schema: + type: int + required: true + default: 200 + - variable: redirectRegex + label: "redirectRegex" + schema: + type: list + default: [] + items: + - variable: redirectRegexEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: regex + label: "Regex" + schema: + type: string + required: true + default: "" + - variable: replacement + label: "Replacement" + schema: + type: string + required: true + default: "" + - variable: permanent + label: "Permanent" + schema: + type: boolean + required: true + default: false + + - variable: ipWhiteList + label: "ipWhiteList" + schema: + type: list + default: [] + items: + - variable: ipWhiteListEntry + label: "" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + default: "" + - variable: sourceRange + label: "Source Range" + schema: + type: list + default: [] + items: + - variable: sourceRangeEntry + label: "" + schema: + type: string + required: true + default: "" + - variable: ipStrategy + label: "IP Strategy" + schema: + type: dict + attrs: + - variable: depth + label: "Depth" + schema: + type: int + required: true + - variable: excludedIPs + label: "Excluded IPs" + schema: + type: list + default: [] + items: + - variable: excludedIPsEntry + label: "" + schema: + type: string + required: true + default: "" + + + - variable: service + group: "Networking and Services" + label: "Configure Service Entrypoint" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Entrypoint Configuration" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 9000 + + - variable: port + label: "Entrypoints Port" + schema: + type: int + default: 9000 + editable: true + required: true + - variable: tcp + label: "TCP Service" + description: "The tcp Entrypoint service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: web + label: "web Entrypoint Configuration" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 9080 + - variable: port + label: "Entrypoints Port" + schema: + type: int + default: 9080 + editable: true + required: true + - variable: redirectTo + label: "Redirect to" + schema: + type: string + default: "websecure" + - variable: websecure + label: "websecure Entrypoints Configuration" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTPS" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 9443 + - variable: port + label: "Entrypoints Port" + schema: + type: int + default: 9443 + editable: true + required: true + - variable: tls + label: "websecure Entrypoints Configuration" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enabled" + schema: + type: boolean + default: true + hidden: true + - variable: portsList + label: "Additional TCP Entrypoints" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom Entrypoints" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Entrypoints Name" + schema: + type: string + default: "" + - variable: protocol + label: "Entrypoints Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: tls + label: "websecure Entrypoints Configuration" + schema: + type: dict + attrs: + - variable: enabled + label: "Enabled" + schema: + type: boolean + default: true + - variable: metrics + label: "metrics Service" + description: "The metrics Entrypoint service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: metrics + label: "metrics Entrypoints Configurations" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 9100 + editable: true + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 9100 + + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: true + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/core/traefik/10.0.24/security.md b/core/traefik/10.0.24/security.md new file mode 100644 index 00000000000..3ab59e498a0 --- /dev/null +++ b/core/traefik/10.0.24/security.md @@ -0,0 +1,104 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: traefik/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-traefik' of Deployment 'RELEASE-NAME-traefik' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-traefik' of Deployment 'RELEASE-NAME-traefik' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-traefik' of Deployment 'RELEASE-NAME-traefik' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-traefik' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-traefik' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| + + +| No Misconfigurations found | +|:---------------------------------| + + + + +| No Misconfigurations found | +|:---------------------------------| + + + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/traefik:v2.5.5@sha256:2c12cf3ee1d67468d4f16bd8a86478458fd97cf72038bdd9d96df4ba32fdb769 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/traefik:v2.5.5@sha256:2c12cf3ee1d67468d4f16bd8a86478458fd97cf72038bdd9d96df4ba32fdb769 (alpine 3.14.3) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/core/traefik/10.0.24/templates/_args.tpl b/core/traefik/10.0.24/templates/_args.tpl new file mode 100644 index 00000000000..41e7e44b8fd --- /dev/null +++ b/core/traefik/10.0.24/templates/_args.tpl @@ -0,0 +1,141 @@ +{{/* Define the args */}} +{{- define "traefik.args" -}} +args: + {{/* merge all ports */}} + {{- $ports := dict }} + {{- range $.Values.service }} + {{- range $name, $value := .ports }} + {{- $_ := set $ports $name $value }} + {{- end }} + {{- end }} + {{/* start of actual arguments */}} + {{- with .Values.globalArguments }} + {{- range . }} + - {{ . | quote }} + {{- end }} + {{- end }} + {{- range $name, $config := $ports }} + {{- if $config }} + {{- if or ( eq $config.protocol "HTTP" ) ( eq $config.protocol "HTTPS" ) ( eq $config.protocol "TCP" ) }} + {{- $_ := set $config "protocol" "TCP" }} + {{- end }} + - "--entryPoints.{{$name}}.address=:{{ $config.port }}/{{ default "tcp" $config.protocol | lower }}" + {{- end }} + {{- end }} + - "--api.dashboard=true" + - "--ping=true" + {{- if .Values.metrics }} + {{- if .Values.metrics.datadog }} + - "--metrics.datadog=true" + - "--metrics.datadog.address={{ .Values.metrics.datadog.address }}" + {{- end }} + {{- if .Values.metrics.influxdb }} + - "--metrics.influxdb=true" + - "--metrics.influxdb.address={{ .Values.metrics.influxdb.address }}" + - "--metrics.influxdb.protocol={{ .Values.metrics.influxdb.protocol }}" + {{- end }} + {{- if .Values.metrics.prometheus }} + - "--metrics.prometheus=true" + - "--metrics.prometheus.entrypoint={{ .Values.metrics.prometheus.entryPoint }}" + {{- end }} + {{- if .Values.metrics.statsd }} + - "--metrics.statsd=true" + - "--metrics.statsd.address={{ .Values.metrics.statsd.address }}" + {{- end }} + {{- end }} + {{- if .Values.providers.kubernetesCRD.enabled }} + - "--providers.kubernetescrd" + {{- end }} + {{- if .Values.providers.kubernetesIngress.enabled }} + - "--providers.kubernetesingress" + {{- if and .Values.providers.kubernetesIngress.publishedService.enabled }} + - "--providers.kubernetesingress.ingressendpoint.publishedservice={{ template "providers.kubernetesIngress.publishedServicePath" . }}" + {{- end }} + {{- if .Values.providers.kubernetesIngress.labelSelector }} + - "--providers.kubernetesingress.labelSelector={{ .Values.providers.kubernetesIngress.labelSelector }}" + {{- end }} + {{- end }} + {{- if and .Values.rbac.enabled .Values.rbac.namespaced }} + {{- if .Values.providers.kubernetesCRD.enabled }} + - "--providers.kubernetescrd.namespaces={{ template "providers.kubernetesCRD.namespaces" . }}" + {{- end }} + {{- if .Values.providers.kubernetesIngress.enabled }} + - "--providers.kubernetesingress.namespaces={{ template "providers.kubernetesIngress.namespaces" . }}" + {{- end }} + {{- end }} + {{- range $entrypoint, $config := $ports }} + {{- if $config.redirectTo }} + {{- $toPort := index $ports $config.redirectTo }} + - "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.to=:{{ $toPort.port }}" + - "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.scheme=https" + {{- end }} + {{- if or ( $config.tls ) ( eq $config.protocol "HTTPS" ) }} + {{- if or ( $config.tls.enabled ) ( eq $config.protocol "HTTPS" ) }} + - "--entrypoints.{{ $entrypoint }}.http.tls=true" + {{- if $config.tls.options }} + - "--entrypoints.{{ $entrypoint }}.http.tls.options={{ $config.tls.options }}" + {{- end }} + {{- if $config.tls.certResolver }} + - "--entrypoints.{{ $entrypoint }}.http.tls.certResolver={{ $config.tls.certResolver }}" + {{- end }} + {{- if $config.tls.domains }} + {{- range $index, $domain := $config.tls.domains }} + {{- if $domain.main }} + - "--entrypoints.{{ $entrypoint }}.http.tls.domains[{{ $index }}].main={{ $domain.main }}" + {{- end }} + {{- if $domain.sans }} + - "--entrypoints.{{ $entrypoint }}.http.tls.domains[{{ $index }}].sans={{ join "," $domain.sans }}" + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- with .Values.logs }} + {{- if .general.format }} + - "--log.format={{ .general.format }}" + {{- end }} + {{- if ne .general.level "ERROR" }} + - "--log.level={{ .general.level | upper }}" + {{- end }} + {{- if .access.enabled }} + - "--accesslog=true" + {{- if .access.format }} + - "--accesslog.format={{ .access.format }}" + {{- end }} + {{- if .access.bufferingsize }} + - "--accesslog.bufferingsize={{ .access.bufferingsize }}" + {{- end }} + {{- if .access.filters }} + {{- if .access.filters.statuscodes }} + - "--accesslog.filters.statuscodes={{ .access.filters.statuscodes }}" + {{- end }} + {{- if .access.filters.retryattempts }} + - "--accesslog.filters.retryattempts" + {{- end }} + {{- if .access.filters.minduration }} + - "--accesslog.filters.minduration={{ .access.filters.minduration }}" + {{- end }} + {{- end }} + - "--accesslog.fields.defaultmode={{ .access.fields.general.defaultmode }}" + {{- range $fieldname, $fieldaction := .access.fields.general.names }} + - "--accesslog.fields.names.{{ $fieldname }}={{ $fieldaction }}" + {{- end }} + - "--accesslog.fields.headers.defaultmode={{ .access.fields.headers.defaultmode }}" + {{- range $fieldname, $fieldaction := .access.fields.headers.names }} + - "--accesslog.fields.headers.names.{{ $fieldname }}={{ $fieldaction }}" + {{- end }} + {{- end }} + {{- end }} + {{- if .Values.pilot.enabled }} + - "--pilot.token={{ .Values.pilot.token }}" + {{- end }} + {{- if hasKey .Values.pilot "dashboard" }} + - "--pilot.dashboard={{ .Values.pilot.dashboard }}" + {{- end }} + {{- with .Values.additionalArguments }} + {{- range . }} + - {{ . | quote }} + {{- end }} + {{- end }} +{{- end -}} diff --git a/core/traefik/10.0.24/templates/_helpers.tpl b/core/traefik/10.0.24/templates/_helpers.tpl new file mode 100644 index 00000000000..8c6c4ac96bc --- /dev/null +++ b/core/traefik/10.0.24/templates/_helpers.tpl @@ -0,0 +1,22 @@ +{{/* +Construct the path for the providers.kubernetesingress.ingressendpoint.publishedservice. +By convention this will simply use the / to match the name of the +service generated. +Users can provide an override for an explicit service they want bound via `.Values.providers.kubernetesIngress.publishedService.pathOverride` +*/}} +{{- define "providers.kubernetesIngress.publishedServicePath" -}} +{{- $fullName := include "common.names.fullname" . -}} +{{- $defServiceName := printf "%s/%s-tcp" .Release.Namespace $fullName -}} +{{- $servicePath := default $defServiceName .Values.providers.kubernetesIngress.publishedService.pathOverride }} +{{- print $servicePath | trimSuffix "-" -}} +{{- end -}} + +{{/* +Construct a comma-separated list of whitelisted namespaces +*/}} +{{- define "providers.kubernetesIngress.namespaces" -}} +{{- default .Release.Namespace (join "," .Values.providers.kubernetesIngress.namespaces) }} +{{- end -}} +{{- define "providers.kubernetesCRD.namespaces" -}} +{{- default .Release.Namespace (join "," .Values.providers.kubernetesCRD.namespaces) }} +{{- end -}} diff --git a/core/traefik/10.0.24/templates/_ingressclass.tpl b/core/traefik/10.0.24/templates/_ingressclass.tpl new file mode 100644 index 00000000000..27f8467fc9e --- /dev/null +++ b/core/traefik/10.0.24/templates/_ingressclass.tpl @@ -0,0 +1,24 @@ +{{/* Define the ingressClass */}} +{{- define "traefik.ingressClass" -}} +{{- if .Values.ingressClass.enabled }} + {{- if .Capabilities.APIVersions.Has "networking.k8s.io/v1/IngressClass" }} +apiVersion: networking.k8s.io/v1 + {{- else if .Capabilities.APIVersions.Has "networking.k8s.io/v1beta1/IngressClass" }} +apiVersion: networking.k8s.io/v1beta1 + {{- else if or (eq .Values.ingressClass.fallbackApiVersion "v1beta1") (eq .Values.ingressClass.fallbackApiVersion "v1") }} +apiVersion: {{ printf "networking.k8s.io/%s" .Values.ingressClass.fallbackApiVersion }} + {{- else }} + {{- fail "\n\n ERROR: You must have at least networking.k8s.io/v1beta1 to use ingressClass" }} + {{- end }} +--- +kind: IngressClass +metadata: + annotations: + ingressclass.kubernetes.io/is-default-class: {{ .Values.ingressClass.isDefaultClass | quote }} + labels: + {{- include "common.labels" . | nindent 4 }} + name: {{ .Release.Name }} +spec: + controller: traefik.io/ingress-controller +{{- end }} +{{- end }} diff --git a/core/traefik/10.0.24/templates/_ingressroute.tpl b/core/traefik/10.0.24/templates/_ingressroute.tpl new file mode 100644 index 00000000000..f848bc108fc --- /dev/null +++ b/core/traefik/10.0.24/templates/_ingressroute.tpl @@ -0,0 +1,25 @@ +{{/* Define the ingressRoute */}} +{{- define "traefik.ingressRoute" -}} +{{- if .Values.ingressRoute.dashboard.enabled }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: IngressRoute +metadata: + name: {{ include "common.names.fullname" . }}-dashboard + annotations: + {{- with .Values.ingressRoute.dashboard.annotations }} + {{- toYaml . | nindent 4 }} + {{- end }} + labels: + {{- include "common.labels" . | nindent 4 }} +spec: + entryPoints: + - main + routes: + - match: PathPrefix(`/dashboard`) || PathPrefix(`/api`) + kind: Rule + services: + - name: api@internal + kind: TraefikService +{{- end -}} +{{- end -}} diff --git a/core/traefik/10.0.24/templates/_portalhook.tpl b/core/traefik/10.0.24/templates/_portalhook.tpl new file mode 100644 index 00000000000..e3586c5d4e9 --- /dev/null +++ b/core/traefik/10.0.24/templates/_portalhook.tpl @@ -0,0 +1,26 @@ +{{/* Define the portalHook */}} +{{- define "traefik.portalhook" -}} +{{- if .Values.portalhook.enabled }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +--- + +apiVersion: v1 +kind: ConfigMap +metadata: + name: portalhook + namespace: {{ $namespace }} +data: + {{- $ports := dict }} + {{- range $.Values.service }} + {{- range $name, $value := .ports }} + {{- $_ := set $ports $name $value }} + {{- end }} + {{- end }} + {{- range $name, $value := $ports }} + {{ $name }}: {{ $value.port | quote }} + {{- end }} +{{- end }} +{{- end -}} diff --git a/core/traefik/10.0.24/templates/_tlsoptions.tpl b/core/traefik/10.0.24/templates/_tlsoptions.tpl new file mode 100644 index 00000000000..3e5aad3bee9 --- /dev/null +++ b/core/traefik/10.0.24/templates/_tlsoptions.tpl @@ -0,0 +1,12 @@ +{{/* Define the tlsOptions */}} +{{- define "traefik.tlsOptions" -}} +{{- range $name, $config := .Values.tlsOptions }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: TLSOption +metadata: + name: {{ $name }} +spec: + {{- toYaml $config | nindent 2 }} +{{- end }} +{{- end -}} diff --git a/core/traefik/10.0.24/templates/common.yaml b/core/traefik/10.0.24/templates/common.yaml new file mode 100644 index 00000000000..72c57659973 --- /dev/null +++ b/core/traefik/10.0.24/templates/common.yaml @@ -0,0 +1,24 @@ +{{/* Make sure all variables are set properly */}} +{{- include "common.setup" . }} + +{{- if .Values.metrics }} +{{- if .Values.metrics.prometheus }} +{{- $_ := set .Values.podAnnotations "prometheus.io/scrape" "true" -}} +{{- $_ := set .Values.podAnnotations "prometheus.io/path" "/metrics" -}} +{{- $_ := set .Values.podAnnotations "prometheus.io/scrape" "9100" -}} +{{- end }} +{{- end }} + +{{- $newArgs := (include "traefik.args" . | fromYaml) }} +{{- $_ := set .Values "newArgs" $newArgs -}} +{{- $mergedargs := concat .Values.args .Values.newArgs.args }} +{{- $_ := set .Values "args" $mergedargs -}} + +{{- include "traefik.portalhook" . }} +{{- include "traefik.tlsOptions" . }} +{{- include "traefik.ingressRoute" . }} +{{- include "traefik.ingressClass" . }} + + +{{/* Render the templates */}} +{{ include "common.postSetup" . }} diff --git a/core/traefik/10.0.24/templates/middlewares/basic-middleware.yaml b/core/traefik/10.0.24/templates/middlewares/basic-middleware.yaml new file mode 100644 index 00000000000..fca94384953 --- /dev/null +++ b/core/traefik/10.0.24/templates/middlewares/basic-middleware.yaml @@ -0,0 +1,65 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: compress + namespace: {{ $namespace }} +spec: + compress: {} +--- +# Here, an average of 300 requests per second is allowed. +# In addition, a burst of 200 requests is allowed. +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: basic-ratelimit + namespace: {{ $namespace }} +spec: + rateLimit: + average: 300 + burst: 200 +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: basic-secure-headers + namespace: {{ $namespace }} +spec: + headers: + accessControlAllowMethods: + - GET + - OPTIONS + - HEAD + - PUT + accessControlMaxAge: 100 + sslRedirect: true + stsSeconds: 63072000 + # stsIncludeSubdomains: false + # stsPreload: false + forceSTSHeader: true + contentTypeNosniff: true + browserXssFilter: true + sslForceHost: true + referrerPolicy: same-origin + customRequestHeaders: + X-Forwarded-Proto: "https" + customResponseHeaders: + X-Robots-Tag: 'none' + server: '' +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: chain-basic + namespace: {{ $namespace }} +spec: + chain: + middlewares: + - name: basic-ratelimit + - name: basic-secure-headers + - name: compress diff --git a/core/traefik/10.0.24/templates/middlewares/basicauth.yaml b/core/traefik/10.0.24/templates/middlewares/basicauth.yaml new file mode 100644 index 00000000000..ccb541742f0 --- /dev/null +++ b/core/traefik/10.0.24/templates/middlewares/basicauth.yaml @@ -0,0 +1,34 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.basicAuth }} +--- +{{- $users := list }} +{{ range $index, $userdata := $middlewareData.users }} + {{ $users = append $users ( htpasswd $userdata.username $userdata.password ) }} +{{ end }} + +apiVersion: v1 +kind: Secret +metadata: + name: {{printf "%v-%v" $middlewareData.name "secret" }} + namespace: {{ $namespace }} +type: Opaque +stringData: + users: | + {{- range $index, $user := $users }} + {{ printf "%s" $user }} + {{- end }} +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + basicAuth: + secret: {{printf "%v-%v" $middlewareData.name "secret" }} +{{ end }} diff --git a/core/traefik/10.0.24/templates/middlewares/chain.yaml b/core/traefik/10.0.24/templates/middlewares/chain.yaml new file mode 100644 index 00000000000..e22eb312207 --- /dev/null +++ b/core/traefik/10.0.24/templates/middlewares/chain.yaml @@ -0,0 +1,21 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.chain }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + chain: + middlewares: + {{ range $index, $chainData := . }} + - name: {{ printf "%v-%v@%v" $namespace $chainData.name "kubernetescrd" }} + {{ end }} +{{ end }} diff --git a/core/traefik/10.0.24/templates/middlewares/forwardauth.yaml b/core/traefik/10.0.24/templates/middlewares/forwardauth.yaml new file mode 100644 index 00000000000..7a3e32fdbf7 --- /dev/null +++ b/core/traefik/10.0.24/templates/middlewares/forwardauth.yaml @@ -0,0 +1,30 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.forwardAuth }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + forwardAuth: + address: {{ $middlewareData.address }} + {{- with $middlewareData.authResponseHeaders }} + authResponseHeaders: + {{- toYaml . | nindent 4 }} + {{- end }} + {{- with $middlewareData.authRequestHeaders }} + authRequestHeaders: + {{- toYaml . | nindent 4 }} + {{- end }} + {{- if $middlewareData.authResponseHeadersRegex }} + authResponseHeadersRegex: {{ $middlewareData.authResponseHeadersRegex }} + {{- end }} + {{- if $middlewareData.trustForwardHeader }} + trustForwardHeader: true + {{- end }} +{{ end }} diff --git a/core/traefik/10.0.24/templates/middlewares/ipwhitelist.yaml b/core/traefik/10.0.24/templates/middlewares/ipwhitelist.yaml new file mode 100644 index 00000000000..82467dea0b9 --- /dev/null +++ b/core/traefik/10.0.24/templates/middlewares/ipwhitelist.yaml @@ -0,0 +1,33 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.ipWhiteList }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + ipWhiteList: + sourceRange: + {{- range $middlewareData.sourceRange }} + - {{ . }} + {{- end }} + {{- if $middlewareData.ipStrategy }} + ipStrategy: + {{- if $middlewareData.ipStrategy.depth }} + depth: {{ $middlewareData.ipStrategy.depth }} + {{- end }} + {{- if $middlewareData.ipStrategy.excludedIPs }} + excludedIPs: + {{- range $middlewareData.ipStrategy.excludedIPs }} + - {{ . }} + {{- end }} + {{- end }} + {{- end }} +{{ end }} diff --git a/core/traefik/10.0.24/templates/middlewares/ratelimit.yaml b/core/traefik/10.0.24/templates/middlewares/ratelimit.yaml new file mode 100644 index 00000000000..144b9d8bf38 --- /dev/null +++ b/core/traefik/10.0.24/templates/middlewares/ratelimit.yaml @@ -0,0 +1,19 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.rateLimit }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + rateLimit: + average: {{ $middlewareData.average }} + burst: {{ $middlewareData.burst }} +{{ end }} diff --git a/core/traefik/10.0.24/templates/middlewares/redirectScheme.yaml b/core/traefik/10.0.24/templates/middlewares/redirectScheme.yaml new file mode 100644 index 00000000000..f2413f84e19 --- /dev/null +++ b/core/traefik/10.0.24/templates/middlewares/redirectScheme.yaml @@ -0,0 +1,19 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.redirectScheme }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + redirectScheme: + scheme: {{ $middlewareData.scheme }} + permanent: {{ $middlewareData.permanent }} +{{ end }} diff --git a/core/traefik/10.0.24/templates/middlewares/redirectregex.yaml b/core/traefik/10.0.24/templates/middlewares/redirectregex.yaml new file mode 100644 index 00000000000..46e3e724dd6 --- /dev/null +++ b/core/traefik/10.0.24/templates/middlewares/redirectregex.yaml @@ -0,0 +1,20 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.redirectRegex }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + redirectRegex: + regex: {{ $middlewareData.regex | quote }} + replacement: {{ $middlewareData.replacement | quote }} + permanent: {{ $middlewareData.permanent }} +{{ end }} diff --git a/core/traefik/10.0.24/templates/middlewares/tc-nextcloud.yaml b/core/traefik/10.0.24/templates/middlewares/tc-nextcloud.yaml new file mode 100644 index 00000000000..6a3019d56c5 --- /dev/null +++ b/core/traefik/10.0.24/templates/middlewares/tc-nextcloud.yaml @@ -0,0 +1,25 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: tc-nextcloud-redirectregex-dav + namespace: {{ $namespace }} +spec: + redirectRegex: + regex: "https://(.*)/.well-known/(card|cal)dav" + replacement: "https://${1}/remote.php/dav/" +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: tc-nextcloud-chain + namespace: {{ $namespace }} +spec: + chain: + middlewares: + - name: tc-nextcloud-redirectregex-dav diff --git a/dependency/mariadb/1.0.30/values.yaml b/core/traefik/10.0.24/values.yaml similarity index 100% rename from dependency/mariadb/1.0.30/values.yaml rename to core/traefik/10.0.24/values.yaml diff --git a/dependency/mariadb/1.0.30/CHANGELOG.md b/dependency/mariadb/1.0.31/CHANGELOG.md similarity index 91% rename from dependency/mariadb/1.0.30/CHANGELOG.md rename to dependency/mariadb/1.0.31/CHANGELOG.md index 7f27a2f4d52..746b18d26fe 100644 --- a/dependency/mariadb/1.0.30/CHANGELOG.md +++ b/dependency/mariadb/1.0.31/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [mariadb-1.0.31](https://github.com/truecharts/apps/compare/mariadb-1.0.30...mariadb-1.0.31) (2021-12-12) + +#### Chore + +* update container image ghcr.io/truecharts/mariadb to v10.6.5 ([#1514](https://github.com/truecharts/apps/issues/1514)) + + + ### [mariadb-1.0.30](https://github.com/truecharts/apps/compare/mariadb-1.0.29...mariadb-1.0.30) (2021-12-11) @@ -88,12 +97,3 @@ * update common on deps ([#1467](https://github.com/truecharts/apps/issues/1467)) - - - -### [mariadb-1.0.22](https://github.com/truecharts/apps/compare/mariadb-1.0.21...mariadb-1.0.22) (2021-12-05) - -#### Chore - -* update non-major ([#1466](https://github.com/truecharts/apps/issues/1466)) - diff --git a/dependency/memcached/1.0.30/CONFIG.md b/dependency/mariadb/1.0.31/CONFIG.md similarity index 100% rename from dependency/memcached/1.0.30/CONFIG.md rename to dependency/mariadb/1.0.31/CONFIG.md diff --git a/dependency/mariadb/1.0.30/Chart.lock b/dependency/mariadb/1.0.31/Chart.lock similarity index 78% rename from dependency/mariadb/1.0.30/Chart.lock rename to dependency/mariadb/1.0.31/Chart.lock index 786df08c25e..0e0032d62a9 100644 --- a/dependency/mariadb/1.0.30/Chart.lock +++ b/dependency/mariadb/1.0.31/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.17 digest: sha256:f316fd0395c89cbb82c7007a82f0a8a3e4ade293d63c56db935919b838022a59 -generated: "2021-12-11T12:52:38.767603734Z" +generated: "2021-12-12T12:31:25.25114988Z" diff --git a/dependency/mariadb/1.0.30/Chart.yaml b/dependency/mariadb/1.0.31/Chart.yaml similarity index 98% rename from dependency/mariadb/1.0.30/Chart.yaml rename to dependency/mariadb/1.0.31/Chart.yaml index f7244285964..ea4678cb9f3 100644 --- a/dependency/mariadb/1.0.30/Chart.yaml +++ b/dependency/mariadb/1.0.31/Chart.yaml @@ -24,7 +24,7 @@ sources: - https://github.com/prometheus/mysqld_exporter - https://mariadb.org type: application -version: 1.0.30 +version: 1.0.31 annotations: truecharts.org/catagories: | - database diff --git a/dependency/mariadb/1.0.30/README.md b/dependency/mariadb/1.0.31/README.md similarity index 100% rename from dependency/mariadb/1.0.30/README.md rename to dependency/mariadb/1.0.31/README.md diff --git a/dependency/mariadb/1.0.30/app-readme.md b/dependency/mariadb/1.0.31/app-readme.md similarity index 100% rename from dependency/mariadb/1.0.30/app-readme.md rename to dependency/mariadb/1.0.31/app-readme.md diff --git a/dependency/mariadb/1.0.30/charts/common-8.9.17.tgz b/dependency/mariadb/1.0.31/charts/common-8.9.17.tgz similarity index 100% rename from dependency/mariadb/1.0.30/charts/common-8.9.17.tgz rename to dependency/mariadb/1.0.31/charts/common-8.9.17.tgz diff --git a/dependency/mariadb/1.0.30/helm-values.md b/dependency/mariadb/1.0.31/helm-values.md similarity index 97% rename from dependency/mariadb/1.0.30/helm-values.md rename to dependency/mariadb/1.0.31/helm-values.md index f8ad8d68550..e71048285bc 100644 --- a/dependency/mariadb/1.0.30/helm-values.md +++ b/dependency/mariadb/1.0.31/helm-values.md @@ -27,7 +27,7 @@ You will, however, be able to use all values referenced in the common chart here | existingSecret | string | `""` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"ghcr.io/truecharts/mariadb"` | | -| image.tag | string | `"v10.6.5@sha256:393628e4fc0eb3f334c762c395477d85844294aedcdf5b0c88638a33a7ccb3f3"` | | +| image.tag | string | `"v10.6.5@sha256:cec660e9154a97b4f66ef325754d50ea6e417af58909768d2e0845e989083e36"` | | | mariadbDatabase | string | `"test"` | | | mariadbPassword | string | `"testpass"` | | | mariadbRootPassword | string | `"testroot"` | | diff --git a/dependency/mariadb/1.0.30/ix_values.yaml b/dependency/mariadb/1.0.31/ix_values.yaml similarity index 97% rename from dependency/mariadb/1.0.30/ix_values.yaml rename to dependency/mariadb/1.0.31/ix_values.yaml index 6f197ad657a..8cac2e6e8d1 100644 --- a/dependency/mariadb/1.0.30/ix_values.yaml +++ b/dependency/mariadb/1.0.31/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: ghcr.io/truecharts/mariadb pullPolicy: IfNotPresent - tag: v10.6.5@sha256:393628e4fc0eb3f334c762c395477d85844294aedcdf5b0c88638a33a7ccb3f3 + tag: v10.6.5@sha256:cec660e9154a97b4f66ef325754d50ea6e417af58909768d2e0845e989083e36 controller: # -- Set the controller type. diff --git a/dependency/mariadb/1.0.30/questions.yaml b/dependency/mariadb/1.0.31/questions.yaml similarity index 100% rename from dependency/mariadb/1.0.30/questions.yaml rename to dependency/mariadb/1.0.31/questions.yaml diff --git a/dependency/mariadb/1.0.30/security.md b/dependency/mariadb/1.0.31/security.md similarity index 99% rename from dependency/mariadb/1.0.30/security.md rename to dependency/mariadb/1.0.31/security.md index 4d0b9ac4eed..7c68d177e31 100644 --- a/dependency/mariadb/1.0.30/security.md +++ b/dependency/mariadb/1.0.31/security.md @@ -36,7 +36,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/mariadb:v10.6.5@sha256:393628e4fc0eb3f334c762c395477d85844294aedcdf5b0c88638a33a7ccb3f3 + tccr.io/truecharts/mariadb:v10.6.5@sha256:cec660e9154a97b4f66ef325754d50ea6e417af58909768d2e0845e989083e36 ##### Scan Results @@ -73,7 +73,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/mariadb:v10.6.5@sha256:393628e4fc0eb3f334c762c395477d85844294aedcdf5b0c88638a33a7ccb3f3 (debian 10.11) +#### Container: tccr.io/truecharts/mariadb:v10.6.5@sha256:cec660e9154a97b4f66ef325754d50ea6e417af58909768d2e0845e989083e36 (debian 10.11) **debian** diff --git a/dependency/mariadb/1.0.30/templates/common.yaml b/dependency/mariadb/1.0.31/templates/common.yaml similarity index 100% rename from dependency/mariadb/1.0.30/templates/common.yaml rename to dependency/mariadb/1.0.31/templates/common.yaml diff --git a/dependency/mariadb/1.0.30/templates/secret.yaml b/dependency/mariadb/1.0.31/templates/secret.yaml similarity index 100% rename from dependency/mariadb/1.0.30/templates/secret.yaml rename to dependency/mariadb/1.0.31/templates/secret.yaml diff --git a/dependency/memcached/1.0.30/values.yaml b/dependency/mariadb/1.0.31/values.yaml similarity index 100% rename from dependency/memcached/1.0.30/values.yaml rename to dependency/mariadb/1.0.31/values.yaml diff --git a/dependency/memcached/1.0.30/CHANGELOG.md b/dependency/memcached/1.0.31/CHANGELOG.md similarity index 90% rename from dependency/memcached/1.0.30/CHANGELOG.md rename to dependency/memcached/1.0.31/CHANGELOG.md index d13717a63c5..7107ed61434 100644 --- a/dependency/memcached/1.0.30/CHANGELOG.md +++ b/dependency/memcached/1.0.31/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [memcached-1.0.31](https://github.com/truecharts/apps/compare/memcached-1.0.30...memcached-1.0.31) (2021-12-12) + +#### Chore + +* update container image ghcr.io/truecharts/memcached to v1.6.12 ([#1516](https://github.com/truecharts/apps/issues/1516)) + + + ### [memcached-1.0.30](https://github.com/truecharts/apps/compare/memcached-1.0.29...memcached-1.0.30) (2021-12-11) @@ -88,12 +97,3 @@ * update common on deps ([#1467](https://github.com/truecharts/apps/issues/1467)) - - -### [memcached-1.0.22](https://github.com/truecharts/apps/compare/memcached-1.0.21...memcached-1.0.22) (2021-12-05) - -#### Chore - -* update non-major ([#1466](https://github.com/truecharts/apps/issues/1466)) - -#### Fix diff --git a/dependency/postgresql/6.0.27/CONFIG.md b/dependency/memcached/1.0.31/CONFIG.md similarity index 100% rename from dependency/postgresql/6.0.27/CONFIG.md rename to dependency/memcached/1.0.31/CONFIG.md diff --git a/dependency/redis/1.0.32/Chart.lock b/dependency/memcached/1.0.31/Chart.lock similarity index 78% rename from dependency/redis/1.0.32/Chart.lock rename to dependency/memcached/1.0.31/Chart.lock index 82b8bd4a742..eb2ab30f818 100644 --- a/dependency/redis/1.0.32/Chart.lock +++ b/dependency/memcached/1.0.31/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.17 digest: sha256:f316fd0395c89cbb82c7007a82f0a8a3e4ade293d63c56db935919b838022a59 -generated: "2021-12-11T12:52:56.408014775Z" +generated: "2021-12-12T12:31:25.086874399Z" diff --git a/dependency/memcached/1.0.30/Chart.yaml b/dependency/memcached/1.0.31/Chart.yaml similarity index 97% rename from dependency/memcached/1.0.30/Chart.yaml rename to dependency/memcached/1.0.31/Chart.yaml index 82829335277..bcd3d7cd6ef 100644 --- a/dependency/memcached/1.0.30/Chart.yaml +++ b/dependency/memcached/1.0.31/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/bitnami/bitnami-docker-memcached - http://memcached.org/ type: application -version: 1.0.30 +version: 1.0.31 annotations: truecharts.org/catagories: | - database diff --git a/dependency/memcached/1.0.30/README.md b/dependency/memcached/1.0.31/README.md similarity index 100% rename from dependency/memcached/1.0.30/README.md rename to dependency/memcached/1.0.31/README.md diff --git a/dependency/memcached/1.0.30/app-readme.md b/dependency/memcached/1.0.31/app-readme.md similarity index 100% rename from dependency/memcached/1.0.30/app-readme.md rename to dependency/memcached/1.0.31/app-readme.md diff --git a/dependency/memcached/1.0.30/charts/common-8.9.17.tgz b/dependency/memcached/1.0.31/charts/common-8.9.17.tgz similarity index 100% rename from dependency/memcached/1.0.30/charts/common-8.9.17.tgz rename to dependency/memcached/1.0.31/charts/common-8.9.17.tgz diff --git a/dependency/memcached/1.0.30/helm-values.md b/dependency/memcached/1.0.31/helm-values.md similarity index 89% rename from dependency/memcached/1.0.30/helm-values.md rename to dependency/memcached/1.0.31/helm-values.md index 7adb48aa3e0..bbfac8ea41a 100644 --- a/dependency/memcached/1.0.30/helm-values.md +++ b/dependency/memcached/1.0.31/helm-values.md @@ -13,7 +13,7 @@ You will, however, be able to use all values referenced in the common chart here |-----|------|---------|-------------| | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"ghcr.io/truecharts/memcached"` | | -| image.tag | string | `"v1.6.12@sha256:608c7c6415f5bca26ed19b22c99e237fff790ca35b60212684cf4abc2fdae794"` | | +| image.tag | string | `"v1.6.12@sha256:3887a722b71d004c54ecf41a9f937edf5cd6a85c5e7c70935964b7aedf61b856"` | | | service.main.ports.main.port | int | `11211` | | | service.main.ports.main.targetPort | int | `11211` | | diff --git a/dependency/memcached/1.0.30/ix_values.yaml b/dependency/memcached/1.0.31/ix_values.yaml similarity index 65% rename from dependency/memcached/1.0.30/ix_values.yaml rename to dependency/memcached/1.0.31/ix_values.yaml index 4844c0c47f2..f8bfab53859 100644 --- a/dependency/memcached/1.0.30/ix_values.yaml +++ b/dependency/memcached/1.0.31/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: ghcr.io/truecharts/memcached pullPolicy: IfNotPresent - tag: v1.6.12@sha256:608c7c6415f5bca26ed19b22c99e237fff790ca35b60212684cf4abc2fdae794 + tag: v1.6.12@sha256:3887a722b71d004c54ecf41a9f937edf5cd6a85c5e7c70935964b7aedf61b856 service: main: diff --git a/dependency/memcached/1.0.30/questions.yaml b/dependency/memcached/1.0.31/questions.yaml similarity index 100% rename from dependency/memcached/1.0.30/questions.yaml rename to dependency/memcached/1.0.31/questions.yaml diff --git a/dependency/memcached/1.0.30/security.md b/dependency/memcached/1.0.31/security.md similarity index 99% rename from dependency/memcached/1.0.30/security.md rename to dependency/memcached/1.0.31/security.md index 1c63450487c..b970a7413c8 100644 --- a/dependency/memcached/1.0.30/security.md +++ b/dependency/memcached/1.0.31/security.md @@ -34,7 +34,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/memcached:v1.6.12@sha256:608c7c6415f5bca26ed19b22c99e237fff790ca35b60212684cf4abc2fdae794 + tccr.io/truecharts/memcached:v1.6.12@sha256:3887a722b71d004c54ecf41a9f937edf5cd6a85c5e7c70935964b7aedf61b856 ##### Scan Results @@ -71,7 +71,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/memcached:v1.6.12@sha256:608c7c6415f5bca26ed19b22c99e237fff790ca35b60212684cf4abc2fdae794 (debian 10.11) +#### Container: tccr.io/truecharts/memcached:v1.6.12@sha256:3887a722b71d004c54ecf41a9f937edf5cd6a85c5e7c70935964b7aedf61b856 (debian 10.11) **debian** diff --git a/dependency/memcached/1.0.30/templates/common.yaml b/dependency/memcached/1.0.31/templates/common.yaml similarity index 100% rename from dependency/memcached/1.0.30/templates/common.yaml rename to dependency/memcached/1.0.31/templates/common.yaml diff --git a/dependency/postgresql/6.0.27/values.yaml b/dependency/memcached/1.0.31/values.yaml similarity index 100% rename from dependency/postgresql/6.0.27/values.yaml rename to dependency/memcached/1.0.31/values.yaml diff --git a/dependency/postgresql/6.0.27/CHANGELOG.md b/dependency/postgresql/6.0.28/CHANGELOG.md similarity index 90% rename from dependency/postgresql/6.0.27/CHANGELOG.md rename to dependency/postgresql/6.0.28/CHANGELOG.md index 682f95b9111..ba91dbd24da 100644 --- a/dependency/postgresql/6.0.27/CHANGELOG.md +++ b/dependency/postgresql/6.0.28/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [postgresql-6.0.28](https://github.com/truecharts/apps/compare/postgresql-6.0.27...postgresql-6.0.28) (2021-12-12) + +#### Chore + +* update container image ghcr.io/truecharts/postgresql to v14.1.0 ([#1515](https://github.com/truecharts/apps/issues/1515)) + + + ### [postgresql-6.0.27](https://github.com/truecharts/apps/compare/postgresql-6.0.26...postgresql-6.0.27) (2021-12-11) @@ -88,12 +97,3 @@ * update non-major ([#1466](https://github.com/truecharts/apps/issues/1466)) -#### Fix - -* move deps back to ghcr for now. -* correct mountpath mistakes - - - - -### [postgresql-6.0.19](https://github.com/truecharts/apps/compare/postgresql-6.0.18...postgresql-6.0.19) (2021-12-04) diff --git a/dependency/redis/1.0.32/CONFIG.md b/dependency/postgresql/6.0.28/CONFIG.md similarity index 100% rename from dependency/redis/1.0.32/CONFIG.md rename to dependency/postgresql/6.0.28/CONFIG.md diff --git a/dependency/memcached/1.0.30/Chart.lock b/dependency/postgresql/6.0.28/Chart.lock similarity index 78% rename from dependency/memcached/1.0.30/Chart.lock rename to dependency/postgresql/6.0.28/Chart.lock index d74f6b2a7b2..409bbcd7fd3 100644 --- a/dependency/memcached/1.0.30/Chart.lock +++ b/dependency/postgresql/6.0.28/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.17 digest: sha256:f316fd0395c89cbb82c7007a82f0a8a3e4ade293d63c56db935919b838022a59 -generated: "2021-12-11T12:52:38.793022439Z" +generated: "2021-12-12T12:31:48.57060641Z" diff --git a/dependency/postgresql/6.0.27/Chart.yaml b/dependency/postgresql/6.0.28/Chart.yaml similarity index 97% rename from dependency/postgresql/6.0.27/Chart.yaml rename to dependency/postgresql/6.0.28/Chart.yaml index e7cb098062b..529356b47a2 100644 --- a/dependency/postgresql/6.0.27/Chart.yaml +++ b/dependency/postgresql/6.0.28/Chart.yaml @@ -22,7 +22,7 @@ name: postgresql sources: - https://www.postgresql.org/ type: application -version: 6.0.27 +version: 6.0.28 annotations: truecharts.org/catagories: | - database diff --git a/dependency/postgresql/6.0.27/README.md b/dependency/postgresql/6.0.28/README.md similarity index 100% rename from dependency/postgresql/6.0.27/README.md rename to dependency/postgresql/6.0.28/README.md diff --git a/dependency/postgresql/6.0.27/app-readme.md b/dependency/postgresql/6.0.28/app-readme.md similarity index 100% rename from dependency/postgresql/6.0.27/app-readme.md rename to dependency/postgresql/6.0.28/app-readme.md diff --git a/dependency/postgresql/6.0.27/charts/common-8.9.17.tgz b/dependency/postgresql/6.0.28/charts/common-8.9.17.tgz similarity index 100% rename from dependency/postgresql/6.0.27/charts/common-8.9.17.tgz rename to dependency/postgresql/6.0.28/charts/common-8.9.17.tgz diff --git a/dependency/postgresql/6.0.27/helm-values.md b/dependency/postgresql/6.0.28/helm-values.md similarity index 96% rename from dependency/postgresql/6.0.27/helm-values.md rename to dependency/postgresql/6.0.28/helm-values.md index 89bd7dd44c9..59b44e4f1cd 100644 --- a/dependency/postgresql/6.0.27/helm-values.md +++ b/dependency/postgresql/6.0.28/helm-values.md @@ -28,7 +28,7 @@ You will, however, be able to use all values referenced in the common chart here | existingSecret | string | `""` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"ghcr.io/truecharts/postgresql"` | | -| image.tag | string | `"v14.1.0@sha256:2aa01c5c4525cfbcf1259f6bb34c5699b6744f9d3280f77e05912cc80e24184c"` | | +| image.tag | string | `"v14.1.0@sha256:5180bdcd6e5a3370a39e39d62f7b17e49eb788729a5bbbb115cddac4134e2ba9"` | | | podSecurityContext.runAsGroup | int | `0` | | | postgrespassword | string | `"testroot"` | | | postgresqlDatabase | string | `"test"` | | diff --git a/dependency/postgresql/6.0.27/ix_values.yaml b/dependency/postgresql/6.0.28/ix_values.yaml similarity index 95% rename from dependency/postgresql/6.0.27/ix_values.yaml rename to dependency/postgresql/6.0.28/ix_values.yaml index 0567f747afb..19b855e24e3 100644 --- a/dependency/postgresql/6.0.27/ix_values.yaml +++ b/dependency/postgresql/6.0.28/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: ghcr.io/truecharts/postgresql pullPolicy: IfNotPresent - tag: v14.1.0@sha256:2aa01c5c4525cfbcf1259f6bb34c5699b6744f9d3280f77e05912cc80e24184c + tag: v14.1.0@sha256:5180bdcd6e5a3370a39e39d62f7b17e49eb788729a5bbbb115cddac4134e2ba9 controller: # -- Set the controller type. diff --git a/dependency/postgresql/6.0.27/questions.yaml b/dependency/postgresql/6.0.28/questions.yaml similarity index 100% rename from dependency/postgresql/6.0.27/questions.yaml rename to dependency/postgresql/6.0.28/questions.yaml diff --git a/dependency/postgresql/6.0.27/security.md b/dependency/postgresql/6.0.28/security.md similarity index 99% rename from dependency/postgresql/6.0.27/security.md rename to dependency/postgresql/6.0.28/security.md index f09fce989cc..38b9c275641 100644 --- a/dependency/postgresql/6.0.27/security.md +++ b/dependency/postgresql/6.0.28/security.md @@ -36,7 +36,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/postgresql:v14.1.0@sha256:2aa01c5c4525cfbcf1259f6bb34c5699b6744f9d3280f77e05912cc80e24184c + tccr.io/truecharts/postgresql:v14.1.0@sha256:5180bdcd6e5a3370a39e39d62f7b17e49eb788729a5bbbb115cddac4134e2ba9 ##### Scan Results @@ -73,7 +73,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:2aa01c5c4525cfbcf1259f6bb34c5699b6744f9d3280f77e05912cc80e24184c (debian 10.11) +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:5180bdcd6e5a3370a39e39d62f7b17e49eb788729a5bbbb115cddac4134e2ba9 (debian 10.11) **debian** diff --git a/dependency/postgresql/6.0.27/templates/backup-postgres-config.yaml b/dependency/postgresql/6.0.28/templates/backup-postgres-config.yaml similarity index 100% rename from dependency/postgresql/6.0.27/templates/backup-postgres-config.yaml rename to dependency/postgresql/6.0.28/templates/backup-postgres-config.yaml diff --git a/dependency/postgresql/6.0.27/templates/common.yaml b/dependency/postgresql/6.0.28/templates/common.yaml similarity index 100% rename from dependency/postgresql/6.0.27/templates/common.yaml rename to dependency/postgresql/6.0.28/templates/common.yaml diff --git a/dependency/postgresql/6.0.27/templates/secret.yaml b/dependency/postgresql/6.0.28/templates/secret.yaml similarity index 100% rename from dependency/postgresql/6.0.27/templates/secret.yaml rename to dependency/postgresql/6.0.28/templates/secret.yaml diff --git a/dependency/postgresql/6.0.27/templates/upgrade-backup-postgres-hook.yaml b/dependency/postgresql/6.0.28/templates/upgrade-backup-postgres-hook.yaml similarity index 100% rename from dependency/postgresql/6.0.27/templates/upgrade-backup-postgres-hook.yaml rename to dependency/postgresql/6.0.28/templates/upgrade-backup-postgres-hook.yaml diff --git a/dependency/redis/1.0.32/values.yaml b/dependency/postgresql/6.0.28/values.yaml similarity index 100% rename from dependency/redis/1.0.32/values.yaml rename to dependency/postgresql/6.0.28/values.yaml diff --git a/dependency/redis/1.0.32/CHANGELOG.md b/dependency/redis/1.0.33/CHANGELOG.md similarity index 91% rename from dependency/redis/1.0.32/CHANGELOG.md rename to dependency/redis/1.0.33/CHANGELOG.md index 0963608d261..864eed1122b 100644 --- a/dependency/redis/1.0.32/CHANGELOG.md +++ b/dependency/redis/1.0.33/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [redis-1.0.33](https://github.com/truecharts/apps/compare/redis-1.0.32...redis-1.0.33) (2021-12-12) + +#### Chore + +* update container image ghcr.io/truecharts/redis to v6.2.6 ([#1517](https://github.com/truecharts/apps/issues/1517)) + + + ### [redis-1.0.32](https://github.com/truecharts/apps/compare/redis-1.0.31...redis-1.0.32) (2021-12-11) @@ -88,12 +97,3 @@ #### Chore * update common on deps ([#1467](https://github.com/truecharts/apps/issues/1467)) - - - - -### [redis-1.0.24](https://github.com/truecharts/apps/compare/redis-1.0.23...redis-1.0.24) (2021-12-05) - -#### Chore - -* update non-major ([#1466](https://github.com/truecharts/apps/issues/1466)) diff --git a/incubator/omada-controller/4.0.27/CONFIG.md b/dependency/redis/1.0.33/CONFIG.md similarity index 100% rename from incubator/omada-controller/4.0.27/CONFIG.md rename to dependency/redis/1.0.33/CONFIG.md diff --git a/dependency/postgresql/6.0.27/Chart.lock b/dependency/redis/1.0.33/Chart.lock similarity index 78% rename from dependency/postgresql/6.0.27/Chart.lock rename to dependency/redis/1.0.33/Chart.lock index dcec8ef07bb..2f50d45a7aa 100644 --- a/dependency/postgresql/6.0.27/Chart.lock +++ b/dependency/redis/1.0.33/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.17 digest: sha256:f316fd0395c89cbb82c7007a82f0a8a3e4ade293d63c56db935919b838022a59 -generated: "2021-12-11T12:52:38.790067904Z" +generated: "2021-12-12T12:31:54.652932107Z" diff --git a/dependency/redis/1.0.32/Chart.yaml b/dependency/redis/1.0.33/Chart.yaml similarity index 97% rename from dependency/redis/1.0.32/Chart.yaml rename to dependency/redis/1.0.33/Chart.yaml index 5ac471f1c4f..3526dec8b90 100644 --- a/dependency/redis/1.0.32/Chart.yaml +++ b/dependency/redis/1.0.33/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/bitnami/bitnami-docker-redis - http://redis.io/ type: application -version: 1.0.32 +version: 1.0.33 annotations: truecharts.org/catagories: | - database diff --git a/dependency/redis/1.0.32/README.md b/dependency/redis/1.0.33/README.md similarity index 100% rename from dependency/redis/1.0.32/README.md rename to dependency/redis/1.0.33/README.md diff --git a/dependency/redis/1.0.32/app-readme.md b/dependency/redis/1.0.33/app-readme.md similarity index 100% rename from dependency/redis/1.0.32/app-readme.md rename to dependency/redis/1.0.33/app-readme.md diff --git a/dependency/redis/1.0.32/charts/common-8.9.17.tgz b/dependency/redis/1.0.33/charts/common-8.9.17.tgz similarity index 100% rename from dependency/redis/1.0.32/charts/common-8.9.17.tgz rename to dependency/redis/1.0.33/charts/common-8.9.17.tgz diff --git a/dependency/redis/1.0.32/helm-values.md b/dependency/redis/1.0.33/helm-values.md similarity index 97% rename from dependency/redis/1.0.32/helm-values.md rename to dependency/redis/1.0.33/helm-values.md index 2d0f6995093..338566453f9 100644 --- a/dependency/redis/1.0.32/helm-values.md +++ b/dependency/redis/1.0.33/helm-values.md @@ -28,7 +28,7 @@ You will, however, be able to use all values referenced in the common chart here | existingSecret | string | `""` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"ghcr.io/truecharts/redis"` | | -| image.tag | string | `"v6.2.6@sha256:ab162a9e97594601d1fc0af622d1e271d0503b668b6e7d9f05ce9cfb8d1c177a"` | | +| image.tag | string | `"v6.2.6@sha256:471f2da7f69404488e217181aa5514007c9b2ea24e97defcba4791f2d14fb8ab"` | | | persistence.redis-health | object | See below | redis-health configmap mount | | persistence.redis-health.mountPath | string | `"/health"` | Where to mount the volume in the main container. Defaults to `/`, setting to '-' creates the volume but disables the volumeMount. | | persistence.redis-health.readOnly | bool | `false` | Specify if the volume should be mounted read-only. | diff --git a/dependency/redis/1.0.32/ix_values.yaml b/dependency/redis/1.0.33/ix_values.yaml similarity index 97% rename from dependency/redis/1.0.32/ix_values.yaml rename to dependency/redis/1.0.33/ix_values.yaml index d9cab54110e..10a30106af7 100644 --- a/dependency/redis/1.0.32/ix_values.yaml +++ b/dependency/redis/1.0.33/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: ghcr.io/truecharts/redis pullPolicy: IfNotPresent - tag: v6.2.6@sha256:ab162a9e97594601d1fc0af622d1e271d0503b668b6e7d9f05ce9cfb8d1c177a + tag: v6.2.6@sha256:471f2da7f69404488e217181aa5514007c9b2ea24e97defcba4791f2d14fb8ab controller: # -- Set the controller type. diff --git a/dependency/redis/1.0.32/questions.yaml b/dependency/redis/1.0.33/questions.yaml similarity index 100% rename from dependency/redis/1.0.32/questions.yaml rename to dependency/redis/1.0.33/questions.yaml diff --git a/dependency/redis/1.0.32/security.md b/dependency/redis/1.0.33/security.md similarity index 99% rename from dependency/redis/1.0.32/security.md rename to dependency/redis/1.0.33/security.md index 4017f9959d3..729a0cd5f85 100644 --- a/dependency/redis/1.0.32/security.md +++ b/dependency/redis/1.0.33/security.md @@ -36,7 +36,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/redis:v6.2.6@sha256:ab162a9e97594601d1fc0af622d1e271d0503b668b6e7d9f05ce9cfb8d1c177a + tccr.io/truecharts/redis:v6.2.6@sha256:471f2da7f69404488e217181aa5514007c9b2ea24e97defcba4791f2d14fb8ab ##### Scan Results @@ -73,7 +73,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:ab162a9e97594601d1fc0af622d1e271d0503b668b6e7d9f05ce9cfb8d1c177a (debian 10.11) +#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:471f2da7f69404488e217181aa5514007c9b2ea24e97defcba4791f2d14fb8ab (debian 10.11) **debian** diff --git a/dependency/redis/1.0.32/templates/common.yaml b/dependency/redis/1.0.33/templates/common.yaml similarity index 100% rename from dependency/redis/1.0.32/templates/common.yaml rename to dependency/redis/1.0.33/templates/common.yaml diff --git a/dependency/redis/1.0.32/templates/health-configmap.yaml b/dependency/redis/1.0.33/templates/health-configmap.yaml similarity index 100% rename from dependency/redis/1.0.32/templates/health-configmap.yaml rename to dependency/redis/1.0.33/templates/health-configmap.yaml diff --git a/dependency/redis/1.0.32/templates/secret.yaml b/dependency/redis/1.0.33/templates/secret.yaml similarity index 100% rename from dependency/redis/1.0.32/templates/secret.yaml rename to dependency/redis/1.0.33/templates/secret.yaml diff --git a/incubator/omada-controller/4.0.27/values.yaml b/dependency/redis/1.0.33/values.yaml similarity index 100% rename from incubator/omada-controller/4.0.27/values.yaml rename to dependency/redis/1.0.33/values.yaml diff --git a/incubator/omada-controller/4.0.27/CHANGELOG.md b/incubator/omada-controller/4.0.28/CHANGELOG.md similarity index 92% rename from incubator/omada-controller/4.0.27/CHANGELOG.md rename to incubator/omada-controller/4.0.28/CHANGELOG.md index 5620af83d43..95bc48ff12c 100644 --- a/incubator/omada-controller/4.0.27/CHANGELOG.md +++ b/incubator/omada-controller/4.0.28/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [omada-controller-4.0.28](https://github.com/truecharts/apps/compare/omada-controller-4.0.27...omada-controller-4.0.28) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + ### [omada-controller-4.0.27](https://github.com/truecharts/apps/compare/omada-controller-4.0.26...omada-controller-4.0.27) (2021-12-11) @@ -88,12 +97,3 @@ ### [omada-controller-4.0.19](https://github.com/truecharts/apps/compare/omada-controller-4.0.18...omada-controller-4.0.19) (2021-11-30) - -#### Chore - -* update non-major deps helm releases - - - - -### [omada-controller-4.0.17](https://github.com/truecharts/apps/compare/omada-controller-4.0.16...omada-controller-4.0.17) (2021-11-23) diff --git a/stable/babybuddy/5.0.15/CONFIG.md b/incubator/omada-controller/4.0.28/CONFIG.md similarity index 100% rename from stable/babybuddy/5.0.15/CONFIG.md rename to incubator/omada-controller/4.0.28/CONFIG.md diff --git a/stable/esphome/9.0.24/Chart.lock b/incubator/omada-controller/4.0.28/Chart.lock similarity index 78% rename from stable/esphome/9.0.24/Chart.lock rename to incubator/omada-controller/4.0.28/Chart.lock index d013c9d3b3d..bd970fe18d2 100644 --- a/stable/esphome/9.0.24/Chart.lock +++ b/incubator/omada-controller/4.0.28/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.18 digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c -generated: "2021-12-11T14:19:48.210650253Z" +generated: "2021-12-12T12:31:59.821653393Z" diff --git a/incubator/omada-controller/4.0.27/Chart.yaml b/incubator/omada-controller/4.0.28/Chart.yaml similarity index 97% rename from incubator/omada-controller/4.0.27/Chart.yaml rename to incubator/omada-controller/4.0.28/Chart.yaml index c4c8f552d35..fe15315d2b3 100644 --- a/incubator/omada-controller/4.0.27/Chart.yaml +++ b/incubator/omada-controller/4.0.28/Chart.yaml @@ -18,7 +18,7 @@ name: omada-controller sources: - https://github.com/mbentley/docker-omada-controller - https://github.com/truechartsapps/tree/master/charts/omada-controller -version: 4.0.27 +version: 4.0.28 annotations: truecharts.org/catagories: | - media diff --git a/incubator/omada-controller/4.0.27/README.md b/incubator/omada-controller/4.0.28/README.md similarity index 100% rename from incubator/omada-controller/4.0.27/README.md rename to incubator/omada-controller/4.0.28/README.md diff --git a/incubator/omada-controller/4.0.27/app-readme.md b/incubator/omada-controller/4.0.28/app-readme.md similarity index 100% rename from incubator/omada-controller/4.0.27/app-readme.md rename to incubator/omada-controller/4.0.28/app-readme.md diff --git a/stable/babybuddy/5.0.15/charts/common-8.9.18.tgz b/incubator/omada-controller/4.0.28/charts/common-8.9.18.tgz similarity index 100% rename from stable/babybuddy/5.0.15/charts/common-8.9.18.tgz rename to incubator/omada-controller/4.0.28/charts/common-8.9.18.tgz diff --git a/incubator/omada-controller/4.0.27/helm-values.md b/incubator/omada-controller/4.0.28/helm-values.md similarity index 92% rename from incubator/omada-controller/4.0.27/helm-values.md rename to incubator/omada-controller/4.0.28/helm-values.md index deb0a1268a6..494640b90b3 100644 --- a/incubator/omada-controller/4.0.27/helm-values.md +++ b/incubator/omada-controller/4.0.28/helm-values.md @@ -15,7 +15,7 @@ You will, however, be able to use all values referenced in the common chart here | env.TZ | string | `"UTC"` | Set the container timezone | | image.pullPolicy | string | `"IfNotPresent"` | image pull policy | | image.repository | string | `"tccr.io/truecharts/omada-controller"` | image repository | -| image.tag | string | `"v4.4@sha256:7c06f9deb40f1fea1968eedf6da8b49192b89d0c4bcaa11f040d95c127141fb3"` | image tag | +| image.tag | string | `"v4.4@sha256:1e6e8726cc6644a1f06e6547af955c5953e9cc38dc516fc79127a19da3dc2b86"` | image tag | | persistence | object | See values.yaml | Configure persistence settings for the chart under this key. | | podSecurityContext.runAsGroup | int | `0` | | | podSecurityContext.runAsUser | int | `0` | | diff --git a/incubator/omada-controller/4.0.27/ix_values.yaml b/incubator/omada-controller/4.0.28/ix_values.yaml similarity index 95% rename from incubator/omada-controller/4.0.27/ix_values.yaml rename to incubator/omada-controller/4.0.28/ix_values.yaml index fbfb59cc3c8..8d44f4c3a79 100644 --- a/incubator/omada-controller/4.0.27/ix_values.yaml +++ b/incubator/omada-controller/4.0.28/ix_values.yaml @@ -2,7 +2,7 @@ image: # -- image repository repository: tccr.io/truecharts/omada-controller # -- image tag - tag: v4.4@sha256:7c06f9deb40f1fea1968eedf6da8b49192b89d0c4bcaa11f040d95c127141fb3 + tag: v4.4@sha256:1e6e8726cc6644a1f06e6547af955c5953e9cc38dc516fc79127a19da3dc2b86 # -- image pull policy pullPolicy: IfNotPresent diff --git a/incubator/omada-controller/4.0.27/questions.yaml b/incubator/omada-controller/4.0.28/questions.yaml similarity index 100% rename from incubator/omada-controller/4.0.27/questions.yaml rename to incubator/omada-controller/4.0.28/questions.yaml diff --git a/incubator/omada-controller/4.0.27/security.md b/incubator/omada-controller/4.0.28/security.md similarity index 98% rename from incubator/omada-controller/4.0.27/security.md rename to incubator/omada-controller/4.0.28/security.md index 60a0dea9351..b05b00a7edd 100644 --- a/incubator/omada-controller/4.0.27/security.md +++ b/incubator/omada-controller/4.0.28/security.md @@ -37,7 +37,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/omada-controller:v4.4@sha256:7c06f9deb40f1fea1968eedf6da8b49192b89d0c4bcaa11f040d95c127141fb3 + tccr.io/truecharts/omada-controller:v4.4@sha256:1e6e8726cc6644a1f06e6547af955c5953e9cc38dc516fc79127a19da3dc2b86 ##### Scan Results @@ -74,7 +74,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/omada-controller:v4.4@sha256:7c06f9deb40f1fea1968eedf6da8b49192b89d0c4bcaa11f040d95c127141fb3 (ubuntu 18.04) +#### Container: tccr.io/truecharts/omada-controller:v4.4@sha256:1e6e8726cc6644a1f06e6547af955c5953e9cc38dc516fc79127a19da3dc2b86 (ubuntu 18.04) **ubuntu** @@ -138,11 +138,10 @@ hide: | libncurses5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| | libncursesw5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| | libncursesw5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| -| libnss3 | CVE-2021-43527 | HIGH | 2:3.35-2ubuntu2.12 | 2:3.35-2ubuntu2.13 |
Expand...https://bugzilla.mozilla.org/show_bug.cgi?id=1737470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/
https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html
https://linux.oracle.com/cve/CVE-2021-43527.html
https://linux.oracle.com/errata/ELSA-2021-9591.html
https://ubuntu.com/security/notices/USN-5168-1
https://ubuntu.com/security/notices/USN-5168-2
https://ubuntu.com/security/notices/USN-5168-3
https://ubuntu.com/security/notices/USN-5168-4
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
https://www.mozilla.org/security/advisories/mfsa2021-51/
| -| libnss3 | CVE-2017-11695 | LOW | 2:3.35-2ubuntu2.12 | |
Expand...http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11695
https://security.gentoo.org/glsa/202003-37
| -| libnss3 | CVE-2017-11696 | LOW | 2:3.35-2ubuntu2.12 | |
Expand...http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11696
https://security.gentoo.org/glsa/202003-37
| -| libnss3 | CVE-2017-11697 | LOW | 2:3.35-2ubuntu2.12 | |
Expand...http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11697
https://security.gentoo.org/glsa/202003-37
| -| libnss3 | CVE-2017-11698 | LOW | 2:3.35-2ubuntu2.12 | |
Expand...http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11698
https://security.gentoo.org/glsa/202003-37
| +| libnss3 | CVE-2017-11695 | LOW | 2:3.35-2ubuntu2.13 | |
Expand...http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11695
https://security.gentoo.org/glsa/202003-37
| +| libnss3 | CVE-2017-11696 | LOW | 2:3.35-2ubuntu2.13 | |
Expand...http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11696
https://security.gentoo.org/glsa/202003-37
| +| libnss3 | CVE-2017-11697 | LOW | 2:3.35-2ubuntu2.13 | |
Expand...http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11697
https://security.gentoo.org/glsa/202003-37
| +| libnss3 | CVE-2017-11698 | LOW | 2:3.35-2ubuntu2.13 | |
Expand...http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11698
https://security.gentoo.org/glsa/202003-37
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-9 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libpcre3 | CVE-2019-20838 | LOW | 2:8.39-9 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| | libpcre3 | CVE-2020-14155 | LOW | 2:8.39-9 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| @@ -244,9 +243,7 @@ hide: | commons-beanutils:commons-beanutils | CVE-2019-10086 | HIGH | 1.9.3 | 1.9.4 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00007.html
http://mail-archives.apache.org/mod_mbox/www-announce/201908.mbox/%3cC628798F-315D-4428-8CB1-4ED1ECC958E4@apache.org%3e
https://access.redhat.com/errata/RHSA-2019:4317
https://access.redhat.com/errata/RHSA-2020:0057
https://access.redhat.com/errata/RHSA-2020:0194
https://access.redhat.com/errata/RHSA-2020:0804
https://access.redhat.com/errata/RHSA-2020:0805
https://access.redhat.com/errata/RHSA-2020:0806
https://access.redhat.com/errata/RHSA-2020:0811
https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10086
https://github.com/advisories/GHSA-6phf-73q6-gh87
https://github.com/apache/commons-beanutils/commit/dd48f4e589462a8cdb1f29bbbccb35d6b0291d58
https://github.com/apache/commons-beanutils/pull/7
https://issues.apache.org/jira/browse/BEANUTILS-520
https://linux.oracle.com/cve/CVE-2019-10086.html
https://linux.oracle.com/errata/ELSA-2020-0194.html
https://lists.apache.org/thread.html/02094ad226dbc17a2368beaf27e61d8b1432f5baf77d0ca995bb78bc@%3Cissues.commons.apache.org%3E
https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5@%3Cissues.commons.apache.org%3E
https://lists.apache.org/thread.html/2fd61dc89df9aeab738d2b49f48d42c76f7d53b980ba04e1d48bce48@%3Cdev.shiro.apache.org%3E
https://lists.apache.org/thread.html/3d1ed1a1596c08c4d5fea97b36c651ce167b773f1afc75251ce7a125@%3Ccommits.tinkerpop.apache.org%3E
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/5261066cd7adee081ee05c8bf0e96cf0b2eeaced391e19117ae4daa6@%3Cdev.shiro.apache.org%3E
https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0@%3Cissues.commons.apache.org%3E
https://lists.apache.org/thread.html/a684107d3a78e431cf0fbb90629e8559a36ff8fe94c3a76e620b39fa@%3Cdev.shiro.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/c94bc9649d5109a663b2129371dc45753fbdeacd340105548bbe93c3@%3Cdev.shiro.apache.org%3E
https://lists.apache.org/thread.html/d6ca9439c53374b597f33b7ec180001625597db48ea30356af01145f@%3Cdev.shiro.apache.org%3E
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/r18d8b4f9263e5cad3bbaef0cdba0e2ccdf9201316ac4b85e23eb7ee4@%3Cdev.atlas.apache.org%3E
https://lists.apache.org/thread.html/r2d5f1d88c39bd615271abda63964a0bee9b2b57fef1f84cb4c43032e@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r306c0322aa5c0da731e03f3ce9f07f4745c052c6b73f4e78faf232ca@%3Cdev.atlas.apache.org%3E
https://lists.apache.org/thread.html/r43de02fd4a4f52c4bdeff8c02f09625d83cd047498009c1cdab857db@%3Cdev.rocketmq.apache.org%3E
https://lists.apache.org/thread.html/r46e536fc98942dce99fadd2e313aeefe90c1a769c5cd85d98df9d098@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r513a7a21c422170318115463b399dd58ab447fe0990b13e5884f0825@%3Ccommits.dolphinscheduler.apache.org%3E
https://lists.apache.org/thread.html/r6194ced4828deb32023cd314e31f41c61d388b58935d102c7de91f58@%3Cdev.atlas.apache.org%3E
https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E
https://lists.apache.org/thread.html/ra41fd0ad4b7e1d675c03a5081a16a6603085a4e37d30b866067566fe@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/ra87ac17410a62e813cba901fdd4e9a674dd53daaf714870f28e905f1@%3Cdev.atlas.apache.org%3E
https://lists.apache.org/thread.html/ra9a139fdc0999750dcd519e81384bc1fe3946f311b1796221205f51c@%3Ccommits.dolphinscheduler.apache.org%3E
https://lists.apache.org/thread.html/racd3e7b2149fa2f255f016bd6bffab0fea77b6fb81c50db9a17f78e6@%3Cdev.atlas.apache.org%3E
https://lists.apache.org/thread.html/rae81e0c8ebdf47ffaa85a01240836bfece8a990c48f55c7933162b5c@%3Cdev.atlas.apache.org%3E
https://lists.apache.org/thread.html/rb1f76c2c0a4d6efb8a3523974f9d085d5838b73e7bffdf9a8f212997@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/rb8dac04cb7e9cc5dedee8dabaa1c92614f590642e5ebf02a145915ba@%3Ccommits.atlas.apache.org%3E
https://lists.apache.org/thread.html/rcc029be4edaaf5b8bb85818aab494e16f312fced07a0f4a202771ba2@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/rd2d2493f4f1af6980d265b8d84c857e2b7ab80a46e1423710c448957@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/re2028d4d76ba1db3e3c3a722d6c6034e801cc3b309f69cc166eaa32b@%3Ccommits.nifi.apache.org%3E
https://lists.apache.org/thread.html/re3cd7cb641d7fc6684e4fc3c336a8bad4a01434bb5625a06e3600fd1@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/rec74f3a94dd850259c730b4ba6f7b6211222b58900ec088754aa0534@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/reee57101464cf7622d640ae013b2162eb864f603ec4093de8240bb8f@%3Cdev.atlas.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/08/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4APPGLBWMFAS4WHNLR4LIJ65DJGPV7TF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIUYSL2RSIWZVNSUIXJTIFPIPIF6OAIO/
https://nvd.nist.gov/vuln/detail/CVE-2019-10086
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | commons-io:commons-io | CVE-2021-29425 | MEDIUM | 2.2 | 2.7 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425
https://github.com/advisories/GHSA-gwrp-pvrq-jmwv
https://issues.apache.org/jira/browse/IO-556
https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E
https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E
https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E
https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E
https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E
https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2021-29425
https://ubuntu.com/security/notices/USN-5095-1
https://www.openwall.com/lists/oss-security/2021/04/12/1
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.apache.httpcomponents:httpclient | CVE-2020-13956 | MEDIUM | 4.5.7 | 4.5.13 |
Expand...https://github.com/advisories/GHSA-7r82-7xv7-xcpj
https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E
https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E
https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E
https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E
https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E
https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E
https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E
https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E
https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E
https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E
https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-13956
https://www.openwall.com/lists/oss-security/2020/10/08/4
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| org.apache.logging.log4j:log4j-api | CVE-2021-44228 | CRITICAL | 2.8.2 | 2.15.0 |
Expand...http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
http://www.openwall.com/lists/oss-security/2021/12/10/1
http://www.openwall.com/lists/oss-security/2021/12/10/2
http://www.openwall.com/lists/oss-security/2021/12/10/3
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://github.com/apache/logging-log4j2/pull/608
https://github.com/tangxiaofeng7/apache-log4j-poc
https://issues.apache.org/jira/browse/LOG4J2-3198
https://issues.apache.org/jira/browse/LOG4J2-3201
https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0
https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup
https://logging.apache.org/log4j/2.x/manual/migration.html
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-44228
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
https://security.netapp.com/advisory/ntap-20211210-0007/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
https://www.lunasec.io/docs/blog/log4j-zero-day/
| -| org.apache.logging.log4j:log4j-core | CVE-2021-44228 | CRITICAL | 2.8.2 | 2.15.0 |
Expand...http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
http://www.openwall.com/lists/oss-security/2021/12/10/1
http://www.openwall.com/lists/oss-security/2021/12/10/2
http://www.openwall.com/lists/oss-security/2021/12/10/3
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://github.com/apache/logging-log4j2/pull/608
https://github.com/tangxiaofeng7/apache-log4j-poc
https://issues.apache.org/jira/browse/LOG4J2-3198
https://issues.apache.org/jira/browse/LOG4J2-3201
https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0
https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup
https://logging.apache.org/log4j/2.x/manual/migration.html
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-44228
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
https://security.netapp.com/advisory/ntap-20211210-0007/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
https://www.lunasec.io/docs/blog/log4j-zero-day/
| -| org.apache.logging.log4j:log4j-core | CVE-2020-9488 | LOW | 2.8.2 | 2.13.2 |
Expand...https://github.com/advisories/GHSA-vwqq-5vrc-xw9h
https://issues.apache.org/jira/browse/LOG4J2-2819
https://lists.apache.org/thread.html/r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4@%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-9488
https://security.netapp.com/advisory/ntap-20200504-0003/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| org.apache.logging.log4j:log4j-api | CVE-2021-44228 | CRITICAL | 2.8.2 | 2.15.0 |
Expand...http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
http://www.openwall.com/lists/oss-security/2021/12/10/1
http://www.openwall.com/lists/oss-security/2021/12/10/2
http://www.openwall.com/lists/oss-security/2021/12/10/3
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://github.com/apache/logging-log4j2/pull/608
https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126
https://github.com/tangxiaofeng7/apache-log4j-poc
https://issues.apache.org/jira/browse/LOG4J2-3198
https://issues.apache.org/jira/browse/LOG4J2-3201
https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0
https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup
https://logging.apache.org/log4j/2.x/manual/migration.html
https://logging.apache.org/log4j/2.x/security.html
https://nvd.nist.gov/vuln/detail/CVE-2021-44228
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
https://security.netapp.com/advisory/ntap-20211210-0007/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
https://www.lunasec.io/docs/blog/log4j-zero-day/
| | org.apache.poi:poi | CVE-2017-12626 | HIGH | 3.15 | 3.17 |
Expand...http://www.securityfocus.com/bid/102879
https://access.redhat.com/errata/RHSA-2018:1322
https://bz.apache.org/bugzilla/show_bug.cgi?id=52372
https://bz.apache.org/bugzilla/show_bug.cgi?id=61294
https://bz.apache.org/bugzilla/show_bug.cgi?id=61295
https://bz.apache.org/bugzilla/show_bug.cgi?id=61338
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12626
https://github.com/advisories/GHSA-523c-xh4g-mh5m
https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b@%3Cdev.poi.apache.org%3E
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-12626
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
| | org.apache.poi:poi | CVE-2019-12415 | MEDIUM | 3.15 | 4.1.1 |
Expand...https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c@%3Cuser.tika.apache.org%3E
https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007@%3Cuser.tika.apache.org%3E
https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c@%3Cuser.tika.apache.org%3E
https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-12415
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.apache.shiro:shiro-core | CVE-2020-11989 | CRITICAL | 1.4.0 | 1.5.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11989
https://github.com/advisories/GHSA-72w9-fcj5-3fcg
https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/r408fe60bc8fdfd7c74135249d646d7abadb807ebf90f6fd2b014df21@%3Cdev.geode.apache.org%3E
https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675%40%3Cuser.shiro.apache.org%3E
https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675@%3Cdev.shiro.apache.org%3E
https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675@%3Cuser.shiro.apache.org%3E
https://lists.apache.org/thread.html/rab1972d6b177f7b5c3dde9cfb0a40f03bca75f0eaf1d8311e5762cb3@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/rc8b39ea8b3ef71ddc1cd74ffc866546182683c8adecf19c263fe7ac0@%3Ccommits.shiro.apache.org%3E
https://lists.apache.org/thread.html/rcf3d8041e1232201fe5d74fc612a193e435784d64002409b448b58fe@%3Cdev.geode.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-11989
https://ubuntu.com/security/notices/USN-4740-1
https://www.openwall.com/lists/oss-security/2020/06/22/1
| diff --git a/incubator/omada-controller/4.0.27/templates/common.yaml b/incubator/omada-controller/4.0.28/templates/common.yaml similarity index 100% rename from incubator/omada-controller/4.0.27/templates/common.yaml rename to incubator/omada-controller/4.0.28/templates/common.yaml diff --git a/stable/babybuddy/5.0.15/values.yaml b/incubator/omada-controller/4.0.28/values.yaml similarity index 100% rename from stable/babybuddy/5.0.15/values.yaml rename to incubator/omada-controller/4.0.28/values.yaml diff --git a/stable/babybuddy/5.0.15/CHANGELOG.md b/stable/babybuddy/5.0.16/CHANGELOG.md similarity index 92% rename from stable/babybuddy/5.0.15/CHANGELOG.md rename to stable/babybuddy/5.0.16/CHANGELOG.md index 35dcc3cda35..530155a5efc 100644 --- a/stable/babybuddy/5.0.15/CHANGELOG.md +++ b/stable/babybuddy/5.0.16/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [babybuddy-5.0.16](https://github.com/truecharts/apps/compare/babybuddy-5.0.15...babybuddy-5.0.16) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + ### [babybuddy-5.0.15](https://github.com/truecharts/apps/compare/babybuddy-5.0.14...babybuddy-5.0.15) (2021-12-11) @@ -88,12 +97,3 @@ -### [babybuddy-5.0.7](https://github.com/truecharts/apps/compare/babybuddy-5.0.6...babybuddy-5.0.7) (2021-11-30) - -#### Chore - -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - - - - diff --git a/stable/esphome/9.0.24/CONFIG.md b/stable/babybuddy/5.0.16/CONFIG.md similarity index 100% rename from stable/esphome/9.0.24/CONFIG.md rename to stable/babybuddy/5.0.16/CONFIG.md diff --git a/stable/babybuddy/5.0.15/Chart.lock b/stable/babybuddy/5.0.16/Chart.lock similarity index 84% rename from stable/babybuddy/5.0.15/Chart.lock rename to stable/babybuddy/5.0.16/Chart.lock index cd29e98ce98..4b123b02366 100644 --- a/stable/babybuddy/5.0.15/Chart.lock +++ b/stable/babybuddy/5.0.16/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org/ version: 6.0.27 digest: sha256:ce33daddc68e9c00ecfc55e955f2611e2d440981481ede0d10be35e91b5c8f69 -generated: "2021-12-11T14:16:19.250138418Z" +generated: "2021-12-12T12:32:18.268867753Z" diff --git a/stable/babybuddy/5.0.15/Chart.yaml b/stable/babybuddy/5.0.16/Chart.yaml similarity index 98% rename from stable/babybuddy/5.0.15/Chart.yaml rename to stable/babybuddy/5.0.16/Chart.yaml index 88459ee6863..51723824e62 100644 --- a/stable/babybuddy/5.0.15/Chart.yaml +++ b/stable/babybuddy/5.0.16/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 appVersion: "1.9.2" kubeVersion: '>=1.16.0-0' -version: 5.0.15 +version: 5.0.16 name: babybuddy description: Helps caregivers track sleep, feedings, diaper changes, tummy time and more to learn about and predict baby's needs without (as much) guess work. type: application diff --git a/stable/babybuddy/5.0.15/README.md b/stable/babybuddy/5.0.16/README.md similarity index 100% rename from stable/babybuddy/5.0.15/README.md rename to stable/babybuddy/5.0.16/README.md diff --git a/stable/babybuddy/5.0.15/app-readme.md b/stable/babybuddy/5.0.16/app-readme.md similarity index 100% rename from stable/babybuddy/5.0.15/app-readme.md rename to stable/babybuddy/5.0.16/app-readme.md diff --git a/stable/esphome/9.0.24/charts/common-8.9.18.tgz b/stable/babybuddy/5.0.16/charts/common-8.9.18.tgz similarity index 100% rename from stable/esphome/9.0.24/charts/common-8.9.18.tgz rename to stable/babybuddy/5.0.16/charts/common-8.9.18.tgz diff --git a/stable/babybuddy/5.0.15/charts/postgresql-6.0.27.tgz b/stable/babybuddy/5.0.16/charts/postgresql-6.0.27.tgz similarity index 100% rename from stable/babybuddy/5.0.15/charts/postgresql-6.0.27.tgz rename to stable/babybuddy/5.0.16/charts/postgresql-6.0.27.tgz diff --git a/stable/babybuddy/5.0.15/helm-values.md b/stable/babybuddy/5.0.16/helm-values.md similarity index 95% rename from stable/babybuddy/5.0.15/helm-values.md rename to stable/babybuddy/5.0.16/helm-values.md index 6a3bfd331d0..9dd3679cea7 100644 --- a/stable/babybuddy/5.0.15/helm-values.md +++ b/stable/babybuddy/5.0.16/helm-values.md @@ -22,7 +22,7 @@ You will, however, be able to use all values referenced in the common chart here | envValueFrom.DB_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/babybuddy"` | | -| image.tag | string | `"v1.9.2@sha256:6feddf02be1a213a2f0add253b888a716bb80526e680d1a80c6e7ad89f86e3ae"` | | +| image.tag | string | `"v1.9.2@sha256:776a2f9571321b752dcd0d7dd107c5563806f0dde8689674303f7b190dc96b8c"` | | | persistence.config.enabled | bool | `true` | | | persistence.config.mountPath | string | `"/config"` | | | persistence.varrun.enabled | bool | `true` | | diff --git a/stable/babybuddy/5.0.15/ix_values.yaml b/stable/babybuddy/5.0.16/ix_values.yaml similarity index 92% rename from stable/babybuddy/5.0.15/ix_values.yaml rename to stable/babybuddy/5.0.16/ix_values.yaml index bf155604989..1e0495f29f3 100644 --- a/stable/babybuddy/5.0.15/ix_values.yaml +++ b/stable/babybuddy/5.0.16/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/babybuddy pullPolicy: IfNotPresent - tag: v1.9.2@sha256:6feddf02be1a213a2f0add253b888a716bb80526e680d1a80c6e7ad89f86e3ae + tag: v1.9.2@sha256:776a2f9571321b752dcd0d7dd107c5563806f0dde8689674303f7b190dc96b8c # See more environment variables in the babybuddy documentation # https://github.com/linuxserver/docker-babybuddy#parameters diff --git a/stable/babybuddy/5.0.15/questions.yaml b/stable/babybuddy/5.0.16/questions.yaml similarity index 100% rename from stable/babybuddy/5.0.15/questions.yaml rename to stable/babybuddy/5.0.16/questions.yaml diff --git a/stable/babybuddy/5.0.15/security.md b/stable/babybuddy/5.0.16/security.md similarity index 99% rename from stable/babybuddy/5.0.15/security.md rename to stable/babybuddy/5.0.16/security.md index bf0490d32e7..26e3ce35446 100644 --- a/stable/babybuddy/5.0.15/security.md +++ b/stable/babybuddy/5.0.16/security.md @@ -62,7 +62,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/postgresql:v14.1.0@sha256:2aa01c5c4525cfbcf1259f6bb34c5699b6744f9d3280f77e05912cc80e24184c - tccr.io/truecharts/babybuddy:v1.9.2@sha256:6feddf02be1a213a2f0add253b888a716bb80526e680d1a80c6e7ad89f86e3ae + tccr.io/truecharts/babybuddy:v1.9.2@sha256:776a2f9571321b752dcd0d7dd107c5563806f0dde8689674303f7b190dc96b8c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/postgresql:v14.1.0@sha256:2aa01c5c4525cfbcf1259f6bb34c5699b6744f9d3280f77e05912cc80e24184c diff --git a/stable/babybuddy/5.0.15/templates/common.yaml b/stable/babybuddy/5.0.16/templates/common.yaml similarity index 100% rename from stable/babybuddy/5.0.15/templates/common.yaml rename to stable/babybuddy/5.0.16/templates/common.yaml diff --git a/stable/esphome/9.0.24/values.yaml b/stable/babybuddy/5.0.16/values.yaml similarity index 100% rename from stable/esphome/9.0.24/values.yaml rename to stable/babybuddy/5.0.16/values.yaml diff --git a/stable/esphome/9.0.24/CHANGELOG.md b/stable/esphome/9.0.25/CHANGELOG.md similarity index 92% rename from stable/esphome/9.0.24/CHANGELOG.md rename to stable/esphome/9.0.25/CHANGELOG.md index d602c68c40e..bcedbae2155 100644 --- a/stable/esphome/9.0.24/CHANGELOG.md +++ b/stable/esphome/9.0.25/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [esphome-9.0.25](https://github.com/truecharts/apps/compare/esphome-9.0.24...esphome-9.0.25) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + ### [esphome-9.0.24](https://github.com/truecharts/apps/compare/esphome-9.0.23...esphome-9.0.24) (2021-12-11) @@ -88,12 +97,3 @@ #### Chore -* update non-major deps helm releases - - - - -### [esphome-9.0.14](https://github.com/truecharts/apps/compare/esphome-9.0.13...esphome-9.0.14) (2021-11-23) - -#### Chore - diff --git a/stable/freeradius/4.0.22/CONFIG.md b/stable/esphome/9.0.25/CONFIG.md similarity index 100% rename from stable/freeradius/4.0.22/CONFIG.md rename to stable/esphome/9.0.25/CONFIG.md diff --git a/stable/freeradius/4.0.22/Chart.lock b/stable/esphome/9.0.25/Chart.lock similarity index 78% rename from stable/freeradius/4.0.22/Chart.lock rename to stable/esphome/9.0.25/Chart.lock index 18e4c20300d..ab124a2d7aa 100644 --- a/stable/freeradius/4.0.22/Chart.lock +++ b/stable/esphome/9.0.25/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.18 digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c -generated: "2021-12-11T14:21:09.35205197Z" +generated: "2021-12-12T12:32:20.420331902Z" diff --git a/stable/esphome/9.0.24/Chart.yaml b/stable/esphome/9.0.25/Chart.yaml similarity index 95% rename from stable/esphome/9.0.24/Chart.yaml rename to stable/esphome/9.0.25/Chart.yaml index 00cb7e6cd0d..948bcaa5c5a 100644 --- a/stable/esphome/9.0.24/Chart.yaml +++ b/stable/esphome/9.0.25/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "2021.11.4" +appVersion: "2021.12.0" dependencies: - name: common repository: https://truecharts.org @@ -21,7 +21,7 @@ sources: - https://github.com/esphome/esphome - https://hub.docker.com/u/esphome type: application -version: 9.0.24 +version: 9.0.25 annotations: truecharts.org/catagories: | - tools diff --git a/stable/esphome/9.0.24/README.md b/stable/esphome/9.0.25/README.md similarity index 100% rename from stable/esphome/9.0.24/README.md rename to stable/esphome/9.0.25/README.md diff --git a/stable/esphome/9.0.24/app-readme.md b/stable/esphome/9.0.25/app-readme.md similarity index 100% rename from stable/esphome/9.0.24/app-readme.md rename to stable/esphome/9.0.25/app-readme.md diff --git a/stable/freeradius/4.0.22/charts/common-8.9.18.tgz b/stable/esphome/9.0.25/charts/common-8.9.18.tgz similarity index 100% rename from stable/freeradius/4.0.22/charts/common-8.9.18.tgz rename to stable/esphome/9.0.25/charts/common-8.9.18.tgz diff --git a/stable/esphome/9.0.24/helm-values.md b/stable/esphome/9.0.25/helm-values.md similarity index 90% rename from stable/esphome/9.0.24/helm-values.md rename to stable/esphome/9.0.25/helm-values.md index 2cf4cf5dd4b..c66519508f9 100644 --- a/stable/esphome/9.0.24/helm-values.md +++ b/stable/esphome/9.0.25/helm-values.md @@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here | env | object | `{}` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/esphome"` | | -| image.tag | string | `"v2021.11.4@sha256:28d0aa07a46ad2e1325a5242892b38dfe6642ba96f216387aed526ad32cde29a"` | | +| image.tag | string | `"v2021.12.0@sha256:ac5a972431f16f8fc194e80904c77862c6570498a553cd12bc5f7dbfd4f0cce9"` | | | persistence.config.enabled | bool | `true` | | | persistence.config.mountPath | string | `"/config"` | | | service.main.ports.main.port | int | `6052` | | diff --git a/stable/esphome/9.0.24/ix_values.yaml b/stable/esphome/9.0.25/ix_values.yaml similarity index 82% rename from stable/esphome/9.0.24/ix_values.yaml rename to stable/esphome/9.0.25/ix_values.yaml index 7407e0b396f..dd899ddcb8c 100644 --- a/stable/esphome/9.0.24/ix_values.yaml +++ b/stable/esphome/9.0.25/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/esphome pullPolicy: IfNotPresent - tag: v2021.11.4@sha256:28d0aa07a46ad2e1325a5242892b38dfe6642ba96f216387aed526ad32cde29a + tag: v2021.12.0@sha256:ac5a972431f16f8fc194e80904c77862c6570498a553cd12bc5f7dbfd4f0cce9 service: main: diff --git a/stable/esphome/9.0.24/questions.yaml b/stable/esphome/9.0.25/questions.yaml similarity index 100% rename from stable/esphome/9.0.24/questions.yaml rename to stable/esphome/9.0.25/questions.yaml diff --git a/stable/esphome/9.0.24/security.md b/stable/esphome/9.0.25/security.md similarity index 99% rename from stable/esphome/9.0.24/security.md rename to stable/esphome/9.0.25/security.md index 7ebb7a543ca..4f320dc4013 100644 --- a/stable/esphome/9.0.24/security.md +++ b/stable/esphome/9.0.25/security.md @@ -34,7 +34,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/esphome:v2021.11.4@sha256:28d0aa07a46ad2e1325a5242892b38dfe6642ba96f216387aed526ad32cde29a + tccr.io/truecharts/esphome:v2021.12.0@sha256:ac5a972431f16f8fc194e80904c77862c6570498a553cd12bc5f7dbfd4f0cce9 ##### Scan Results @@ -71,7 +71,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/esphome:v2021.11.4@sha256:28d0aa07a46ad2e1325a5242892b38dfe6642ba96f216387aed526ad32cde29a (debian 11.1) +#### Container: tccr.io/truecharts/esphome:v2021.12.0@sha256:ac5a972431f16f8fc194e80904c77862c6570498a553cd12bc5f7dbfd4f0cce9 (debian 11.1) **debian** diff --git a/stable/esphome/9.0.24/templates/common.yaml b/stable/esphome/9.0.25/templates/common.yaml similarity index 100% rename from stable/esphome/9.0.24/templates/common.yaml rename to stable/esphome/9.0.25/templates/common.yaml diff --git a/stable/freeradius/4.0.22/values.yaml b/stable/esphome/9.0.25/values.yaml similarity index 100% rename from stable/freeradius/4.0.22/values.yaml rename to stable/esphome/9.0.25/values.yaml diff --git a/stable/freeradius/4.0.22/CHANGELOG.md b/stable/freeradius/4.0.23/CHANGELOG.md similarity index 92% rename from stable/freeradius/4.0.22/CHANGELOG.md rename to stable/freeradius/4.0.23/CHANGELOG.md index 29fee75c845..f9ee19d35fb 100644 --- a/stable/freeradius/4.0.22/CHANGELOG.md +++ b/stable/freeradius/4.0.23/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [freeradius-4.0.23](https://github.com/truecharts/apps/compare/freeradius-4.0.22...freeradius-4.0.23) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + ### [freeradius-4.0.22](https://github.com/truecharts/apps/compare/freeradius-4.0.21...freeradius-4.0.22) (2021-12-11) @@ -88,12 +97,3 @@ ### [freeradius-4.0.14](https://github.com/truecharts/apps/compare/freeradius-4.0.13...freeradius-4.0.14) (2021-11-23) #### Chore - -* update non-major deps helm releases ([#1386](https://github.com/truecharts/apps/issues/1386)) - - - - -### [freeradius-4.0.13](https://github.com/truecharts/apps/compare/freeradius-4.0.12...freeradius-4.0.13) (2021-11-22) - -#### Chore diff --git a/stable/grafana/2.0.1/CONFIG.md b/stable/freeradius/4.0.23/CONFIG.md similarity index 100% rename from stable/grafana/2.0.1/CONFIG.md rename to stable/freeradius/4.0.23/CONFIG.md diff --git a/stable/grafana/2.0.1/Chart.lock b/stable/freeradius/4.0.23/Chart.lock similarity index 78% rename from stable/grafana/2.0.1/Chart.lock rename to stable/freeradius/4.0.23/Chart.lock index ee8fe7a9802..d36268b91db 100644 --- a/stable/grafana/2.0.1/Chart.lock +++ b/stable/freeradius/4.0.23/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.18 digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c -generated: "2021-12-11T14:21:53.378352263Z" +generated: "2021-12-12T12:32:22.731554677Z" diff --git a/stable/freeradius/4.0.22/Chart.yaml b/stable/freeradius/4.0.23/Chart.yaml similarity index 94% rename from stable/freeradius/4.0.22/Chart.yaml rename to stable/freeradius/4.0.23/Chart.yaml index f020e949a8d..94d13acbc25 100644 --- a/stable/freeradius/4.0.22/Chart.yaml +++ b/stable/freeradius/4.0.23/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "3.0.23" +appVersion: "3.0.25" dependencies: - name: common repository: https://truecharts.org @@ -21,7 +21,7 @@ sources: - https://hub.docker.com/r/freeradius/freeradius-server/ - https://freeradius.org/ type: application -version: 4.0.22 +version: 4.0.23 annotations: truecharts.org/catagories: | - auth diff --git a/stable/freeradius/4.0.22/README.md b/stable/freeradius/4.0.23/README.md similarity index 100% rename from stable/freeradius/4.0.22/README.md rename to stable/freeradius/4.0.23/README.md diff --git a/stable/freeradius/4.0.22/app-readme.md b/stable/freeradius/4.0.23/app-readme.md similarity index 100% rename from stable/freeradius/4.0.22/app-readme.md rename to stable/freeradius/4.0.23/app-readme.md diff --git a/stable/grafana/2.0.1/charts/common-8.9.18.tgz b/stable/freeradius/4.0.23/charts/common-8.9.18.tgz similarity index 100% rename from stable/grafana/2.0.1/charts/common-8.9.18.tgz rename to stable/freeradius/4.0.23/charts/common-8.9.18.tgz diff --git a/stable/freeradius/4.0.22/helm-values.md b/stable/freeradius/4.0.23/helm-values.md similarity index 94% rename from stable/freeradius/4.0.22/helm-values.md rename to stable/freeradius/4.0.23/helm-values.md index e7bfdf9904e..43a67f6ee1f 100644 --- a/stable/freeradius/4.0.22/helm-values.md +++ b/stable/freeradius/4.0.23/helm-values.md @@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here | env | object | `{}` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/freeradius"` | | -| image.tag | string | `"v3.0.23@sha256:fea3fcb694619b5bc8899adcd6f2f3384a59399867bb096f2bb9205e428fc90b"` | | +| image.tag | string | `"v3.0.25@sha256:071d2533ecfe74993de840359c939cf6fd25d4ea34322bf6211055e0e5e9d96f"` | | | persistence.config.enabled | bool | `true` | | | persistence.config.mountPath | string | `"/etc/raddb"` | | | podSecurityContext.runAsGroup | int | `0` | | diff --git a/stable/freeradius/4.0.22/ix_values.yaml b/stable/freeradius/4.0.23/ix_values.yaml similarity index 91% rename from stable/freeradius/4.0.22/ix_values.yaml rename to stable/freeradius/4.0.23/ix_values.yaml index 604e41bd9dc..503e0dcb060 100644 --- a/stable/freeradius/4.0.22/ix_values.yaml +++ b/stable/freeradius/4.0.23/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/freeradius pullPolicy: IfNotPresent - tag: v3.0.23@sha256:fea3fcb694619b5bc8899adcd6f2f3384a59399867bb096f2bb9205e428fc90b + tag: v3.0.25@sha256:071d2533ecfe74993de840359c939cf6fd25d4ea34322bf6211055e0e5e9d96f securityContext: readOnlyRootFilesystem: false diff --git a/stable/freeradius/4.0.22/questions.yaml b/stable/freeradius/4.0.23/questions.yaml similarity index 100% rename from stable/freeradius/4.0.22/questions.yaml rename to stable/freeradius/4.0.23/questions.yaml diff --git a/stable/freeradius/4.0.22/security.md b/stable/freeradius/4.0.23/security.md similarity index 81% rename from stable/freeradius/4.0.22/security.md rename to stable/freeradius/4.0.23/security.md index ea883be07b7..0d65636e1aa 100644 --- a/stable/freeradius/4.0.22/security.md +++ b/stable/freeradius/4.0.23/security.md @@ -37,7 +37,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/freeradius:v3.0.23@sha256:fea3fcb694619b5bc8899adcd6f2f3384a59399867bb096f2bb9205e428fc90b + tccr.io/truecharts/freeradius:v3.0.25@sha256:071d2533ecfe74993de840359c939cf6fd25d4ea34322bf6211055e0e5e9d96f ##### Scan Results @@ -74,7 +74,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/freeradius:v3.0.23@sha256:fea3fcb694619b5bc8899adcd6f2f3384a59399867bb096f2bb9205e428fc90b (ubuntu 18.04) +#### Container: tccr.io/truecharts/freeradius:v3.0.25@sha256:071d2533ecfe74993de840359c939cf6fd25d4ea34322bf6211055e0e5e9d96f (ubuntu 18.04) **ubuntu** @@ -114,18 +114,6 @@ hide: | libc6 | CVE-2020-6096 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| | libc6 | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| | libc6 | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| -| libcurl3-gnutls | CVE-2021-22924 | MEDIUM | 7.58.0-2ubuntu3.13 | 7.58.0-2ubuntu3.14 |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl3-gnutls | CVE-2021-22925 | MEDIUM | 7.58.0-2ubuntu3.13 | 7.58.0-2ubuntu3.14 |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl3-gnutls | CVE-2021-22946 | MEDIUM | 7.58.0-2ubuntu3.13 | 7.58.0-2ubuntu3.15 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl3-gnutls | CVE-2021-22947 | MEDIUM | 7.58.0-2ubuntu3.13 | 7.58.0-2ubuntu3.15 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl3-gnutls | CVE-2021-22898 | LOW | 7.58.0-2ubuntu3.13 | 7.58.0-2ubuntu3.14 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| -| libcurl4 | CVE-2021-22924 | MEDIUM | 7.58.0-2ubuntu3.13 | 7.58.0-2ubuntu3.14 |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl4 | CVE-2021-22925 | MEDIUM | 7.58.0-2ubuntu3.13 | 7.58.0-2ubuntu3.14 |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl4 | CVE-2021-22946 | MEDIUM | 7.58.0-2ubuntu3.13 | 7.58.0-2ubuntu3.15 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl4 | CVE-2021-22947 | MEDIUM | 7.58.0-2ubuntu3.13 | 7.58.0-2ubuntu3.15 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl4 | CVE-2021-22898 | LOW | 7.58.0-2ubuntu3.13 | 7.58.0-2ubuntu3.14 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| -| libdbi-perl | CVE-2014-10402 | MEDIUM | 1.640-1ubuntu0.2 | 1.640-1ubuntu0.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10402
https://rt.cpan.org/Public/Bug/Display.html?id=99508#txn-1911590
https://ubuntu.com/security/notices/USN-5030-1
| -| libdbi-perl | CVE-2020-14393 | LOW | 1.640-1ubuntu0.2 | 1.640-1ubuntu0.3 |
Expand...Advisory: https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643-...
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00074.html
https://bugzilla.redhat.com/show_bug.cgi?id=1877409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14393
https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/
https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643
https://ubuntu.com/security/notices/USN-5030-1
| | libgcc1 | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| | libgcrypt20 | CVE-2021-40528 | MEDIUM | 1.8.1-4ubuntu1.2 | 1.8.1-4ubuntu1.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528
https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13
https://eprint.iacr.org/2021/923
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320
https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
| | libgcrypt20 | CVE-2021-33560 | LOW | 1.8.1-4ubuntu1.2 | 1.8.1-4ubuntu1.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| @@ -163,13 +151,8 @@ hide: | libkrb5support0 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
| | liblz4-1 | CVE-2021-3520 | MEDIUM | 0.0~r131-2ubuntu3 | 0.0~r131-2ubuntu3.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1954559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520
https://github.com/lz4/lz4/pull/972
https://linux.oracle.com/cve/CVE-2021-3520.html
https://linux.oracle.com/errata/ELSA-2021-2575.html
https://security.netapp.com/advisory/ntap-20211104-0005/
https://ubuntu.com/security/notices/USN-4968-1
https://ubuntu.com/security/notices/USN-4968-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libmysqlclient20 | CVE-2021-2342 | MEDIUM | 5.7.34-0ubuntu0.18.04.1 | 5.7.35-0ubuntu0.18.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2342
https://linux.oracle.com/cve/CVE-2021-2342.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
| -| libmysqlclient20 | CVE-2021-2372 | MEDIUM | 5.7.34-0ubuntu0.18.04.1 | 5.7.35-0ubuntu0.18.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372
https://linux.oracle.com/cve/CVE-2021-2372.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-2
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
| -| libmysqlclient20 | CVE-2021-2385 | MEDIUM | 5.7.34-0ubuntu0.18.04.1 | 5.7.35-0ubuntu0.18.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2385
https://linux.oracle.com/cve/CVE-2021-2385.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
| -| libmysqlclient20 | CVE-2021-2389 | MEDIUM | 5.7.34-0ubuntu0.18.04.1 | 5.7.35-0ubuntu0.18.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389
https://linux.oracle.com/cve/CVE-2021-2389.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-2
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.zerodayinitiative.com/advisories/ZDI-21-880/
| -| libmysqlclient20 | CVE-2021-2390 | MEDIUM | 5.7.34-0ubuntu0.18.04.1 | 5.7.35-0ubuntu0.18.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2390
https://linux.oracle.com/cve/CVE-2021-2390.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.zerodayinitiative.com/advisories/ZDI-21-881/
| -| libmysqlclient20 | CVE-2021-35604 | MEDIUM | 5.7.34-0ubuntu0.18.04.1 | 5.7.36-0ubuntu0.18.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libmysqlclient20 | CVE-2021-35624 | MEDIUM | 5.7.34-0ubuntu0.18.04.1 | 5.7.36-0ubuntu0.18.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35624
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient20 | CVE-2021-35604 | MEDIUM | 5.7.35-0ubuntu0.18.04.2 | 5.7.36-0ubuntu0.18.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmysqlclient20 | CVE-2021-35624 | MEDIUM | 5.7.35-0ubuntu0.18.04.2 | 5.7.36-0ubuntu0.18.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35624
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libncurses5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| | libncurses5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| | libncursesw5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| @@ -183,16 +166,13 @@ hide: | libpcre3 | CVE-2019-20838 | LOW | 2:8.39-9 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| | libpcre3 | CVE-2020-14155 | LOW | 2:8.39-9 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| | libperl5.26 | CVE-2020-16156 | MEDIUM | 5.26.1-6ubuntu0.5 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
| -| libpq5 | CVE-2021-3449 | HIGH | 10.17-0ubuntu0.18.04.1 | 10.18-0ubuntu0.18.04.1 |
Expand...http://www.openwall.com/lists/oss-security/2021/03/27/1
http://www.openwall.com/lists/oss-security/2021/03/27/2
http://www.openwall.com/lists/oss-security/2021/03/28/3
http://www.openwall.com/lists/oss-security/2021/03/28/4
https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845
https://kc.mcafee.com/corporate/index?page=content&id=SB10356
https://linux.oracle.com/cve/CVE-2021-3449.html
https://linux.oracle.com/errata/ELSA-2021-9151.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210326-0006/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd
https://ubuntu.com/security/notices/USN-4891-1
https://ubuntu.com/security/notices/USN-5038-1
https://www.debian.org/security/2021/dsa-4875
https://www.openssl.org/news/secadv/20210325.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-05
https://www.tenable.com/security/tns-2021-06
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
| -| libpq5 | CVE-2021-23214 | MEDIUM | 10.17-0ubuntu0.18.04.1 | 10.19-0ubuntu0.18.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| -| libpq5 | CVE-2021-23222 | MEDIUM | 10.17-0ubuntu0.18.04.1 | 10.19-0ubuntu0.18.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| libpq5 | CVE-2021-23214 | MEDIUM | 10.18-0ubuntu0.18.04.1 | 10.19-0ubuntu0.18.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| libpq5 | CVE-2021-23222 | MEDIUM | 10.18-0ubuntu0.18.04.1 | 10.19-0ubuntu0.18.04.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| | libroken18-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
| | libroken18-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| | libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.22.0-1ubuntu0.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| | libsqlite3-0 | CVE-2020-9849 | LOW | 3.22.0-1ubuntu0.4 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| | libsqlite3-0 | CVE-2020-9991 | LOW | 3.22.0-1ubuntu0.4 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| -| libssl1.1 | CVE-2021-3711 | HIGH | 1.1.1-1ubuntu2.1~18.04.9 | 1.1.1-1ubuntu2.1~18.04.13 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| -| libssl1.1 | CVE-2021-3712 | MEDIUM | 1.1.1-1ubuntu2.1~18.04.9 | 1.1.1-1ubuntu2.1~18.04.13 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| | libstdc++6 | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| | libsystemd0 | CVE-2021-33910 | HIGH | 237-3ubuntu10.45 | 237-3ubuntu10.49 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
| | libsystemd0 | CVE-2020-13529 | LOW | 237-3ubuntu10.45 | 237-3ubuntu10.49 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| @@ -213,8 +193,6 @@ hide: | ncurses-base | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| | ncurses-bin | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| | ncurses-bin | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| -| openssl | CVE-2021-3711 | HIGH | 1.1.1-1ubuntu2.1~18.04.9 | 1.1.1-1ubuntu2.1~18.04.13 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| -| openssl | CVE-2021-3712 | MEDIUM | 1.1.1-1ubuntu2.1~18.04.9 | 1.1.1-1ubuntu2.1~18.04.13 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| | passwd | CVE-2013-4235 | LOW | 1:4.5-1ubuntu2 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | passwd | CVE-2018-7169 | LOW | 1:4.5-1ubuntu2 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| | perl | CVE-2020-16156 | MEDIUM | 5.26.1-6ubuntu0.5 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
| diff --git a/stable/freeradius/4.0.22/templates/common.yaml b/stable/freeradius/4.0.23/templates/common.yaml similarity index 100% rename from stable/freeradius/4.0.22/templates/common.yaml rename to stable/freeradius/4.0.23/templates/common.yaml diff --git a/stable/grafana/2.0.1/values.yaml b/stable/freeradius/4.0.23/values.yaml similarity index 100% rename from stable/grafana/2.0.1/values.yaml rename to stable/freeradius/4.0.23/values.yaml diff --git a/stable/grafana/2.0.1/CHANGELOG.md b/stable/grafana/2.0.2/CHANGELOG.md similarity index 92% rename from stable/grafana/2.0.1/CHANGELOG.md rename to stable/grafana/2.0.2/CHANGELOG.md index 4acc5b68b33..7d351c70b98 100644 --- a/stable/grafana/2.0.1/CHANGELOG.md +++ b/stable/grafana/2.0.2/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [grafana-2.0.2](https://github.com/truecharts/apps/compare/grafana-2.0.1...grafana-2.0.2) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + ### [grafana-2.0.1](https://github.com/truecharts/apps/compare/grafana-2.0.0...grafana-2.0.1) (2021-12-11) @@ -88,12 +97,3 @@ -### [grafana-1.0.8](https://github.com/truecharts/apps/compare/grafana-1.0.7...grafana-1.0.8) (2021-12-05) - -#### Chore - -* update non-major ([#1466](https://github.com/truecharts/apps/issues/1466)) - - - - diff --git a/stable/littlelink/4.0.31/CONFIG.md b/stable/grafana/2.0.2/CONFIG.md similarity index 100% rename from stable/littlelink/4.0.31/CONFIG.md rename to stable/grafana/2.0.2/CONFIG.md diff --git a/stable/grafana/2.0.2/Chart.lock b/stable/grafana/2.0.2/Chart.lock new file mode 100644 index 00000000000..fa681506b8d --- /dev/null +++ b/stable/grafana/2.0.2/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.18 +digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c +generated: "2021-12-12T12:32:31.450017716Z" diff --git a/stable/grafana/2.0.1/Chart.yaml b/stable/grafana/2.0.2/Chart.yaml similarity index 98% rename from stable/grafana/2.0.1/Chart.yaml rename to stable/grafana/2.0.2/Chart.yaml index 5fc3893bbc2..0feea997af6 100644 --- a/stable/grafana/2.0.1/Chart.yaml +++ b/stable/grafana/2.0.2/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/bitnami/bitnami-docker-grafana - https://grafana.com/ type: application -version: 2.0.1 +version: 2.0.2 annotations: truecharts.org/catagories: | - metrics diff --git a/stable/grafana/2.0.1/README.md b/stable/grafana/2.0.2/README.md similarity index 100% rename from stable/grafana/2.0.1/README.md rename to stable/grafana/2.0.2/README.md diff --git a/stable/grafana/2.0.1/app-readme.md b/stable/grafana/2.0.2/app-readme.md similarity index 100% rename from stable/grafana/2.0.1/app-readme.md rename to stable/grafana/2.0.2/app-readme.md diff --git a/stable/littlelink/4.0.31/charts/common-8.9.18.tgz b/stable/grafana/2.0.2/charts/common-8.9.18.tgz similarity index 100% rename from stable/littlelink/4.0.31/charts/common-8.9.18.tgz rename to stable/grafana/2.0.2/charts/common-8.9.18.tgz diff --git a/stable/grafana/2.0.1/helm-values.md b/stable/grafana/2.0.2/helm-values.md similarity index 95% rename from stable/grafana/2.0.1/helm-values.md rename to stable/grafana/2.0.2/helm-values.md index 8c5e788974a..a639acf462c 100644 --- a/stable/grafana/2.0.1/helm-values.md +++ b/stable/grafana/2.0.2/helm-values.md @@ -22,7 +22,7 @@ You will, however, be able to use all values referenced in the common chart here | env.GF_PATHS_PROVISIONING | string | `"/opt/bitnami/grafana/conf/provisioning"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/grafana"` | | -| image.tag | string | `"v8.3.2@sha256:5b321a612dd2a2b019898bdfa459e79a88a8b3ac985a723e5e144922f2aead48"` | | +| image.tag | string | `"v8.3.2@sha256:6c42cc401f25eae4c6577510b0c3d92c42a03836941256b2839d8b4ebea0bb75"` | | | metrics.enabled | bool | See values.yaml | Enable and configure a Prometheus serviceMonitor for the chart under this key. | | metrics.prometheusRule | object | See values.yaml | Enable and configure Prometheus Rules for the chart under this key. | | metrics.prometheusRule.rules | list | See prometheusrules.yaml | Configure additionial rules for the chart under this key. | diff --git a/stable/grafana/2.0.1/ix_values.yaml b/stable/grafana/2.0.2/ix_values.yaml similarity index 95% rename from stable/grafana/2.0.1/ix_values.yaml rename to stable/grafana/2.0.2/ix_values.yaml index ae94c98306a..62649d7cfb1 100644 --- a/stable/grafana/2.0.1/ix_values.yaml +++ b/stable/grafana/2.0.2/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/grafana pullPolicy: IfNotPresent - tag: v8.3.2@sha256:5b321a612dd2a2b019898bdfa459e79a88a8b3ac985a723e5e144922f2aead48 + tag: v8.3.2@sha256:6c42cc401f25eae4c6577510b0c3d92c42a03836941256b2839d8b4ebea0bb75 securityContext: readOnlyRootFilesystem: false diff --git a/stable/grafana/2.0.1/questions.yaml b/stable/grafana/2.0.2/questions.yaml similarity index 100% rename from stable/grafana/2.0.1/questions.yaml rename to stable/grafana/2.0.2/questions.yaml diff --git a/stable/grafana/2.0.1/security.md b/stable/grafana/2.0.2/security.md similarity index 99% rename from stable/grafana/2.0.1/security.md rename to stable/grafana/2.0.2/security.md index 4771f4c6b0c..312b3c2ef63 100644 --- a/stable/grafana/2.0.1/security.md +++ b/stable/grafana/2.0.2/security.md @@ -35,7 +35,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/grafana:v8.3.2@sha256:5b321a612dd2a2b019898bdfa459e79a88a8b3ac985a723e5e144922f2aead48 + tccr.io/truecharts/grafana:v8.3.2@sha256:6c42cc401f25eae4c6577510b0c3d92c42a03836941256b2839d8b4ebea0bb75 ##### Scan Results @@ -72,7 +72,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/grafana:v8.3.2@sha256:5b321a612dd2a2b019898bdfa459e79a88a8b3ac985a723e5e144922f2aead48 (debian 10.11) +#### Container: tccr.io/truecharts/grafana:v8.3.2@sha256:6c42cc401f25eae4c6577510b0c3d92c42a03836941256b2839d8b4ebea0bb75 (debian 10.11) **debian** diff --git a/stable/grafana/2.0.1/templates/common.yaml b/stable/grafana/2.0.2/templates/common.yaml similarity index 100% rename from stable/grafana/2.0.1/templates/common.yaml rename to stable/grafana/2.0.2/templates/common.yaml diff --git a/stable/grafana/2.0.1/templates/prometheusrules.yaml b/stable/grafana/2.0.2/templates/prometheusrules.yaml similarity index 100% rename from stable/grafana/2.0.1/templates/prometheusrules.yaml rename to stable/grafana/2.0.2/templates/prometheusrules.yaml diff --git a/stable/grafana/2.0.1/templates/servicemonitor.yaml b/stable/grafana/2.0.2/templates/servicemonitor.yaml similarity index 100% rename from stable/grafana/2.0.1/templates/servicemonitor.yaml rename to stable/grafana/2.0.2/templates/servicemonitor.yaml diff --git a/stable/littlelink/4.0.31/values.yaml b/stable/grafana/2.0.2/values.yaml similarity index 100% rename from stable/littlelink/4.0.31/values.yaml rename to stable/grafana/2.0.2/values.yaml diff --git a/stable/home-assistant/12.0.14/CHANGELOG.md b/stable/home-assistant/12.0.14/CHANGELOG.md new file mode 100644 index 00000000000..5647a3f71b8 --- /dev/null +++ b/stable/home-assistant/12.0.14/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [home-assistant-12.0.14](https://github.com/truecharts/apps/compare/home-assistant-12.0.13...home-assistant-12.0.14) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + + +### [home-assistant-12.0.13](https://github.com/truecharts/apps/compare/home-assistant-12.0.12...home-assistant-12.0.13) (2021-12-11) + +#### Chore + +* update general helm non-major helm releases ([#1509](https://github.com/truecharts/apps/issues/1509)) + + + + +### [home-assistant-12.0.12](https://github.com/truecharts/apps/compare/home-assistant-12.0.11...home-assistant-12.0.12) (2021-12-11) + +#### Chore + +* update non-major docker ([#1507](https://github.com/truecharts/apps/issues/1507)) + + + + +### [home-assistant-12.0.11](https://github.com/truecharts/apps/compare/home-assistant-12.0.10...home-assistant-12.0.11) (2021-12-07) + +#### Chore + +* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) + + + + +### home-assistant-12.0.10 (2021-12-05) + +#### Chore + +* bump apps to generate security page +* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) +* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) +* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) +* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) +* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) + +#### Fix + +* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) + + + + +### [home-assistant-12.0.9](https://github.com/truecharts/apps/compare/home-assistant-12.0.8...home-assistant-12.0.9) (2021-12-05) + +#### Chore + +* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) + + + + +### [home-assistant-12.0.8](https://github.com/truecharts/apps/compare/home-assistant-12.0.7...home-assistant-12.0.8) (2021-12-04) + +#### Chore + +* bump apps to generate security page + + + + +### [home-assistant-12.0.7](https://github.com/truecharts/apps/compare/home-assistant-12.0.6...home-assistant-12.0.7) (2021-12-04) + +#### Chore + +* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) +* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) + + + + +### [home-assistant-12.0.6](https://github.com/truecharts/apps/compare/home-assistant-12.0.5...home-assistant-12.0.6) (2021-11-30) + +#### Chore + +* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) + + + + +### [home-assistant-12.0.5](https://github.com/truecharts/apps/compare/home-assistant-12.0.4...home-assistant-12.0.5) (2021-11-23) + +#### Chore + diff --git a/stable/ombi/9.0.21/CONFIG.md b/stable/home-assistant/12.0.14/CONFIG.md similarity index 100% rename from stable/ombi/9.0.21/CONFIG.md rename to stable/home-assistant/12.0.14/CONFIG.md diff --git a/stable/home-assistant/12.0.14/Chart.lock b/stable/home-assistant/12.0.14/Chart.lock new file mode 100644 index 00000000000..9fecc54be9a --- /dev/null +++ b/stable/home-assistant/12.0.14/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.18 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.27 +digest: sha256:ce33daddc68e9c00ecfc55e955f2611e2d440981481ede0d10be35e91b5c8f69 +generated: "2021-12-12T12:32:48.877745048Z" diff --git a/stable/home-assistant/12.0.14/Chart.yaml b/stable/home-assistant/12.0.14/Chart.yaml new file mode 100644 index 00000000000..4c56472e4f7 --- /dev/null +++ b/stable/home-assistant/12.0.14/Chart.yaml @@ -0,0 +1,34 @@ +apiVersion: v2 +appVersion: "2021.12.0" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.18 +- condition: postgresql.enabled + name: postgresql + repository: https://truecharts.org/ + version: 6.0.27 +deprecated: false +description: home-assistant App for TrueNAS SCALE +home: https://github.com/truecharts/apps/tree/master/charts/stable/home-assistant +icon: https://upload.wikimedia.org/wikipedia/commons/thumb/6/6e/Home_Assistant_Logo.svg/519px-Home_Assistant_Logo.svg.png +keywords: +- home-assistant +- hass +- homeassistant +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: home-assistant +sources: +- https://github.com/home-assistant/home-assistant +- https://github.com/cdr/code-server +type: application +version: 12.0.14 +annotations: + truecharts.org/catagories: | + - home-automation + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/home-assistant/12.0.14/README.md b/stable/home-assistant/12.0.14/README.md new file mode 100644 index 00000000000..92b319eb0a1 --- /dev/null +++ b/stable/home-assistant/12.0.14/README.md @@ -0,0 +1,39 @@ +# Introduction + +home-assistant App for TrueNAS SCALE + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | postgresql | 6.0.27 | +| https://truecharts.org | common | 8.9.18 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/home-assistant/12.0.14/app-readme.md b/stable/home-assistant/12.0.14/app-readme.md new file mode 100644 index 00000000000..3f7d1730309 --- /dev/null +++ b/stable/home-assistant/12.0.14/app-readme.md @@ -0,0 +1,3 @@ +home-assistant App for TrueNAS SCALE + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/ombi/9.0.21/charts/common-8.9.18.tgz b/stable/home-assistant/12.0.14/charts/common-8.9.18.tgz similarity index 100% rename from stable/ombi/9.0.21/charts/common-8.9.18.tgz rename to stable/home-assistant/12.0.14/charts/common-8.9.18.tgz diff --git a/stable/home-assistant/12.0.14/charts/postgresql-6.0.27.tgz b/stable/home-assistant/12.0.14/charts/postgresql-6.0.27.tgz new file mode 100644 index 0000000000000000000000000000000000000000..5310f921e4f5d793772fe740c25c85a3ab022b98 GIT binary patch literal 72082 zcmYg%18`jNQn`(Au#~5+?qf*)esKJGJ?nFn%B7()Nh; zwh`wwGPynAe0^{+j^<k->IJ`lAqJ|x(NkF@0O0T1(IGEnBv5Xg=1_<=*P2EDtfC>f zt}VJOFtC_Z0{zhtX8VVQ78ybtnje|y7;eFB_>DoAoyKMFI!AgqoU~GQ6HA(N3oN5J(g97zq z2q?3WVvd#BX0VAg*inZON|jZgb`<_eGPy{LU@@qo0&ajyw6qE!fV4{D#LDbJ5AV51 zN=SN-IPkpA8Pwq+-P}hMzlvb=_6yY=+4nI!6vcsqG*A5ZbYnIc-FreKW7dP7nDHP? z7v(5(IT#B;oS#WF(OZALO~xD?l4I|T7MYWvp|h*4IL>a>BGQRdO-Kuwu{0sdh-#9| zz5LjY@ATWbqv)m`TgXlQGMqP>`$2c*jx0Se^uT5iWyMqM znUhk~Z66mQeb5AV2*fw)GJr9nXfG%7Bs?U#Tuvna=<$Y*xWI?vyL%!hfRh<*Qvb|7 zjNdsj+`jHWi8)IU^;^z!9YrxEBpC(lqeVz~FSqs|I7bYwnVV9;oBl(lTUw7{6bT7C zoT}^QV&tjPo{stPpbc6Hyk1!^{zASxrz1;LL}rMbPwS00;~P#nHLNyyp11q)$DQ*C z>6|V~@*17FF*^|oQJ15P7+>?!f}sL{TB;Y#e;WVFsez>EO`Z{soPf3a)pAYFGeC`i}Bp{dP?vhv4RISK_R>o?=E)Oh&&X>&RH&<@ZQ5+jCf~P zd+Ozd_s-0fv5@=_jcy)(k}vl%J+qUagIhuzgE4CD_ub@I2@DZZVJZO4&b%X1v@Lg$2wRzDZdFbv-EU)WcoX@$b?2M;;xKFTXD~z~ zKD>>(K@IkBe?ML=mk=0j}T@uQCWUg&G2itzDc zh!B7Jq!LX;)($Gbsa^f1J_7`Op`TQ#j)n|;(q{CSb0<%y?U4cG1@9Za!ULd=`o6s* zW|Uyy;%aec){maoKKz1%=VAs|`x&=$#eioqm%(5`Te}ef)z^4`&;!=V0i-qGQ5$Pg(T)CTPz?h{e=DllkH- z&fx8s74nTV!1L3Re2I;H^~mk}zKXN)r|;jvjX9&ePv3c(SoH@^eTT`&in%^7?$h_o zktppUpgB1$jXv=uJ3(XQ)R|y7{$r|8xIeMt*rxK=LtxzG=jdZn!V~M)&%3(n?cw=) zbi0|_+rd{tOQ{9OSlCY>Z#I1gwqXI%Drq~vi!+;(=88}#Kz#aIFIuL!hHE)v6)-Tk_*zVJ`xi-*;BjFHl?Wv(Ino6@N6OUG*;@t8>=`sO&u9PLkB{RFsjZmYieYx!&-80F z+zyi&8@^g#8O>hFV?{7IAJS;6o4(_`Wzv3WB6q-qeLeV_yoJ<3CvT;ozkZDzt7JsC zsrM+JZ-$V-N7S#yNo{53QaYL+SWwN9ad+wfTYYi*OXrNSY_A=;?aGZAM}wKZ1q>~? zyKz1nr(}>3qSa@0$}0-Ur1dA#9;7VpW1!#V+&eny#09%bosLI5Z~(NOg!?ZO&*+sP z=Jj7ggD}cJM(r0?p?mk~rj1k1hJS%U2#rMB+MWDm@AU6p)13UZZqT)wrs0WjAW8Ol zvML9?fduwKZQHxrxC`Yl*r_R^gg!vwVH{engC)CT3PoD(wS?Ou>^}@(-8atv&K?PU z>(%0xX7;=6L^D=l6HLeVI&?eRGaiXXwQQF~IHrE2xggOEzbMv>N>7b1rwd4%VXVb_ z>uVhTb7JQpyy*FA(;du%r2Ux^%7~u-#^bAlI$?u7;?q!lozCA(xaPw;WwzRwcCrT- z?N;J^zMvFf44fghzVjN{x{6J4PoJG=*`bV9l(}aRIV^P9-7rEL;PX<1(3{W9$EYN8 zH0vyUeMhB^j%|9dpP_WY0GGR#Y`XmYZrwMCjh>Gx(@hl5)i5%7U@);jk&S2X6Mg9< z0A|p{*OwJCro~hmg^waS4X0uv9*Fs-?sw!p_l>RGoO1nQyE43b2pFT%+5m(Lf6oN_ z;5n9a#7Ult>Rg_5cDE|;JBsbMr5(t&0cEdv2o>F(BDyoW646ckj%~A$(n-&5>*<^N z<9XzfeAAxL#^GiMfxhdZ^@{7ge2RFI2-#TDHX)cGsliyI&47ykR6^3RY1eV6|> zcR7HB7C8esviVsiPCFf4uw#0#v0uF&w>a{^if_JWew+&x9+4-yKHdE>5=2>6jD56*o1ef?ntu?!a4|}pCT55fKhCiuX;U8qx;MQ)_HSPg zhdj(|o8#Y~=qC^)t1j>>guh?@6Pgd@OWBAEc|V4J{}{1id$ z__<>7_%{Dq-p~9ISf+AWf3)2Mh^pCf4<5aN*AVZn(PwX_qAw+@GblXY5mL*0@Fh*0 z3nFQ)5~E8pS&>6Lzyo56%VGozc@z>7WYbqNc`+9sg{zN(*PS5UUhsSbeBR9+^JgQz z(^(k?b|*|$cbd;7lLC8;ZY_4_ruC)L*y>ULYG8}! z>>q~HW^*u*qkD8=?_wf~8O`H+PzJhx$V~5X*>CJ21GSwHMGl1Zk`g@045QIsUyUv{ zN)wSZbCI98;$0MwlAL}xNOo(t9hkl&nRI=6NF|cdaEZp&34sOY8yt?`&^!> zquA%yoK7m@mcs3I0%DZ1==07e4;1ijT~nC11+ixUn- z82ZV7+)M|!9KpRKnH7kpcaya&>#r)5*_{;Foo3As73eWJEm-bttN;DZ;NcRIDGyfnL%RA@a^7!50vZ%diUg}3;|TbI7`OZpS< z&+`N!Gj>^c<6hg zKPy_zE-Rd}b?FPB(m7-ltVQ0~Y4TeIidzNQW2KdX14)9#{RN5J2c}DzVs+`3pwcqL z5YaB`9Z#e|+iL|C7cjW16SI`{&IA;2#X{PQ-k|b-+@gHxIvyrf80`HhUDd?ti;G3> z&SAwGY%0`hC>5<+S{_(Qt(3m9Di?aXQ|u$JRikYLsEwHI*xVd#v*ftzoxCrM1r(3qo1OJ6cl5ui~8_~Ve zUrf|1U*@uA^^6%eL;pj}OEQ_6!I{jkH8fQ_e@8|Wj3BPaL>yX2c_Okn1_RksW-HUO zq{6BsrZ6P2*2qV!o0$ru?^uGmx2a^F{H)9#QJFcM_k;y&XM;!5DJ;$xt)aQVPWU;l|8r8(}(0pyi*obv3gBJVyxB# z;u4X~aQ2)^+C49 zGGn0dZ*4K!^2*81M?-o!O41xEEe{9YmNX`iaKC*`8a*-Eu7uUqn1|*ChFJ!41Q~az z22adk95xM};f}sMNgApzOLEEw?R_yyyJxv}l3g_RSJPLmN(Gh19ikSOw4p^!I;(gJ zhujS5YM19BvjjcsghG2VO!U*eFjfsymvVUTDVlZ@Gt?`))x~RYT73ioc_}cw2PWfu zXC7w8Tcg^RL&}h%e`c&VHM1LGu(J4`17Q`KR}Mv# zr5z<<|5p11d($y(cy{zRrHxwD9*m_frE=SKf(23~ovcryW>1h_zGM(lQTv_%*Fn0l z%m%^A70rqMSNk9zUDk*!n=-Y&SLYR2$)XKCgOat!?8Gq*Bj-^XkHqgyJ7G*pR_yVZ z+AQD~COm1Ik;4;57K+z>w`g?29Iq6pmc7v4Bs9zBFE#FLGo>{4rR4Rf*Q1|sPg ziF%iSEA!?>CsS!`HMd;O^%*SP6JV>s;3w-Zw?Ye7X4-Op zT|O{ufn3~`aAwnG8{%n|Tmys=g=vpjr8VgSjA2bK)Ss=?Ag>ueuVi9tj4u(|M>Ud~ zQKttulJ&CA&J9il@BL;0#4SM6$!HZO<~$>1V^I&Oh6psqdFvQWqZ? z^YhcxyK`Pib3DusA3nvCQuA5hBw8Xv=!_k!C-e7+Hj6en6WO+Byf~urJys{QSL>#= zJy+pmV`vt*CzT?Fi{`>ARM|rYnkZ@xcJ(W2DvzRZB#4>Wu;uC>Iw&86c?rJg;)-4t ztdXmcOJD;IgL_7U#&+5ao=XfY%<1ZNVtSIS6O!kRIU;GYJ=4mw0p)8;pEMjeNt34r z%wbV*BahwVGI)QQ7hn{UPxNg3q!~&NEYLz+w)4H+S2j_?(e75Oo9%K&;cw>Af!9g% zh!mX7q^qT$(Y;AOqDjZT_njK}cMS)^!`_4!T!SJU_Fp#jkUoB{C&=8k zIz@?Ek(1Yqpnq3hVf<3HyMF-s^8B`mu9eOga@9jAGtzG8S$C4V2=$K~ff(EhYBqT?PoNBZGnUoNL znD8uZ8htYoBemg9n*^QUHjiq>IcDop?p!1>f^AEXaTq;rdw5eW#F89Vbn^)0i!CSVzNOp}A5QL{)?}HMux?fS zty((Aw5xmv#>vNirzT;VOHCWv(jb_vdYl~59k&-jI^r;RWXw@OQ`#`BRfQ?6>Y;k+ z8Y4!-DMn0(UkuDsy{Y(T4uQZso%W~#MD4`GEMA->hUtT))iCt339b=f?zf-2?~&z3 z-I~+uGFV)gfak|R-j9JPioc~DR6NwrTwg!2@Iy?O?+p->#6i8|S!GK6 zT_kJ&m&)o#C`+7{Q}!cVU^x)xI!#*#vQ>CVg#`YYN`u8ngXz3pXb4Nfnks>+Rxb+T zHJoO}b@)yjGn=?(%0J?|HJs9Z@Wg-cN6iOWN1Gqd56){$Y~Wg`NlrD$PmU7-|mCX) z7AY9wL$q-Gx{TL|5m26H;kg9W$~y<2FWc41#om_gOX1kd1>cX_MY|AyaunQ+|L9f)L+7{!WjzCCN5cDU`ld$ClD}}p^4J2f$oj0iD=js&3)rKhY z1|om42JM>010p-4#2ED&w20c}+W2!3>_zf9@S1YF0;3|>BUB%yZp)Zpf(^u@A`X`> z$t{S=9k+NI_@>$?MaBtZOVEc_U(Bf~-RZlc41?$gTe>LUhmN+5?zX+~o;f$VfZBlh z?wZt0R1Uo>Q=y8vT)7Ij_UMiVKXjZPGMvsEi|$976OlJiv+`3I{yZ~mMwg!65~;j< zs7^a6+0KMYI&`?}dZbo+--Q8*%I~_19Z0;2baAP4pa@Nk}+?OdF!zmm!-IodF?oWoQ{<8Jvo{M#&m76-enNl&wt*Zi2eGLoU6~xyu9PZ|3zX zAz#U@Gx05cZ{Er8y$+?{^dglkivXX5nd0hI`y|rOoVu-V3RIlSLUEb2GUSgOe0j+X zJ%2|NXLrAT&k&7Fp^~dMk8=?kc$4j{wf&yfoS!W`dP%0mq?53u8;_ejL@?*Q z5t7%c>y2BRKGI0nu_iB-T@nY{8t##hC1K>S9|xk@s&pN7mod-@%I;r?t^$HYAkuAF z@7>JV@!#$4!MN$BT4rVS`HXv`#_iy4NXp0|v9Vj(XCj+}GagBqAUMzWFjPj4wa7z@ z0uu<19^1jmMUybd!_I*ka+A7vvAtotG}VB{f$m`TaQNQu#E5_E@95$0{_yvnA}gAw z+L4)g-279=18o-sFsrSWcSziB*bnXc%7)}dy!>+`&up>glG^ zPwpz8cf3aRnA4BPVdT74l{jh!a#)l|gNL&4T9W-fU>8n4A zA7c+SHEf(>#L)e|E770~R1ckxQ!-X$rU8uvxtwI#=%03k(}AP(qkHuuH(-IcCX=UK zk2zFQja@aIg>I)a*SRXG`~-B7E0DbM#OlR}Gr46{^|NnT>(L!gaBs;0b#}yikmlTm zDDmPv?$c>Rd*5%{?QWF}{Frx}-$5n6$eF%owVGPy@rRQm5%fjN(dl>e2MNK7be%Fj z$hFCE(NU`Q+fO<+Gnq4o5#7azkhT$`589(C_n_`6r5CY%;?wejzRQWyXPhuwtw3#N z0Z<6)PrV_#3V;tmK9%BnH*VPUKS1v^hii2pU zymu1f`81xxY=F`&6HyqpG@?#`AXs+E!pa6E8{7SjVc1f&TlKzOd&D&pmGy6q_8~8GuFp=2EQJ zoBmVZ3Y_#3iD<_R&02zn?zSdE`A=$*^R;2kiCpFL`r~+4B5lIe0)m8NJ6ZM3d zTXVYLYT-N&=vLRvKJ0q>K)M&iA;P$^L%YcHTv8NnPy92PNx}B&cSd&cyG{5C!JHk$ zTVE`7+S);8qp%RACk|~J`T5uLc>&D4hfCd@WF--DJm%d|u2+z!4DNp>$KEKSdQ!=B zF?Uq(`!19y!}=MJs>S63#vPS7)`;o`dTaY`SkX`N<;nPTQ*=@SnyN4KIeQ;;qkhi0`uol^@_PNcpjCM4SP%aA znpHj7(*G^+?W&mGZf~zSb$JBLcf9|vhKl10T}{ZV`}EO2T|M{vrs?ugY}jQ_jG4?w znpnSPOZU`w&Z-9VQ>l~qqXs`ejD$$93kn(S>jGrb#45~qg#MiYny;29^3DYF9lW9V z3xF!in3Sp;!Wd9yBgK>?yTM=^VX~zLBb*|mIp->@NIJGmi)i^zO%=ohmuO)TNDyg} z#CdM#o$V~+O1H-#y?U~gg94~TxB@$}CHP+!sRmre+T*5k zHB&c1b9X;O#CQUuTxpGJR-$}Stj=@m+4LFWLb9H-6`bGewb~!*8*pE-P5Z2P10dD} zse0NWRm6P;;2l0ha7(#f|GmVkJ#C%y!Mcp&i2Jz|K2?Bho}jZH{vn;)9;a({?acl2 zemjexZozq<8U?qV3AfZsv?+s+@k;NnzRZgya*{H4P4qZVwrm~IjKnnJm&KVP+NT#c zFnmCcIARGiE|NcijdA;xm(4Qzkb-XneI$$x3v z(f3aH2m-kp{Lw_SH8L^IL%|nS20SaLU_4a3kJU?Wi`EZ0{hc@{W~t`U%O%&e;e(18 zqdO{r%du~qqFx!HAxe8UGB?lO` zoEoH7)BGaRC&wWqG*8G((l<2Q@=SHBo$m~UKfsP*7ylOX?SLv2aJeU8Bk3-6afIGW zEQVRCU}a|gQlH5Uu71)qoseZ7zT59O1KE&E+~0lhm<+Bhqgsbnub)C#!A~5)Fym04C!l6c#>7I4dz%Ka8c;~uwfBuBqp#9!0Nlmdqev2 z7E};_+syWlHZRFKFBNUnplIZ#4xZWBTpy<(XLY~lPLvAtPRN? z9yE$d)i^qcWN9xcGi2>Iq2?Fwk(!&w>yN{GX3aERcaWM9{X^0ob*o?>p)2?2HqefA zdfLM59N3k|WtLsbK)M}RW>FxL={@qEY%of?*V;uodM-|$)4-G(5t?=9Bd2H7dqZ0vi|0;F&oD@Oiq z`L-PBVxqVGQa)%+b=jFrrUtIQyISU#M&^Dr-g(@L6_`-&>Q|;NtVR@Hm;sk|`D#>v zLjNe2{Zqj#xWex&eR(uAWGS4n^du{ot*F-YNwMguT-QK{{cGlLo%Q|-zTp3sYV8uS8fK#;6)PIt19FpWKfZ8uZ9OREQ$44t|29D zv>w9MYHg^yJa*tz^vx( zL{~1+RMGAU30+%?R__4p*FGEd(PN{X2j^OS^a$YFL=u%Ah2_hdUV^^G%_m;dK&N?6 z>2q@jTT^Z0sEpAtPtW^T=GoGs?4(Vz)q{toc-nb?EZ1M1R@C1tPsJR>-T!jMf~EN1 zX7%0`C(+mWw_nWHQjeCCYliGrXwTahx}OhMBbRgU8gyq(M>e9zNKDM_uQWJo!L@;%*Rn)uq_^ee2IsYluoA9l zP_L&-aeZd4Jl*e7YFi&;ba;mFI%l_K;EO{*^_>fEI>6cf0>1oOerKrhcCXVTZ^#y< zHA5_C3W~pQgjO(6qx}iSZp2htb|4gl^6?8J9?@}KQ71j6j4My2=eDmqqiw{23CCn6 z^wM5=qGW86Go9_gywiaXT})Hk+=Z@_7NQ|} zueqFKoIXJV)B|;Od7Z_H3{Q+)UT#laArBogL)Zp3y0YiHSCl7}6&-s$1FpLvqBS*X zTmOz8I2weZsb#zMg)kgDK`}u}wYO;6gkz@}k2#Ab{(F(djJ%E*NvZll3)W*Vp9LAV zN)FK9uHJOcSch{`DOeYtT3irpV84G_;1Kk-9sWz|x3PNM;5I`{?i)xk@IlEkUlkJZV}SYX1EuL+1_wBmqGJ&IMR%R zP2J{;N%(I@y&~*b&D6~MGIX`~HEj>|TD#V8S}RqC)k9TN8VrYy*)Q^(C{XQ@e{|DZ0^kb>Kkr0b*{u*s*T3Grff`*b8p&^S3>MNJ$B7&3 zYnN-Al^r(n%cXoDD@tB5#&`r}f403HJ6o}7U~pyu*Qx^I@+P58-o5B`nshED!6STv zPEa!kbmqpCi@km%H<7~ez(P@xKBgV{z}#qfXb^{R=E>*rYuzEt!&0sHcjvx7JoOm{t-#`S~Kx%8mCeLsPAzw}r^i+l zyA8yfmYN?ORNyCGhWJUWf|(8)rBia*2q$GgcFIM3^g#gnz8FdYv-Z)SJpd1qbANtr z9==U({==Q?Zq7sWhZtUI<9`na{jfj{h6+S$@ZKXMXThuT{u;caYB)O?aeTJl!3hs_ zgxvoBs4t#=*jbUu`U7b2IGp6#bemnod}YHjm0M9N4=J!4545*Q;}ul5?|Ro1eu!86 zN8M_~So>Ud^o9KT4WlwRN7_BE4qySD*@lXvu4qo;1!FhbGCq+tee=kX>jne% zZYKJ`@6Y4g-P3#7gR|*v>p4PMeU>WBv}?S>T5+vAy5}?aGhfXg-ZgsKIG-4=lX``e zBMN;k$znlgMDh~-{N^S5KylmS%I0{Tz&PJ?Tsv#&?4r1F_I`oWB8edG*en*|b=imO z{tb*I@s@&Qk&VsRh<4_Tmf(`3n9z!=m~eeKW;)a}s|V*m@*UhgQ)o(04apVZSp2ex zjku~m$lhmUTxxeNvwJ&|nLL0rv}6Q$KFYIQWDh4E`WSsVw*8kIqVZv4XA$vqq-N}% zi=E*E*96v-{nxb5dlNqSIQq(qO!#5I&$OE(7`UcOPI;=Xi1DTgd5Nmw+&f`9hJ*Au z`HGA;wF5Lm5t&t!TDICjmoi+0ZzuW)4_yinTB~irL>pyq7AV
8%Z9HQzBBJBLj zOtQM4nY-;4dO63=BdyWnYUPAF_nWZY&^--3s8P|2ecAT(@CAKDc|RoQB760ShP-3i zZoA0N%qutfV92n)?C523Fv{3QZ=recdcWuwg-#Lbfu=zJP-u~;*Jr|$^dCa;oXB)e zJQS9yBmr*#7FOvz5A{}a2fT1i{a*peBInQ^TW>iedC9YLzs17Kj=_>)X&J1v)z;=g zywL~DwB;LP%d<88lR=g*&3|A$7a4Gor#e#hXJ@;6H;U9YNc)*7IU_z zBO#i$&QLwIFMXoW%w!tc+4~i|X&mpt( zm)<4Z@Qy*6H(aXN{k_RA zHsw1rp=C4MnKKLo=PpAzKm7$4-sYG5oiF)y)aPm}fliJyP1DN^8HrKZ)n>Cb$SK>J zKz@ZX5UWebA}D!>6t&DrGqb#RcL5`zF)gnqiK^(S=8ctlY!1A&pLAFStm02ISIER78?2^e# zN!8|i;On_Pz)CX(m)h@z=OynP~@-z!MoE<0r`+N@*GaLCtT&=)6 zvt+398dQ%`*6$~osJ|q5?;V-&4hGP8Ap064&6DC0zj@Cdy0)JXAdsAmPa74?tF_|oEKR%5%ihpf z^vg^fUk^WL$NTO1`Q_6@{axC;YvqK(RN`lId(~ZvoxFdF?~pjA|7riHJ$5RG z#m&-jr28t7xW|Guimx0hSBFaQMCOPbd$q&SDUmoHQ2B6GzUuq1z6A;={>)n8E{{g!A1Dvi{LQ~lX(IsJf(9O%&r$zg|b+##OUh-3AD07JN~t%U!}wXLN0KFJR!1xgCS)6p>ZXNjH(DPa>c zrXu2&7PHABi5e!XFXPZdyFZ341kifXqpVs0tG1iOnjpn4K-QZ~VUCfI1mX`*<}oLY zDT@jzG1}MBnvg;Q-~CFDk-dD&Gd4ASl#}DJVyD&@DjGI*wWyp=aiPHSq+M_G|>IA@6PJDhG-- zmpObtA6S3Co?adO_Pcou3Rg%p+#8%cZmGE}jH$1Nm`JLHoN-_|vXn39U@PYd`LsOU^~ebeXpQyqOKfqteeCz$cP3P zKl7r*j89eBQ?X)I0BeR1SH~&4Z{6CA6*s~GwbZ4(7>@kBmAf^FrqcK8@*LmkiQw;@{{%v35egnoo#$#uT6HXjidR)Z1yUnnlhRdT2=k4p4>D*Q zCUgXZ{sohQoJo_SBPgg4mTU@uwAEdbo$F@<1 zudhsAY*P-=FCZARsBL6tr8%;03HS`~XkC?!)eIvYNxxHbO6H=uXGsyyW(O#m0X9a4u zrN2noK&Gc0jsqRO;N%rr=S4D`0|g=&n-KGIM@h|*5NZ{|Br1`%#$GztNc;o+z#ff( zK=LPEuEaNE-$E)X_&3y!}ouM;k!kNel`vi`4uk9{wdYUOn7?cH$*{hL7U> ztuK1vA%6b5)0~Qnv&%otrlg=;78-b-+fy5C^!g*D;E0b_lc0ojF|3l zg2yUSR|u>ElcWbzS*}JR#LWR0wX&lJ|DAzK)wWt`>8eVlIbTYZ`;Uq$V)jo_@r##|_%LnPMV+EIdxFmlx{B~d01HSVL zojoXB%Vn+BK0C-xopsyx_lre^#kJnoi2Et~mKLkM}p!OHZ zIa^wQ6ha7ABExcInIWnKLSZW|F-EcB!w#RX2iMG$%H^pjLeT8Wlkq&!v z=e~!<#QEFW(YLpY=hO4SQJ?&bs>|*5>su%D+2hh)PXj>5H=txD7KMjJT25Z>d1!+A zNs2S=S%2*B%k0_EM|5kt`n@=+Zp6)XJ}EZksbLPm>hyf^RW=s6soL;NWak>!8t5u* zLeMO4CV6vxBI}H^@>qwLTBmvV{80!ZABPxS|p)pDZLPickRUK-vB0{~O3Yi6svcx(^GaKM_ z`9jT@^=8|YJ_*)c+N`xoM_=MIY7Y4172|aw@k4DCvawN%$en_+ZG6aKyD(I%jw_}d zY_(E@DKbXDjTId^N30D;#H|WXWozC%?x8z(^vMrwO*58ANd><~v|bjDt6^&XQJ@+D zf3a|g|KB3a;?=;*m8HAK?(r>4_T9 zRL=q4HE-RYas0_J8Y^r!l^yX-HfXr7+h|{Qvj&H%!~BkqAL4f@esC5~*zQO)@{&g+ zim3XmnAYiBpJ*`XbD;;m8V8z1Zd&Gkn!(qLTg#`V4wmPxaxjU9M>8)4?Jig z5ORV&81CACe%fe~y%Hcm0!ib^bKHa#Bs5*D>S0LjaiTv`$zTcmRoDn=_Y@g z>K_)Km$pQ=+X9Geb?fHF^VMrSR~Q`-9{Qd{@PhXmYX0x#Uo_ROHO9DZHty?V$M<;< z>uJBhAWOAWMHWjrSvLS&p6*-t-*B-1X2lEA^LC?kAH<;DVqe7Y7~!P{->{mo2A(sX zkxoaQ^_sDUd))oKl&7oL)9Z7$cYgZ16<+lcPM&_Q4T*cz%j5gxc5{3G2n<(gTU2l$ zYeWUVSjHYX*W$a8b7nn7!W@> zF5S*P#;ut?+e&mpLCbrH3wA?wLt(@1$sYdte5gCnTuj(}P?;_Kod1dyplikpX1)G4 z7#WHmT#np(z_Nd)drbS2~#(5fUB2wvsAmgom9 zME@~iS4hu|;LDAL@W^uf|H=W0*Au*aSe&k_>^D(pXXnloM?>Krzn3$STtaseup_ zSx|~jvkJANYB55ESHo`f^^uVh>a^!Kc#~!mDO*fHN-7)5fF=?OY$Q5psw%?@A!JL= znS_dJ1Qupxz@(XGT@(`u6I(`8yh#d;6M*g^SYVN6TYQ_-VGPOLOM%*9ufR&>)}faz zZd{3d_6J)B4R%GHecl%vWJJM5*hMB53x(DZZXblF$0D7c%PXm5j-0bN(4{|&9*BV^z z!oQ{R2{@|B4V3$_>stlfzfX}Fk+e5J!3ug1i4i4K5-P8V#hgcJL!=TnDdnOMhaJ~D z3gWCRvnm82Gok8b{{SH)5Fw8(n=B9&g~=2U$u4k-#$*xMb0vt@LL%F(!j@Ht9qSv? z_wD5ZA!R^Ik*-x=*$m*VWu#p&{(#DO9jqh?-PH zMajZSh_JK7&`PG54$PY90&DasESdztqHeU%N^_+})>1;%RS14GBJcB!SX~$2#MvZ} z#6CmIDicE?+UhomB3qV01w_CofWhkgdz`zPGik3tb5gG-|u^spOK5nJLcF2)vtJ4^aBAgC_ zXIT(uXOxjfmBFB5X3Q$kqEcWD7a2-Y)yr1fhr+(hy00LBwvbAKA_avNu6EQ$Nu;CT z8mazHGSrX&?)Zb0i=eFz18SmKPdc|9WzrVk!`&d53QP!U)er)MOfWDnf@uN8LP~;I z1XPXP5tu+jofR8M7YT)?YLpZ-0-)cyL3VEAhw5kmB`%U)ZGikY3XY+LM3fY#Qj|$V zM8@X2grqt#D=Rz~K(`^%N@MIN)<(~N{gV$jS(iW|-C~zTmPnB3GR9VCid7avD=Vtd z7$GEMu+b8xDx4-GtArpF)!zN)=#SzOyYNM6MZ6_Xm-wjI{z_0$p7ic@v-b9oY+S;_ z&*$OY4EP@Cy9gf0zvj=jBnE?@N{X)fnrI!l8BE95%aK+uPruRY?e%!tx4Gf<^1b^U z5>^4-kr336#{}ZEZi$WM|~QAdC8%nX1`c-$o-c)rjX6f!cOOPV8^l z5X}*OyuA*juwGX5|IMF^+vWd}>;a%zljsv}JUmzOdpaN5 z+eltHw>}H@d3Lmy=i^l)an<+q44D132=P`OX=h5v3h;ybz{LDYXO7A#Ly#gu- z=SgNleOy<)z8K(CyJFEq#RCaZn^1hpuYo-utpY&+0|J9M{@aGCvQ*O1-Hm&K&|*)9 zIAF$+RzS^^l%C{gwQhTM93RuC`|^+ZR?d4D(;;USIC zf6KLrGOv;8ZE=a)A>amBRG|jCHg00`6Di?b2!)$Re-sfLvO-7V$n@T+xK4(qEx?@|Hi>4o3qf{sJgeagRg1ivGcN$zbVzHsP*7~UGstug`I=u8? zDJ(205G!oVoY=KSPZhQ{U@5dNDGY>XaYCaIPztDLPu+I8{;h54z3uo>zRlWNXyK#o zp!pxt&N8a4_FM3{6?b=9ptu)z*W&K(65K7gm7+z0yAxbmytuo&yW8b`|7&L5HM8!Q znS3~FCnx7ga+0&C@3V* z_9DZZx-&oUce2#e-TMiBF*B3a(< z+68V1LF_d`)@rDb29V3B#vU^CAT>878PG(J!E8uQC6CbS!{*k;&Q7}9(^+5NKnJ(b z>Fdqi>?Hf;qwDT=8=BO8brje4f0!Ttvy)2$Fb<8$u|gENsc+2@BKLA_q{9&?zbWP=zf?w{+b@8wm|I4F`V(w}|>0&ab9m{i6)X8Uf z9>3Pu}GkhR3wl$h_9*Wfmt0*~mRuZ!7XG0T92ZBb#=GoBHw*V#AEHhsCNBqbD(r{ihu`D2HtVem@xa4}`12~QK zIN^SXPB}0r|L$HF&jPlh{Q3A^l@E+*Z&A1UBJ~!U}ON1nd3`^$E{K+&E zmh1?(U-{CwHL?e&lq z?um_(@QO_WK?gm`H^#J27c~-O$$yDD!h_Moegi=pJ<1oGXlfUr?+Yk>q~RuLm8mPr zC&sjQ7j2Ap%1lVW|Mhv54>rHrLC+x+fChV%cZ_|YtZA<%{N-F}uUN3X@T2%&5Tp3j zfFVFAG_fEcsJlmb!nhN$hG(o ziFrT7l`kUy+1;eP0&-DxqCH{3cE?BJLk=V9WctUTgKBz|7mR67E`ZAhBvHJ`5+vby zsP}G%E|1`4TGiv>xRVW7@rown!DUKH|3-_dex8W7-`SY!|Dv zM=oq<{3sr~rUYBpq8B7aNPW{_4-j){^D?c9Yj13?rgavx#12}(eM z35vSMCUO{IxG0JkC>*5R(}QaxEvi|DDJ`8k=dk~MAc_O7{pLTkE7eL?)Poq~_tmJh z)|tDxfP+m-V`eq}U(%`g;D2~mqT{-pglrXWF0E{hr;>+#eN|p#XsH5)cZ3GwAkp}N zI<$QPRhUB9&DZn($*CbJS_lEY$A~#*!qcd2P~Y;};n3QLb3jkp*}A~j!PC{M96wft zx~A9J^>lIf8XfYC=SW2Np)Y@R2nnue3L21fihPvC3O?tS?87rFjtj{?pJ$gI>_943 z*casPBcdWq{Uxf5Pr@PR)7@oLzU9*JTIw|PAesWqEzk2p!ammVV4Y&pOOKLYj;6WT zNKiI}9D~$mZ>hA=@-=4rZPZsgb=03rXOCj1ZTw2h71B+0CJ-c|J8e%Xw~)-)H^U&t%21bUPqeU< z0Z>+_Hg|2Hwx3&U)d_f4pm@^KWV6c@QinKdR<|!xPL>!7?4DzkM-YKI;1$kuFhwkZ z5h=kyG|jRi)ChtBmC3g1w7WVb8DWk4rn)WHbqXPYjh$@LYZ2y0Ppf!Hms-93-CN#C z^$j{+J-sfbU2#a-`TXC`6PtxNy9e>Xd3hVAX&tCLNw-+#V%qh%Si zcX|4F(FCYXhCQ6UY1btNlfoedpH>Jgb(RKwx3GTs)tt$gtPr>gO>b-YN=ltkw-@AK zv#2pmK`W}hR&qFHvAT^wlkLVHL7JhM+!))T0S%aOLux>dElIH+j53FUs9~_7pX1Q& zOQI)Spe~X}2n=^v&SM;=oM7P^Wn4iH_n4IwXZ|8hcjJOm!;eDi&wzqOC#p?s?M|0`k$gjUE}X`(HD0Lmu#ZrM_O)dXv8y z_YNG<=w<3SxaKr@p0r?j+G>Z3Yg=!8uC)*_TkOvqr6=!H*XC-L3CZO6cO%{pe_fvc zcnhGKL~}e{Ou^FcL2_04!1Hrs=Mh`@S4POs_}*dmbGF2o_l6HT(k27D>8uHk&7!Kn zBr8a)rPi{{yfAwN1P+PW1Qcnvk~9Qks}zTI2S~>s0{e9ib>HWdXLkDwaE!nWf=g@l zTA>x`tXR_wS68K{L>@g?LESRt+ zS3~_7rq}j?!KQ6pV$8Y8UJfq>mg0rXgc7q=ZkVGhBmn8(CH`~|-Rc^#urKcVibc}q zg@%nKn0kfGh0Hd9XtTKmRFY%!p>H;o0jHHXdb1{VH6`@pu7}F>{ihi{ZXGfaV;An+ zh@%wVE7UNYg{Kl*u(?ZpAEQB7q11Wxl5uKUb2qh!~ z8cWMQ?(hDGAISeDBG9|eqcz}h>!!sM&|ciR>;rf_d%+*N3UYIE1~|V!NWpNaO!O$t z3G)f1gU{#n%U^t#-j)Hw$H}~n(&Df`iCdPFbj~f>$HvJSBM(kDmWn8luOC)$kvDPl z)XlhtPl2rvK@bUnI;2Qi5Du2}UvrEE9G(g`6znNwCVOQwBLwX*!_#4~j5{4d6PjV9 zs4-3S9@2}C^Z6;KiQCKPMZQgq9jARnmAurYx9+--CDn&ew||Cu0q4bEmt}`8Cc==^bk0zH$x^0P3n&QK2je`j|H_o5Fe>0+q zCL(Vkj|p{Uw{h$Z$c5Io7fd`0a!nl~T@~6RztI?Y*GQPsUR;c60!hjdTB zPl}^onH5N>x7wQpTSH&*B{G_K@VbU{Nxk1G=FMVpGBou`URR^MA{WO^KPjrV;c8!3 zuGJ*}n3URVW7gIfw>j>&@?=ZTxZlAL!^Yw$F7nVfL=!f4X<7(!Xuz!JaY!MeH3gz? zxEui$1vPhYg>Xftv}CKK>`+PAf+#jpUMJTyZ(Qr*IZZ85 z-crwNABcdjXjiGf$=?c=B64bp4?&n3LP5CI2%Wf({~Dbtbs)R1c#-zciq~;S!QUSo zdI4WUyjiDv|}ycI#SUFBJsxVTgg;` zv$|ADz;TNpIFB{X1e13XP_~X`%F2B|#yn-xH7r{C)eVPkX9>*-f89J2A00{POI3(K z4q8^g>o6Jow9%S#2>9n}g?%c7OqyYV)^skcs6=4icVGf%i73zIYoy$W^})Dwr&hlm z6P*7qIc{2E@&fw@+Wv64tFXqGC~#0kl=2t00gSsm)>_QpE+wNL{{Amb(c9NulTFv$ zmyS@OQO&fVRqR|r?8p#u_UFC3ZZGW!ETlh?1gVG9mAS2Gl#_Q66_HG{#!M)_es;h5?kfH_Rm$BCQG=Hju)#b(t14&jF{sx2~;UhiOu2GeAH2WGHcPjnDV;A z+M>~Z(S?5nmVX1t%>EX#*Wp#!C#4sQ1u;6g!p{5I`N{~~@5?%=Cw}VzeYBn}2prU4m z;08;nJ-39Rg0vKifMX3I&GtQaEeWeIH!C6`fx$W|4F=ijJ`Yy5yhcOA+R$)^ZmJp@eI*tiPUit{oPCpFKN`L5(Lkk zckk&hoQ`6}Ocb2;R&4owhVBT{yP>~6U&K853*J)ff z(ON(h15*1L%vy$ME2?~vkUdgq`TNkD|$ee$7@yb(kqywyuf&5CZf z+nELw5;OS39a44CUIX5FQ&NxU&+sRidA#73A_chyHV7vyouwj19opbnE0C5zD!p(5 zI9*50*)A7O+@Tw$g%b;#*3k^gUNwv>{$skk9T`hj5GXw&joXVASj6~P8Ub@`Nm92BxjG~glA z&OuIXQEPUhO;g{1<;F-yYDz(nS#=RZu)4oLu#FBJ*4Jn(6Z5l=QNS#MS)+EK{-9QL zNtBUt&E=W16gkG@NLfUB^d!WXg+ynLs8wv`zIcNl<@le1Q4Z_VJ$l>|r$XY?k`dVL zkkJ1sYmH{C&U7kyAX&|4LGik$dXDXD^yos|9MwER;6beNwgdQwyJB@vTo8*Kn?`}H zFw+&w@{Out{@V$*ZI8!1;rD(pi2HQl)X+*-vE87{yob-r(O1+us_6f9v znHV|DLZzYtP&t$^Lo8!NmuXb?kAN06ND`Mh85^;&0~Fvw;XH?PukzF(TI>?LZ@_DHE%2UTkQg`T!6f-!_)2m4Fnz*PywcX3jt z&1yUKXx^=K6s}807%VAyS~K^PKGNl1P(H`Dg{*4k4u%=jY9kT~?JYO|Og%%a?~Tps zrpbwt$R)w_b7@!NiX1&e<_nYWvNx{y{EhEQ=2n4%WD^(iLJQSz$@($=MnaT`A(12Nv+cx*2~=EPIwNOqjENH(hYv?;7E>3|NZ zjxyHK(Q(oe9+i!)HZsO_{<`cW?T4YBc0_T7 znMM=)9Y(4uQV2v#GjnDhzOTfH%As`yj5uZ1Q|&&Mb!z+qGbLW;mT~Da(|Kx)FzNAk zxyPH`Gjq1uG@S@)i?snEtF?zCJ*!?0-aEbi zo?paafO~2+5vQIX^F&FZAIh8efj{*83xu?K-^!ceY1En8<)BRS3KD2;m5hjv%T(OS7Q(9_py9@fdXiKZas_2(Lwy zQd_MS-@$zjPqsI^XOK*P94q_BlumrVuX`W}^%hUmc7c;{DkibU8lU7z;i=i@ACuTV zWFSON1C8HLbmR62qjxEevhtd3-@+VRCfF}tb1p|*O*T0ZQ81q{0%)$Cka6B@%wKyc zDE`EdB%{Z*e^g^WXu>EuNL#hN*&otPR2rW*+u67BsM*m*6$}@Z5ro5FumsY}r4$ZR zasmeu9WHUKVv`VM6kEw%52lGhWXsiiqGd7bhK zj`FM_bpO;rMpTI49G4YEVg}w_0qB=S7PG8izwb)hg-I7dA%sv52Bu$mnaXns@O1}sE_jW$dpY;Dx@46fvOtKrEvtV4?8>tmRKiR{{ zG;5aDVDk`seup4mJjpU^!v50ar$|{!q)rPFCTdShOnk2Yi{E#)?k6_?U2^-Y=f&ML zF!elE_2%jJd04E+_wj0@*Eh_Nlr(?5IR0YpSr&=ZM|Mona8uKfiD~VZvETd2%j`2Z znUI0MVCUT0K@LZQ$L)n`-A8IGJ1KgY>huVqqs9AvljP0K^Ht?NB34uL+^|DndadKN zLP)fwOZ}hM)g#IgBF&EunfAc*slHcQ^XC!b^SZt|E#}sm7PP4*13_)cBH=0ymDxy2 zj;86ag6luYhJ??ST_swrH$TN$brd|sz4%8$`Q%5_GhnQF*Mrw8D!FZsN0+?oQ+(=E zkVY!M*d7l({qU{}^>HtUwQCHl#I2cy0_$|sGa7*!R>~lBaW<4Hps>FTtR&27U@Xu> z=}H)tBiP{t?XkI*quR{|36=7qH&bh8Y{QrU0eBN3tNTqc|KO9ItQ93*0!(k8P<1F2+5k` zs^>Rz@He+M3Zc<%#+AR^4cvLXreVYpNj$RB{nTZKCTvFI*4P#dBjPH;>wf-^P*8R= zQ~SL62P20FCCc2JVvg5Lw-UqV1GX+t#Cn-qH@r4}qa0J;nsMt0LCJ-OdN?~_Jdh{) zc4R)Bn|#cx29}WwyAjENY)kZpygw=!y)OR%<>eD=4+~9AmG3Kx?Bz z{QKpM+X>bgY5udLY)Z-Kt>JA>f1@v1q-?prAZCf_K9BlL~-b&dr;jbmN z)4)veU%~4fmt?V$tTI~fxOXR{C%4{PcpThu4Nyf2O|YA|fpR{C+_oY7V{tR%?X;MVo>|Sigy3fFsB@Ed!Bwn&LB6h62lkeot@faRwKgKr*jE;S~M0}9|BAY<;ZR6zbf z-ytMQj{qLFFN>#f!J!l2y3<`m7>g{k(oLasBOfht)sVv|=M&}@*&Y#!cZ2EXxO*`E zUA#sB4Zqt7w8=)_2rArtb)_i@PZeAQvMnxIV!aDR{6nlq)F5f66e#4G{} zgQf@LC}%BXVl1HN3K;=qx)0|2h}{8Xs@EW=zFzqKd|KG({R(Rflqaev+?;~NQi?lCMRAL7m2nI=sdKdLecz9v0_@ccm3 zW0Y^Y@oz~r%lkF(VX1`|%_WO|BiWWGx^wSEf3s&XWE`$8srJ_q1-`<(k&hg6Qa*`p z@jm9BbY6VXF^4Q(98~vUAR*hk}5n;$+Z#XpL z^b{SNfGYf*uhd2c&pi2Zy`G8504(7Z0|I|V%fy|XB))K*MRN*b1kk<`Wl_P|ox*2K zOy^azn)!al@U~6-b#Ha?sCuud0HX!P888G**Q9tYo`4upl}?UO(rSHh$|iCo{Iyr> zbW!lJoY3sBH#_)M_N99KqvhrI%olI_`I$9z(lhsw(|WZJO%YK`T@!5hYiLW{Ypxt8OhKz#x-{-SXc6A2-KsB@zL#E2<+#Y82>cHu#iE>q7%dw{5f##6Hp*aKGerjHntMN{Ln8`F`G4FY?p;k6Cp@sGrkH#jq5 zm|EB04PsPuIe;4$r$PdUO{@_G1ug(x9SE8SCQJwxpJo8@fgjkmiG;f+o zt!oOpaBIm>sNrrx)k?8YVJm|o_!Yn}WMoZt)Ll3F_W0HZvbp6b=^PY@r?Jrn7)`M@ zK<@JeYyg?+H54D&7uCVY(%&-VuD?yb>FX#O}CK2{a^&C^k zw2Z9GL}dbxu1%>+X41TUVm{&m1(%so@IMtrV}9p3+?jv3)4^v%(!S8yy{Z&E zKJHjkI`ILjSk>ht@p1@Wywe)>P94T*_nE*Hx}TOAZw+PWI0{;DP8;A z(g~ZQroZ4%ZQ74Xcn~$S!-jdU-m9RLRYotJfFlZ4k(DH1|IU5o1PJF~;_6o<+!#H@ zeeN1iHSq>FL2i772MO0eoh6VHOZ!m!NT&&VX*H`KeWv=x1Hyrlk{K<&MT;l(8|!Pb z!iwER&7KJ!w2g5A`{@6>3n16za$HVTx60?<1X-uN$? za){Oe4!q?Bc`qu@!`YXw>UbdzJ1fjVCpq%ZEI{%vaOS|K}2S4;visHk<0ku7Q2j#FAh*H7Lu0GX+dAT%m!=F#02U(==5>5C8~cBY)?$MivK;OG7g}kHt`~sm>+^tNbzU zMWl?+jEf!Kt+rsU6I0gD6 z^D>G0O;X%c3rQ0~t4do4VFx(?!w^;ZBCC^j`rHc9!pL-N_9PT11PQ#joDoIP!~Nl? z>EPcoUc#7j_1_@_mAB!M9c&Bd$lJ&i2EjTc3VD9p`7#X#E*wMW?*&p=skjRzXETD` zlQ*mSqY$st2Vk_*z15*RTY#p)tks%-$C-|NkzLoz){xpw{)_9_HEB0gh66KNb_LA3 zo;~K+vhB?0%?*9qA5IJIjWYBRoY-&*)5^ACAgHBQgN!xRhnIJ zv$+7Ek6uc6=E`R@`PF4OG2(qvXzU@CW# zM)*5WF9iM`hPkoYRTrqc53!W8xH|LLL@BFV`j@FjAld|4MDt#LTnE2XAECBFPH#XM z{tZ9c)GEAmapDdciwHvDW|_F6zB`1T3)zP^-R=jJqs?18?U2;fyK}OIAC?X_`f%9Z zA38(iI=h8KbVmOve6f=8PDSI}z^FO7T-RW$3AsfpwF_&RNHPmM<*!g2>KY{&gZ)eg z(VNwv@6H#W>D5`2jw~P3n1y4!CqBX_LYG>ZJ;PfYs{v=Z^4dQ{gtW5ijPA3gC8aR$2e$?cwn?TDbd-O~Cn8{oNjk zcYc?^gXhzu+5kM6Ab-0mfCe^Rfac5Iq@1ts)05r!%ya=~5dF%F7L}>~3gc zuR`ngvkinJEXN)KUWPGTUwv<0wyx?(wC!0u<|^bzv#SuB!6vh{tyl~+KWqI9OX&2X zO)F4-egnAl^Ol56<8u|0xVYI`0g2luQBd5Efv6zv9$F>s_qw#l9!F>NNA0C?%>E}_ zfZl*H99Io$kYy{Ec?@AnoWcoaMB1i`s+2=vxrEmp%~dCl3Tf*hoCaWu`DZLB^hExW(}V*e(=MVH~O_hUH$s;INjj6wg_nPS|ci zM#31Lm~*SY_kAF&`+}i}N^@SqoqU4ChOlUe!$voJck!B;xH7W79smlet8PFm-NYdJ zRy0(z2Q@rrcf#7!r)OD&JC6?-*1phL>#y-pNZXNLWHPP`)}nfcT&{Tyal@H_o7t5; z7?)W&iQ29Oh=m&1p5MfOsb;!tn;sUpwtL4n%$z?Lv@Ir6V!EjZ&ZB64zgSRpxgFx? z=kHzW8*X~mB&$|5X!p6_?Ag5>7$;-87s@7W_k5t!mihht^lM;8%Mu=ode2PpC*z`F~L=4p+p3K5qW%c=?81pf+4F6D5M_|36s-QB%zE$sottLsll++3T=HhuYe!qKe;0~mM0>*wJGok-hWVQ3kWSD zD+4LzEtSNg-Ur>UGLoc51HA>bE_%`~ll0guSZnc`u|=aKVgrc(@tOTJs9z?TeY8hy zG^6lKL~2VjPfy$}Dc)qPPaxywY})|$7F1Q#t3Byp3^q?;VLMtad`~9+ z>CDGUP9Vn)7>po#ppbh`O{M>i5@WCX7RAcu<~NdNYpgAv;Y4BXoc#Bw!oOrKk*L48 zs+(b7Ux9}^VI=;Knt2mL%Xqji^h0UJp7n^8Mq&$VOtiGYi&0<@O2<$SRNm?p4+=^6 zh-D-UVqV6|?(z8eoZVn&fwt%$$ajL#NCJTPlnj(uE)>ydMiwJXziqw^#5;OOCw$ki^cB6I3+hPLRW%r;s? zz27VpZF0i|kc2QMl>LHGtU~pD*=_mSl6uK&t#MkE(Aq{vfZU<;6wpvOgE6$wXm9qx zF84Oh{1Y7>)Je1xu;6#LkO;^+{$-%uT14im3Luha^XY%eOE9 zv7p>@tMObu_o;E}>BUH4zbU`-gnJ0YSF(_iJi*@Z@1D!E|bnNgrg+m{mU)Wu}Jo0aCh*8Rqol}@ZmEHMAVY5DV9-W zEU~QS)LB$F)5KsI-d165*^!^e25)N9F+7kz43za%-}cbGv7}^*JXP{mu4qyj{WEfs zmvM9l^arIDZLl;Tj!#6U&uZZ1a_trWa(ywU`bJ0O@$1M@@S~K&#|uz*zg2HR-1*Vu z`Dm0IGEXMh(b?+l<@tC~wfqyiBJM@Xa0dwccBR1O zzETiE)DYP~bg%t_%LU9saNW;LQ>m3{8=qm$NeGKe!nnJHxZj< z5dID&;0i`(Kd}D%dx0Dd7A#hxARtvAx!j95fomz1C4t1HOBkn7<7mtp~4gUrfr=E{>8y2?XPj(_50TM@>o`xX)XKCl&?9FkiLM_%fV zSN*r!%;D}jCfHoP1~ado16URw`?GNn7g_+!F+VXolzCsA!z4)X^yzfd~vPh$BN6$Jsgz;&{^DS$sOSWjA1GMM(ZCk8f1 z$cVz6T^sA(u%IyUuKF%+oN4$wfzD~?6QMM3js-9GqRuaix{n~Q(Q`l>Y`EXRJ_^q& zr%}?goB5^Hel&pAoIu#p*(SrDG`d`@fbWq!OI9aSYz>K!uId#*c#JrZK zxqq%0C#3hwkEiSDW$R+eGc+^%<1Dr1k%p2CqiH6{ap_4;p_hGPZ-amc7u0`|Jr=3h z8W=@{k~D6F_Bl1nwALdUK`c}5;rwC0w_%gxg&c$mSfIu1A#xbR`d+J`X(%0Ll+H~} z-WTm{oDJ)HEvvyqbH3A8s~+3NyJ{bA_1PI&tR7&a6PGUnLu_=EalFJEo=iRtO$e85 zti=lgL(5N#zu%I1uA4V?B$6e?b>79^x64aDfbd3fFc8WX<}PnCQzX&evZ|@D2mBKE zV&~BDZ@4;4QSm$!kN(2c&g|w)1g*zA!dZ(xZ&^qS6?i4pHIV&?K^@Mqxje*UO=3>& z)$R>Ao;1XCe`+2-Me0ZHG zEUyXJN5(55^jhaCh28-7q?!$Gm+5hKA>|K8-u+7f*G$bP+8ev+q6HdK807DEysgmb zC@4|rLD$itju4Jm?7jxvyL$t7zQ(ms7OSe0a3w!T)I;?Cu&hf$W*jrIsaq}JkM^c{ zyDL4n9T!5EWDrRgK5-#U4gT<9G4nVq_+oX|6rJUe2jd_txsx(3PX=k_tpAZKg+hQ( z15&G#^ow#DLsHSX78h(2N^AH)!y9wZXP0KWoTRr_X5JB7ZqO&7c(q3Do*f<1cW2tw zY8G350lo&`{uQuWk(=V2uUf8F4Of$%9dT2uvND>^+o1+iOsrM43`(vqty+*rkpU&A~im zdla%(h#~o`w~piarEd`1>v;Rf4%L{X!JA$mY*^ifJC|y=-ob~}m0nqbeIwxA_F^5BiP)5wqOay51qiRoOI)UVN@DE8N|;0Kz4cAbPQI-5SsfBm(0B8Baei9BH5ldXB{Wdb<+jLqu|d9BFc^)-o1Z7EGW7EeaCpNPa=GMD(!uPBmW0eEE)&bKDDvgcN}ORusuN8k&-? zvY~@d)N7ssBp&_Et1rFvIiXqreg3{3oKP*dD z($LrXK}5L|-`v6^IRPV*)jd?A>01a&RR4KPO*qy3QAdqo$o2r7lev^-ku>q@Sj9 zvCGFOz#ka>4DRB(3+Qsij{+8O`=U0r`anDn9=X|zK`}+c6bSIj=OyOE!$kMK{+TR! z>rX0)NgA3&bO>KE)2fAj30H$^VL0X)ObzAJ^lDSdELbP(<~^fa(V;1UtUPA=BfRZ0 zV|UI}M$WzQS;G4Z8RHbuvsJ2>oBVuT2_&aD%ASf91QPyq`kpo~fB=jR`?-#x{6|{} z-Bl5EXhw;HE*_ zMnqItrtnz86Q4adDW1-FQNW`d<6L?h2j~kU(71OA1GE6vB3=$RVUTI-XBGz0nr)lU z*R-|VY$#|G9-8nlmmDb2C?W%_{L5Udb(}rny$wNoJWOnXu?iOKdyC;AfmKA=;T^Hk z;lP8oZH_cvqZkpn`2;aY7rjr%-E8Eu3H@o15vL2NqOA^Eq>$inlwbu(?a{S&#;CbV z9)4n2{o+t^3)|jXeDXnPm{vlQj97UKl^A@Q87}<~!lgjc0|h=~T?UZo$W{RMw~brR zc?g*PwC*h?e=ia#TFlr-PvuqnQe{qQ)iPp)?U`+fF+Is?V+|)dn47sB56sUkPd%&F zqJFNeY7Jnk613TCvFKd&aelly!6#sjM^jus4|wprxZAk6rqTl#O8hoe8k&86J)Yk7 zc(@(VOkH}uKK5`F((CX7)ZRmOba+1=ZBr#5=*j$Ug%g0&iQou7`%E;v6!fj26dsLE(do&0;ee*nlKo za)x>yKDCMxa&C<8jU$Q_>b5ddUfa2rr!`>K{tWwcu%teme%ALqv0;iT%O&1^7;AK! zxJ^K0rTf9&I`bfsni=7>qotq=y|;*rhq_3hhZ+uy-B)#Eh z!FsybBD%mk)hOPAe9heBVKHbB6WwRx3b_lEl8n;vGkvoF@9TopH ztu|6+NOW*3fm7!;A)@A7GwSx1?2aghlTi7KJG!`2<{03KB2;Dt22B=R{j_WTj^1b_ z)sD-~jmpln8^z?Y@=fcDH3BFW0}72CrOn8|l6^xX6Y}G)Pa6i-kV_6Nv?vvqKgOpZ zh!Gvc+QH4(vooXvX&62s=Mr>tWwLrMdRJC)b)C0<9Jp>>d8hy7I2UHF>rj){SL3`i)8cjXF+4kEWT`V51S7IJ#t`f3M&3L<8;Ncy>+ux5*tZ#|>rxt0PdHn#m zcL=OE-QGG;4!D1_dcR%HuRqp&-e+EK@A7~Bw`d84TAqC35S3Tw1KdQKa{%V!9c%um zm|0C*+npM}pMEFGtz2@tQ(r@&<&B*-Pn`UH&)EGY@al|E0=Lj`-YQ2Q33)Qcy+U)t zC3$;rPscPahb~Hek7u=*Y>BmrI;^VKwXZEi>}C^#iMXo32zu9tBR~2& zCxkIY3R>vbm)OA4qj1j3KRx=D#pN~6ZE1Z3WKRXze>dtI;^kp(BatU0VwVb`QwWG_ zsubo&*gbF1@ zqR2o5VL@iQ>q=ZHjO&oOMe2+B!;bb)KCdnLmU%2*-DJYr26(!N}o|^suc!OvO z)8%`s10rHaLh=)Pl?lvI#DlR0>X(lyBg6P8F5C4!00d)hdAGw3FYOZ8l0`QRY_8Cj z%{^fJ!oz$TBO*j~sIWf4z^_l?rc%EPkg>fsf(k7vOBjFbJTAji`ouoZ4j84bQj7pW z1GU2?1a>gXbiqaGpNr62_Fm@ya0hxY7KMRV<7`2zR;eqJox1$~O#X}`Q4PW-N4ROr zj?m3<_XU+jZADgXR`W4={3EyztYF8Fs*9L_YVKRHj4yO@>c9d!jOhhluHv-*gWp}Q zk0>okfm|10h7N`EwB~Pz1yv21s!h#qYySy%ncB=nx^kQUcd(l}g4S{HiN+cCa^3qT zHFQ-FC_o!*#eu|*YhmL~R=-d1oO0V$T4xFPhp&;YZ@&m09C{b#QOl-e*G5gT8*#lB z{2S`3BOn!6fu-#{7^2hkXAWdSU>$IJW-J*7{^iB6A(^%;JTg-;lg0c=xrG#p|i@ScJA zfxAis2A24cMCOkgP9|-Xc2b#{@C(bRnvmS=0n;yrmWKZ?V7$qA$zW_Y(am%eo>un%8I2}C*+Ho!Zn8lNBQ6ie*c|=5HykZk7Me*)hQ!gSs=x= zHl;{#$(|G*6F0X!B5|Bzya|A`cH{)ZI1{5MkE z@qdzHrvFBY`!0K5;^HpE~e#AA`JZ54V)`; zTrj#jvH9Q3DG66|4r=)_!uYcN^2It~eb(D)K^6OaRD|L!d|3GR+Dr2&_5LWe0w;N| zBtJMhT$@zN?PqL=8g1(Nz{chF3pPYx?}D1yB>U!AUHfefq6l5a%^Ld+8=~eVxGG#b zq7<0uZFJ!4BrnECNnw63hO(&fk$SSZzy>pjQJMZ!ViB{~{ms5BxL^$i0vbqFAa8L2c)>fm(Jv6c1t~gK`4p-2JNc5w<1{hovnSF?mLk zxn3n*MY;xOoW>aZ-SyIeYOKN8Ba+abA9_*$m*BaR53+>(Dq^;y=MW-{Oaoa61EgEx z)4S(m-fj=t(PpG3#5&d-2t3;*j4{N3Z3Be4MF&iVAhei9h|MgEm_UQjG&S3-zg9KK z2_>T_VBKuThohh+D?nSd?U~YFn_-24pY>95OTv&0>va&benyfW|5?a#zE!9LOiR-= zU2`o;ZO=i_(=nmU)NNDuYzQr#Kr}Ar_#oI9iOaSR*FakZS`l0~&GjC^nS*O#xN&+u zxP8(8Mc1)WD}cSE(Q-p(sU@9}q%fl`2#^NbSmD#K8#2KqZ+EX+!l65g7~LWsKn&TM z;{wyuER!K>Xr4y_LAGOI({*$M0EV$+FvGSS+cj*%scmp4if-0$+)L1Y$^$Y3m4K&w$jis6jLxST;6v$g~Yk$^(+n{mQ6eqgGc&Mf;Y5 z9zns=4fQPI=YNvq=bv|WB)9DRuW}kG?1;{D9r{5OMeaebV!mc6syt;$k&!R3=6%!905ElZ=Z4+iMTwj4?x@PRvmLdhR23iW zs7lezP42L2s6YPWIqX5B2UPImjtKk^KV*qO#zw>sb`?MLqW>Br=GwuIqHvvUw>|-i zk|)8K{3!t0yr3YvkJ)ZX-p*}Fi`BDx(0nYhx^VyBl7O2an-Bm?_df&(BQ(ALHHf$S z|1thORa8|ui&^;o{8UL}Mt#qx3XMX~ALNM$674)y{>x<|8J0J`WK3~b5Z&!WF$-_w z@MuH^YDH1JuNDL!wwqbLcBqtwr$b6gA!*F(f~ z4a?Dx?$}hb91I#$5a&Ul#8KeW`yEC6buRwcRgS#VC_7JB$_KO~uzm0o_9`cd+jiFP z{DciS;Np27<8CJxnnd!Q#3UZ_>`?V8v`(6LOzvI%rFiyE5cVaKDk>$sL< z+0cNtZ9w1w*PzhTElLerHyCprlQp5C)l|nxG~&8<+nFxm7Eg4Ax#2vQ?N{TPm}S({ zda#^c3p;mXg3po~K1_rKfGRwk_W&=V2)lKGU4f<|1 zyCKWcVH9O;XSak~Ji8UGO~0`EXQ>%#$1~M+o7)JKmZ)u)f|QZ)eynJbZi$=hcHMG(2!{` zTeCcy&J_`}{kLLc62yMU+D^5ET0G5r5^KX5me^L|nVwgzhst@?fURR&BaTCu4NPWh z4)l=cB8FUMP|ZUC65X*)py?(?8m7cz4m4cHqON1om0h=!yOnO)TJlzqOJwgDdsFFK zK{UZPdCqA)IA&khMi5fNwlKD^Mu|r>Y$Ak-hbe{-7zW0s!;rxY15=8K1F=P!g^=N3 z0_F;dneLlT_0AxO91@J@h-C^1mFSiwiSIIDp-CCfJpY>#dEzfG4+3tD6gJFR(Ru<4 zZ^y#SPnc+E-_3@!_uGksxI|JKR)Dq99;Ng_niI30SdV%Wr!- zO7VreD~z{kD#lF}ZZ-A9_wPyIyGkT1(^Me|Com48`we2hawL+sE*MQ1$(ZuD zLSp@-kkC~wq9E|Y!FBACtl&$I>#`WlC7X-vEIeQV%h)W6F?xyYKuiTkqxgd`O8D0C zQ~q5^Ki^tO9mTG2%~r!7&+$}GBl1njLvl;}fNwnkRr|XQnlw)a5`p+_3beMgQ?M~f zvQnTZUmU_OW>p^C?Jm~rA%|O<_nk!tTj^hTvs8= z>nQPmEEv5&1Ux82}ZQ{qyVV%n$tE#7v&Egt9Q>Jk1+g<8~)(6eagdo61q| zO9{r6WS=rZX_SZALM5zdwkMlS>0mxfmAfI!hAdG?iBTy~D(NuF16OgFB88^AqZGeY zxP)<)6`^|UMU>%~P@0sCjbd&$RvzFdPbR0BDEmR4W-Pgg0x9Kdf4}fU*AE8^ zCq8iqt)}}>a9GNs5W4rCHv z@o8J4#mk64qPhgBe4vWVwmf3%E;Gpz(hzK;p=~WC5dD zlvJ8cH8DdLjAU3wNsC6RTt0!S2D@8LFc%O}q9km@=c^bpSLiv6JesfgU-Dd>3&gmY zmCDAxfRmrJ0`bEdjDWaKrEbPY7e{d(NI8&ly)jen{A?%&U1)*#QC=9u_k4L?FooO^ zq1_Rov8Jr9FLIH^LQ&L&xr%dNDg)1?5EH^y)GYA0hRF3HuFyRd5;eScBKKYrAa4zq z^Ir?`D4rj%-i{=;Qnt_cE-ycvT^#HxqkC1{nTry)814!2LxqL6eiDU3E4(F%FL%lj}R-%4|Bcju|H_mgtUmxx&Pv#6$Lh`d@5$%HRzwtd@5b=|s=peca??~b*d*??Sm~Zhi26>Y^ zED2f0(w-mn-H4{*K4IFIl}%KaWJD!#T$U8+*H%?6S5*{9Ntqf)uIh(gl#FCsKFar; zG_ernSWnLm4!@l4ogD5KCZXrEz`bBz`FHWjImw2*VjuLv$Yp#Mc6Q2DE%iU?GCCo# zfS1r^AeDckj!3K)s-ar!x0$B$QAW2}PK zo$AjDExEhli>taM9IzzHQ*}(pBJAuNUr;|&hEXaMP|o%lKLE=QN~`6=kcEYk!@oL} zQeGL68^+B!CS?^j0mHNuxRLU;IM!bJNt*F3^IF1w-Kim|jt0@uK~4TYse?aJd~c#} zKb3$&yggaa(>y4y#r1Y7LdERW!AnCeE^Ls4)5~&R(r1-(vefrNH_FmNWGN$ZuOuvu zf?KA9X%Iy>d927}Gp-$QTSR$VZ8eTHk5fU5JgGVBSJIC&W@*`oUW#<8!mxP)pA@R4 zbZDoA%SG1zVfAB29@hQhpcZ5osw*ct^5)BE!RUpSk#h0;-~XL3?|=U1Z%c#*jY7)e zEbW(YYM~JL;edY`a$!=FBdJ<6>_3&~jvo%xY{<%wf7+49!=?Q5*bi^gNru@cA-5s& zlnJYV^I(~Ow;zQW`=92rRcs=w$7!Uc{xd)aLwf5UV5FfWLMD*tNh?q66JCEi8uLY zn#Xa#_KK3W1v((3lf9nTqP&aWC zM%=S7xaa-8^aCb^UgfwYToj#`aEIJjCNg=bLcnL>G!leYV03ClCf203D)R;y_#UJ8 zG+>KHRyC-5BMRp`3GWp@^t1i4bt;r*g`|q>i)1H~+$(;@MrltuBy>30y0mqNImH#|_gd9Q-S(Ex0UW$;c1o5Te9oNl$srf|^>Q(D4T7?MxE6U?esF3T-@~ zc|gm?wT#L!uDP_HCy~QuqCl$JL;y*xrG%BbNJVe$^T5AlAxl%0bE+?XOEZ#Wd922~ z`?UYlvY5Xk8BkDlT%c0oIdtY!1QTd?q%J!d|Cn%KORM55|LQA0 z_4tW==chv<6^qrskMcw;Qi=S$!YyUqcmo!=QlGQiCZsSs2;%9zl} zF+aK5KYt=Vmr<3g{qu1LN1j5I*H>5PMGt-|WqD}{itWn3@ALm%RtM5ga>y~sh9%6r zuKQ04w=q{D%fBj*5T6&RWtL2x)(x;}x9Y^K^$Ju+UZMPOGnBc?*K#JsN<5Qf%07ls z;HD+UB1~2uM00U3;v7X#zFQ~+0uu=iSU~PC8I3|W-BlnczKvPpi&JOn^UNQyD9@@d z^x|`m_(7hqt6{=YPB8yw>}z+4--*|&Z8o3TtFIq~+bir_c5lP(lhd|gexHy0dt>-Z zc_y@G_u?#>&+KU(>4sUoz`bSkHjG}Mv<PL=*M2G5}mxS7OZ1sicHl{{7)=^gYlu`AN~J8JR9F~H7_)L6+xjCN8L z7i&v0G1S?zBQuSCzHzgkEv2as}zp{mL4_bF7dOBg}t&nsV6Q|6B8!fH1eXc^@!v53BKv3aN+~6pv5dNu3U>t=mH*J|RjP9BbWE=}C zy~6II{FSfVocb!99$#OQAaDr1xr&aXL3$P*CP|ch{ez~VjB*#99~5Fz@xw8vNpHUr zGA8-1oC~H55<;1m2f_U#Q7>p0y`ImU7t{7*&Gsq9RI3n5T6!;vi1j@CbOqwQIV2P| z6>(kZ@aJR-xm`2ixG9C*p^v*eE@nw3=ViU_nH&YWel!Jh(R&XG2TJs~$` z3`Cqh{)m%VhGYLG&Imu0herC0A4kIVp3z>f_ft(ci%6ya+d{O-Qtn_ytoj+4f zBbS{=Nme_^t8b-SWp1|Gg50i!*Dk^MOd zXC2AvlyhEC{1X)0!1h? z9>*|IlI>2l<-44ZBa3Jh^lIN-=CQz0iza{NTKU&!^5-T0Oicc( ziJ?x}N-}0QAwI>ZWtex!lv-RueAAm;-LGTRU-^m^`RdFqjDgxRR40NTR;i`ZV_LHi z{4mWJah1rc^}}0#jYSt?HF|u7ibVhJX{ zt_iLJ`INTw-~Y2y>vf@WSF~xO-Hn^Br`{EK7OQtY0pgfYR;EspJd60@PKh+OMEG0el%)y@YiiawAE}O$3jq?x zjN5Y@KmWVvdfZo)J~W1uUl#qHi)HYG`|-R^L|`jg$NS=MDT_t2z3I6vB#NrYTAdC_eOjC9+MfJN%=)O#R%OKW`&8}Aqh#{vC^wzR z!r4{AfggTb&@>BDl~9p%%Qw)IKe@56VKbvNB8v$X=}Aol-Baa4B2Vi{ETSxiEgIAj zR*6YZ#6lHI@bu}_$vBMCYN#k~*7 z$fsN*lNYl2Wcq12W9}RIUtWHFHj%SYpP2?S9g$a86PAmM5DNR|r-DOiK>X3O@uC;$DAo6T<4ss6wMb9dXrJQ{o!>`! zq6(BX8mWbzq{TxueSDo-i%hva$)>@rEsZ<07v(krkW7 z9mi_x@TFAK+!5wOL6+QHNfeVokx)J%7Wc#*gOjLU@}v}y*%a%Zj9rXTq0$RISzeDD zMJ}th(AWv@6scIn^2v2|S@QoYkhXG;OC0?%g{q`5EiX%`oQhPs#z{4_UFCui_e0`m z?2N0f$TmT3OzQ8BT=)sn46_5&0BX|=4=#yhYMV+?q6?l zA8+d?dAPgC5N@#blRVt=MRUHWs!VtPXh)nT|?_KupIH`*|@~JW#&JOnTuOPV;)}UX%-FDQCT`{3ER~?i+^HQ zUv0b(=kPlaZYt@LlPmGQKp8VCygY08B1+jJeGc+3K7ffhO648itv*spPnUF1Xb9B4 zl3w`Hy;@e;Sio0h*s2L@m2Jyt=_>x3h%(J)N7h_uV=|-@o^!}}nFPH2;#j@mv^mDb-`uh zVBptUriCB6{;lukB;YG^Bi#;6Rt!lq5>nRNkuxlu=Vg_&w5W6?V%DN)Ro!yrpNbFb zPT(gKUf?I%2}d_uz?czX;v$v%8jo)p6R9bapi{3hU`-Q-lBi>%9npl z#5m}XkytH0Q$>(ypvia|8G|7UGt;;1fA+799C84X5F!R;&lb?3V z-{ugRMR62FgZs;vZ^`{NDJ}0-iYt}!US-*Vnu;FO@nmpCVNv&KRlIFPzFpq1yIti! z{V-z#mi$AoM+x|r@74cIv&0Vv@|(LM3$MeJWPa+2T2)iui;(zu+5S^X>VHg?!pX!W zWKmGuI7v6KW&)>JpD|uB2URCi)gZZkz8Cl;WmV!!p|!CvOMLlhpJlW!^V#@p#W5HA zN9ScCq-<1{Y}-hwF5rH&VGvO2~ulANNfE1 zj`CFbz?3}ANf6vC38T?y#6nl(9@NSzj4NRjkTUT)QUXS9i)#+zem!S->PLCXG1Fn> z*D{6p8Pb!t@=1_JiXZZ`K-};ca)F=9T%uG-@{pU*wPI{VUB|%BvVd{a6(P@*G^az} z`H3I;e0h6iP}q&CxNtd+8dx66vC3KWq9BOwM9JHyO2Ea%GljVS%+pLJ(vwsP8JFoK zxtE1Ri)yFRyhwt3#Ysf!Iq@=4_^~x9Z zVdN^-n!>4uIymtQCb%kUr}NW5)`pc4*i=c`ElWtiw}#4%VBR#X5^<~gPp*jP7da10 zbFGN$7S;Gx^ju|ly+1!Ky6-7RS%a>X;z0m$)5Q)DD@Y_suwnjhV{ER%U_z4?H1n_Ejk?Ao-%OYvM}?B%%Ca? z5te=(-r42E1$43NRPs}WgDbLy52~zjEB)G0J}7gSOI@*YvnW;DaiY?V9|V_oenyA2 zU=jN!syw?zk;?ST(fO@bC92K))|k4@TS`Sflv;VVat5cW_AQvh$%R*@p{8>wf}mC_ zvbqc@>&TUrIb{B0=|77@CG}lKNm8r3H}+}?i(tZ?RajztRPuENE>nxpjz~5V6c^^+ z?SvDeEF1hi6FiZRs3=eC35hJc9lJO|igccr#>rp~xi`FuUunR7OjPv6d- z4)rIABzEsZk@k$(b>JTyC}iR+5L|>`aVhmOp-!V~!VRQsR;Deo5)t zI{wP-`4D2F{t90gX;FiJP@yp~cePH72WEu+r;ubID6H;$af{98tXKM*RN)noCBa=^ zq^^^Cs#p*ecj&W7i4)n$#A1|)s3=k^2PWRBsoXQFO7cp+s7e@xH7PJnK<%3+MLKQ2 zcboDa>nW3U)uk|V6hZ!wWYxNI<$<67Ll#bwoE0xOE93V;MB1oKu_SR^7HpNPnGJ84vDd@!V2k5apGh)m|y$f}Lv}BC$5) z3zPV_BxB0uO21(#=OfBhxUyVGt#{emG!2JkqHEz7EH)(nWd3Mm zC0?o1vv09@oWn2OzOj5ruadz``Rco0l9YTcW$^?_m&FqarP4Qb39l{=$Av4#dDPPf zL~rGZJXx?u2%H+XS4qZG#a&7zwO(FjR(Ova?J5vq1Z$tpqez*k*-_R6ET|pVqNw## zYw+~xgH)vuh!f`RE_?8xLsg224(fl5t5hi1fWVY|P%F7G!v|qiy`Tjnj6Lg%E>SCO zu2E0j%$mA`%O!DfnKp7+Z`qC7Irn5a^t?N-LZG(2^1ATSYk8ZqolaIgZ9G=U#yVLL z4W!#A9r|%qULc5W{1%GZa($`nf0?#a(b!Z~QkrW@74EreQb(<5{GxUjooMQ{>BrEB zYBM}f9~!GEwHsuT!LBck`KXVh8()0EnPW29;;On;E_i29T_2MgKmj$0yBI|fmA8Yc zOXG!-!vXp~_jrT3_Ife!+Uo+K-M*+ErLOIZB+5Aph>yeSQ4R6J#hsrGh0bvvxf|OX zB@N5=Mn&gCm=P87O>U0ygXmp0$JArt59MQc`gEtLCYz2!Z?c%KxO>BuGT9}kz!NUq zFe{6?xGZKNSJ`})a#Tfa|M3&XRfGH1FFwzGR@uAjCaR>HxWjYu?o+(C^v zU%O8GVHJSQ239nFtfBp|{nz5(c;EFW{6zigd5`{=@iVFCkvo1QwU@;~qdoutz|b`D z696#%6JbOD0cud!Av84u{s0g*G5$dT4?g-Ie)u8h=Kl|1?Y^c5_b2)H`|tgqcf>hR z6;cppNfG;Wf}F*PAIb_G!|{8$aU|J+}v>t8#+ z|6b(`J&_H1!$N)mOsl}PKR1JZZ3*&d8w)we~u03;t|6*uRf6-?A@}23|Os`6|=jFB0eM* zy7fPoj&R9?(j5mm8s9QnW1J1>niy*NhgwLQ^7lVl=zd54nwZ@`?uc* zUkQK!MaqubZq27pW0AmMFaQQKgTagiZjM&`_&|s;wb00txltkhky%TV^)GKl?8yao ztpEO?KQ!e3es45+TK|vn(Di>!SF#ZbPA&!!v`YAuFgD;^z;d>@mN5%;uEfNHN*mhB z%VDxW;2Ej#96T#8=bXNfLPGgc7jDYZ6;*+Y{IURpM1U$ybU%GMkfo2lVsU_!^ENep zQYD-nyJ|uSR5r*DK+JZ14N{3C$MP+~i!@%r*HbHcj7nM`B~LoA!UNtLI=~E^2M)t1 zz+@EV@R?0^3=*1*k)ArKW8#5lwQ`vvmi+-)=fB0%g#XKUcb|v<4+fK7h5t{+PyGKe zo?814VQRVsh?-mJbhwe%=PXtqep=MV>?0?cXEm;HGX*nINDS;Ilt$*8d)QV)1?owx zY((Oc7!T*D@k*TjH(bSTSdurYNBs@~R4L+%D?3&+>yT6fZ7O)U@l>!B#-$vwz;@q7 z1y1uV58$Dw@Jf5OvJ9|HheeT~Y0O_MLsK_6zNq`!GFB4?Ud(F_UYRfeRLJdW&PH;d zkU?+qSRZta_E{R9RcT&BcLSJWz|rUKJxFwHqG4kE+L+2skgcGrX1=t_4dpD!($F%9 zPeQ_Hdm8QkG7Rp10>F;_e>j?&=Rf_ybo#XaKgP4q{x7G)!wLWrY!eAU7Jd=|{tZNc z+;)7U)#OJv5{+jC&LKvNEzxI%Qtn+NHUT{w5LrV#TZBmn4ilunD}i(>U(z^^lEn{M z$UZAXo5LsuhjgLLfp?i=0KtY{os-pR9&WOTlm&G7Wzq4516iNVQg-U{;e&!! zgXx&7hy&9sL1}<~t?TJwnghRB=L-by{J4SCZ5isd-0r1q0A`Xr40iGah9q&x*xgz_Ho;LlLj3 zYRP9}Ly8TMnlYb?57aJyXtEiBC{J4HfoGjgo%LVGe5dWdyPxr24xip$Q^S8*9q29d z;UsMI{d4dP$I1|xB*aw~AI*U;lWD0RdB3zHl+zdB5C}o+%T4#ojR!m&vrdKRJ<#b~ znLE3VWo&I$nxw7PLEMRvA@@{9u%w}FGSp$d`v?f-_`5U?QSK@2SjlEi1e9Z+-O5wW zeym-p6TekJR9#(Bqu685TC=a#&eOf1b40sJ1ut# z8;lESJ*k*E?q}ps_v{9pA^+TNGsML{<;7|1zU^)gDS87^u53SSE1G(uT@7#5&WF$L zz}$rYONYnL2%|D!yV|KFe>O+q5EDNevd+7p6YoWhXj;=@LeJSWRn z++;Ol0KegDiIo)19o7K#vH}g+=a&H{)UCqBy4dDa){*BwmPK7+SjPIR#f)@WM7r}# zJU3ZFV+QM@v=zNgmNdi5jA+n;Y@%v&qKO*KP%|%;w?Iu)ZH}6#u>-ZQ*HIjn{+TP7 zsi@fOzruM@-P(G<0krgYuXh^X1iAxy)kmEMAvp_zbe&+M?A&&!V}y-od-bT#Ng`3bJe`6Wj1AKl9e$KUtEuUY z&2x`uO1sJ#5<#wOo)A%pmGX^mdsJI8&HU`>z<%h{#@es6w zXjq0-D=_^I*O-PWp`J~OHJF)@c`(iEG)BK8$5D#7?lS7|Y-;2%>T032zh{M8S7FjT zGvqV~eTFnze%>xdW(fAGuVAk<~3S7;x{;YZN0`ApcUlwz$>Wi7Rj|%UI|-a7r?N zJUy|={?D}Y{Uv}M`+slTGtYl}!|CX0|9^~!@BawgSTZ8=P29az3%iYFGnPD?0sd|H zH1n2!lfhrtsJel1yA)wjG{M+Qj$Yle|94Ygnyr7zdOw%{?_kuc$p7Qf)B1mur(*vR z$&&W8_eeu>odd84!rs*XS44hSEI{Iw;a?}Fs>8pIe^zWa0?t11K15wdw2#t9SZlVq zkFe-WQy*cycb_Rfh#X+Oxu#~KvU*$3&jZEtQ=Cf|+GO1|DeJsFZ^V?`?v{hOun89>XjzzTs=iS)z#A=>2K%iDSPnb>ABC-V*iIs^=dB$?2`Yd=K0TH z&>uYA|9+H5k^fcwy0splJ1b7kwSC=wkPCdvI{?OKcp zMk5uQjn&rE=;HMQDp|6@FR#DBQq)8U~bKxr;H zyvVbS6xI3Cl3#LWfzG?AHlEdR1E`DhV9ot>uLMNL%23vlsNlE^e?TwlarHgBhS`~&GC~#W9A_b90Hq9 z5*bKu5vMa4d*E5cclO`K6#tt%4dj33pns%X*f@Ht+`rhZ5$uxx2YoaC$7nhnJjwr$ z@i6&ci2gVgQT>hUIcahr!v2dTd<3F|UkgR072gs5pXO8E9s9p>Psic~1LTILYsCVUu%5lg;&Ea9+cb7s$ldm!;Y6HP6!(-6FM%FA7Y} zzA5d&N>8iEd9=~4N~8+FiedHWD{#SaXNMYEGGk$NMXL;Nwchg+(k5LuV3rw{N^7`r z3!sEwbsDwxKp9hBk8SBGWq&6AN$G07e_*HLCCpRKGfk{%wx!;_uqI1bX9 zu7#c9o$A(t65Qz?Yr*yRZ!HJ?S)aY-e=cz}IS|<8|1+JM{(qzK^hy4Ilt-TbX(ED| zxSF2>MoEG4+JnG4iI^;Np7KzBKcHEzPl2Zy48_+A^3l&xmKG6C^DX%F>9nRGh70iN zlgD6Qt>c&l<1nm|dYw!bqXzA2mUS(|I{(Strh5k{*_<9I+XK(ZUBBswLZpeO6CH*-~ntsAYMI z(;$sc!R`6g0n8VLI#1l7NlAKm#iAJ7yVM0|B806eVH%P3cEd`F&k zBcvjnDW+VeqUl$GCTNs#y<0RA8PK{RI!n!T6&v9wcECI zTV_(%p8J2RD*-$9|9*dJ=KmY@CQtc4ALWtz|C{&Vtb6?@oK)5$VPWqi& z@RQ2-JA3xz|7`1iDE>dJ=zsm*)BTS}c_jbm=Ip~9%~6h$AW9Zs5#ds}=@?2Nh!UJC z2Pn*J-r{t}ZgGE%9ip|Y$2LMsAkP-kB7-3vPWFJHD{cn7CJrpx=A}6&aLNArG(@Lh zFrJW20HYP(+q&QmZKb@*%$u1_gnhE={n4K0{9lCIYiayz690Krk^cw1C;$IPc_jar zp&RdO{F8wkt)@Tm)n@n;-*%Y&^kPknetHevVnHx zw{Op0et&U!(84~bgunbFS_kFqc_`bUN{`QP86*=JCLxPZaWspPqhd+_?gsRqB1R|! zQ8JH`2yb^I{lG?=&-m=a|7ABDUIy90|9jJM)&4Vmy8rPgkIVl{jpX~7&R=CvU$^U5 zB~-B8@k@5$vv_^kwz<#j^HtKO*5j*{Fy4Iqi%8H^{^RjhA4dKgjm-OBqyG3Q{`;dm zQvQ=s#o6e#wE4=w;!5~z_X4(sA$OW=&nd+3VYdH0t*&TLv)Q(?*ot-~>RY&qPr*la zqC*vTAptHi&fdn<>+fwwPZLji$36aWk!OMak$s`Eu6iG29>s`t@(8c8Bl(>+Y`;Bb zQa4WTA|Ve2afA{qfUomd&y#9i)d+H!A->QnH!R%kEsFB4!#~s6TRBR;akT+M90fXj zQinN=85bPlG=T9kEwFrRUV8zgFK}LCi=f#^i34=NY{T>bNAC@Jni^DUl>Pk*~EPy{l7mQneyLs_>}+aQ63ln7uSK(eA?q$(ijce=069eGZMExBZ9;zwB*m zeZRP8U?0)f;-Q22Jnc2VuV+vG|B&$?hSQ13|3{P2lm7oGPv!pSeUE=FT(Ug<mVvtO-LlcQg)!u^6hv~c_uZ*Knk=I!@yUjFdZh~UuhrJPHjLF;xp(TzWw0pTrFqCGgObfRdAef03QUgUNkYNy%$$ZzR`7TQ`KmvJ;`N~V z>68WyzgWT?g}y8($jFdkU)>i)4V#BHOwv+P@xLIVji}kg-+`2kqYX+>QC#Kej5egb zXzKFN-OOs)KgIujoaZyd|1fpO?&r!5`b=dvO+CAxxjegn zyt;gQ_QUOWr!1nnv8^;=xy{(^M=+a=P!jw;+??92e`%?1WdYo|{wLM@zfb-@kMp?f ze?N(leh>>FXBqW;LpcVqTlY$w?rGnXCcBDzq=AWM>+5_53!l>G#&^0Nbo}>T|1B&) zyX-%c;n-OJUtzOs6V*gZBUa zcBqE5n;5ifOqJb}`Hy0rK{!w(kavsTpUF`3nVtsnA5Q?#{@%ZMcKLryEAk%^0H5T) z$9QVc!lm? z`u7@m3iH}Gh=b7>1^Y0Wbp_sLI$ak#-jPpNfP26sx{Mf=7Rc+eEY4zZD8O|zBc^Ku zX|{i~;r}A{P+JG^dj8+)KOoUotD5sK75W2so=Se3uiV6d7c5!{hz*fPT?ZTQ}#V zE2Ti-099(<(fjU~q)#p=)s*Uz$wco__Y%})R+WmQA!2Rb@VrFE|% zIue!pHeAYKx=dya1Zr@4x7R^;@Zg5)5@OQ}D zmG(li(p~hj&)6y~NeeP6b&IH`!NS&9r_x_jow4{NSlM7%hciN^1aZ;Hp#rIU@9$0l zs;D;}&LNsdce2mrZ1SV@C{NdzruD-4HcO)f7oOt!Rwy6Tv{LWTj2^@Y>wnW`lyTQlwklJ{Q=E?6R8!Yl$9qjMzErvXsOZ(y)D^*=*! z^>EBmoDzoZMehSdbEw)Hd*)vwdOYP{qfJB>td;9VbKsZgI8me|P|8VS*cq#3MCFfs z9hX*PJ^~vH`Pqn-t<&7JmO)rzoRz~$^Utc`6O|(omYY@?J$buF3idW>w_B}|apBb> z)9U$kwMkLQ6K%!fg=8A?m6UjsDn2SkN>%z>lawtuX)~A6JQF7)l;$*|q;=w}b6xTU z<2$K+OVdGp_)v1fs~pXv_Z|aIKHI=nFaux)gFBRjr`pTiNC1(e*{rB;P=e5vx`3v1 zu2uygS+8a&XVuH(h?Rb5l8u4U!*E zjQ`aij-KMbKg!eE{&yt~fia8wavsBI^;xWe*+xkRWii#M;SZFs5%sn@ho#Ph1)R1z z{UBI76MmMJY3!SsDj&wQ$Dt%C28ZZZdr7bB84210L?%$zfN=NUa06*Mf5MNfs>PyZzIoC5G#b@pcrHFz#(8Z zRE1}F<+5GG=?ummc&6GblqtiUZOTbm{?<@cirMaoJ(#CRoBdx1$`5<~*PHgI=KlY5 z{`Xi<>-}FGsCsn9YowIat=-Cp>LG@;wTmlnN6FVI48MjkOaheG<7G};rJ|sN z{!T;QR=my>EjoLf!}&Z4$~zV%fwWInN?9t`wW;EGL#4uNm@LF`kn8KIYu&n_Ij4A6 zAF5r0;p#?#3c}mY<}A-3D`ULW1zKB$dZ5e`&kCA-a#6(&rwK`%90keAUg#6#;;O9| zU8UREdKO2;@-oFljo6-rA>oH&O1Qpi)U5}hHBR?2!(LDJpy!GiT-zBnl*ubK7Z$ZK zYt~F(HEFUeNxHeyFJCG<#5468kJg&pPV|p7yaZu0dLg>Wc=UMJ@$ts__4fQqIb0U+ zPr>c^)q%|dT$U(1Z$Z{PMzKQB+9)fO(t(9Ohg3AvSnXvRQtL9=oS2n`?NAiCgn#UG zWGBTdr3>PfvUA#XcH5k0$L$Gn?n)ikXR?iS_*#!qfYbcc#v#}z$12r7^EK)AM|G`D zb%fkq51rir+pkzGqj$o8ocSN!ED!is8 zx2fYdtZ5t1DVfP}Pdz$uuOa&Z=b!Lw<&W^}VgGr{l(yzppk4QWh86$s;b{1D|NBuM zYX7-Lc%3Ia*#=cPDJx($A0ES7xBE1<<(L}2V!q%E=!$Zv(-+LDT7I|lHDBXv-8#l* zcwNi540^+ieYric9g)9#;4nss4y&WGJ$m{1P#9${Q^vNbrA#15$ScfHfA_vD{_g!R zPr4(JoyP63nxlfSWai|!i)MO<4Vvjr)1-zc2CE~*FE%F(f^r;Qa1yp5AQ7TOea!$T zVcwx_VIcky%%i-(Zr^DI;Dgx4{|rwP{x5E?6-Siy!^Vlf__KrmkEY{E<^JdR>HPmu z9vcUj*L>M%d!@-+xsA`hf$BAVK1CGq^1}n)52-UhKi(yY58^rvv;BwYedQ9-A?0G` zTh7N6DAa3@@bYIwO?(?=UfD<9xzT8-^qZ^0qzbj&D&-+w()UN@JKnGXN*>qKK4|s` z^2XE;KB)eri`?`A6_bFxzRhA)Qy@A5?cob>Sb8avLeHGumbAPbhVji*EsfGTNga-0 z0{M#XV@c8%;E?S;tWbw}{W)RQsi>?W_;BTY^;5ZVJy&Gh2d5V{u3m7sh#m?qYZ zUK+L>P3>q(w{6)BSk6W)hZr>tW%fpF&0N{+m%98azj7|>xvUmiP$P+$I&M|&iFI$8 zN@ImHz!8x7d8Fmfn5A?$g|*cjTV+y6j%lfGpDfnqD5q1wa)xLtW`ON>y9ez90x*Dv z|5BTC+KSs&p2jgZSLHAX&*E$eFV`zDR-J1E5{3a*Dl_X=+pd9kIjvy0rC^>8RC$KR!Ks71O|{CHf2b^jP! z@)_<5W4$ZnX@y*k7+$mD_K>r9d6%eTJq2!to{rmot!jQs`j%CizDyS>uIZGZWu)Vd z?rGGHx*kQ4b)xJ|<@!~}>Q}|xUn)8qnU-(^qnO<=C&~lQqFbi46PW!y`Lg(X;sLMQ z?b4mLb@1tD+J&#~hYz57S4=$!YPCf%-vHe=2gilnf^b~;0pCsRgrH~B!Qar95#l4j z=?%`KWKqVK);1Xe@eXb4Am-5qV$>AmhsTIc`}BP7r}h5dKK#$l_`m&%{jdL&|L>6= zasHD>XoCP@r$=+hRbDdO(L4$uMj$G9Ligd1!J`$2*9Lo;#q0Nwu+G)Gz%LQX z&eLqGSk1~^P593;EC{SO8I}IE4eoDf%e*DT+4xS3%EqK~wA$0RS&j;n;L`iQtE!CR z2cxISC$)o-1AQ16a|d^53sP+u>Itvx3BNm10#Ct?Of$Ln+cu+;qPr-?Hm&xgQZ~Ea z9j*2xO^c;0mneu55WPPyzZSK0D`&jTLtnns{o1AdTWbd#N|#)de7-_9MGWceTsLYj z=Xtu4(WI$ZSKG54J$lAbqLX8P#7iZoo;I>Mt$owSzF}R}MY@8qT$N(Z(dxcR$tq9d zh4>;OYp;g6Jqd@u=clRsN4_1sRSatn=l|2249xhy!(sm^|No;rG{?$0yQigI@L&cWHhXr!e%34Dk!xjm)pcDNgiWx^5;I<#QOI;+#vMv?UtVid4Ki zF8od350c0al3-4BX%TasHu=vqN`UtqczeKh*ioC(pk?=e12)-i{cF*#8Z&^M{(pmB z#s9DOl>hBf9+qP%j?;JGZ|fQ2HZq>^C1rNd5GB5I>01M!-IbtJ_cY;2?4PTZly-g5 zzF4UWAmiSmA@~BthY@C3o@RMOgqPCpN8Rnr=(VkSrG|AYJH@WYdYt7%$-*ZLDN2tv zeNVS<7ihIX`FXm^X#BnZ>ihi@&ti?+Nl{-9<-jqRAq=%9t*Rzt_)8SrNn#Y3wYP0Y zjxyM1*Es8K)+H@UUZsc7^Vr046G&w<{y72SpJkcg@AQ->Gj2R@l-Qls zDz4BPRX8h{zy%7sGoDmToCV#KLCLCY_D0;Cx(8(|WawJ)+mST2%+GA88zlvXNr3d8 zscvRZ-1Xn}X~+NBWP0HEFQe(yl>Z04>68D*qdb&Py?UQPo@13>|sZ^5r?7)SGnY!q2W z2gE=42{GujJSJ_B!70ED1#n#;P^2qF6*$J#*)Yx{6o>4}Q5>xzj6#+!H!8s4Y)gmu z<>d`28zl>xpt0j0T+Bhvb^r#1=kP4}Y@qKVo(p(}z`7uK764M@IkxpvrgRcgrcF}o zS7b@=!G_=)o(STB=2`_@b-q=K7;{eaZuh*?Gvk@{ob737C(I?soUJW^Y36;!pH_}N zza*!L2F7hLj)}cYr2)NC8JC@Ut?MwF-Y%0WB3py3TCHp>Z7Z1#T4U=74-mhU&uF{eV_=F2IS_mpjWcP0F$03CL*G~Q~ z5MH;<{<-`7Z#t^Pf9wyQ&i@|eu}oPy$cpFp(O2MmlrPvih|>VZd<*1`5<+$0(H_}1 z&Up*))lun)V9axIztRUvQ)g?OE>MDUvhvE=2{Kp|@6tRh=>2hoLKN1)4pD}Z5G6rG zZ>R_`ew6%^T2ty;%~2Q?_iB(rXw=pU<`E2M_iBy9FxzWnxM{ckMM%hpwEqqU(|#rY z?_ly2|Km{}D&5>`dE58BO(h1aA|!H9nkK^`mI-P??s`{SYh9q+QsppRMYz=XSWPnk z`ik^AENidU1*ViB+R?i_!pOu*ZB7FveFA;pl~*eSHd;$I$>V^+Ir<9Ff*?!7v(lO1 zbyQ#$kV}8hNMBx;RKLB90xUzSl%@2n_m*Z9fTf$G1vC?!*&r*G${U#iCzvEDr7i84 zy=7|)HcaGr>g6?3^ENvUx-uiWMpE{wLQVF%5g`@XGA`k}XsG~hOvV__s#L5rYl5$# zp;8%m;s{44V+?0jDwZ{^lhpcIr>?a~TS~(wQ`g;6Gt!s!?GxFKPhGoB#{@d&w~o<{ z0WxR1`NcIXpJ(n{;kO-!rYphPSS?ertOBiBPHPs$sN^YS5`dD^DgFdX}@0>#Al(B4|O0pUW%yQea+%MHk6)KlU zxtP_!HLLBCi1oY1PMXhYWm!sM>%nIPDJ*T)GARbD(N0kVy%~$btBl54Gn;gDLElek z?K&K+I8&NBcM791Dg0J(mq90-lb|9tnV%kQ=o@TJ49reR%nEalvDUHxnCNQTRb`ZS zY)yQCZQ_~MLW7~z29`VEmBT3_Q>mL(lq~kztW@B??~O|IumKw;2vyjypqd0!$AWob zZ4~9zAamvM!dBK>{nlpf37ng)yJ}kx#cmytACA@X25fBB(e@rJR%xU?dld`CV6EEg z&pxyd#!jp79)y*0uogC2ZLl2+Eg?5&pRXt#>7~;sMhg@I8q_SpTcRnT_ZYleqC}Nv zBYt$Oa8~WGl+`|GwS5I}<#f#==eqfg37N)p<)A&A8#SMww3h|kAW*EcEJiDoU>JX! zr|YZ$I0f{)Y009oh`W{gwn4M1^9rXg0AcZ9JULcyr4wSImngr6X!EV>+ag<6zX`0f zH72CayC}gZCqtw3fHxN<)*d)UCriT{V}LAFv3KmnzEF%Aca~-34NY!GI<=5PVFA)^ z@|6W`)E7es20bvS#@*i^KYGjg+p8aTEe%o3HvAm9(FpW=Qzvdgx|&4^bLC*>To}iW zi7obNbt)I@tekE^ngkH*^IIEng?0+2HA}QQF@RS^&QtN|Rzx}O&roh3B9N+PcSv(= z;qeXj6cxN?$+zt*zf&=3;05F51Hi8h64mdjA5D6WG3kykdSNFB~@S<_O7VQ~*)h9u1i`Fj6^_fQ-5hI)h zL@{`s$w5t4$kQn(aY3p%yjbK^nKQFY#?=9b;4VtS3u*)?!?);VR8WVNi=r<;zc&~W zZYg=B6^a(5RrLA=llL85gliW%`dKaF{OkTWXM1D2lN**hhJ@&1N}MTpCX1{F=B*bf z)wSjlB}+c2$&viE##sz3H5h`MnLy}!oi~^~P}{02FLx@C8b<*hS#Mqm$FX1Wru1&K zYzc;;C!thzR@*YJ*p~(8!DdEG^eYhlsnIHn(bbRVo)uN#Vd|gjWt*TnKb-KsyV?P6 znHKm8;-wyv+bFrqO--;GgM?rGbwMkgt=28JefLxF7@i_qm~x!B(Z8+n-|npQdSZS>wAK=o@cBo;?b_T&MLd6yvK@5m6!k28F1}& ztwZ)kQ++v<%B3eodo;Sl6;ms-79~f; z(i6YCf&3E%%M|?OOjFN;G|y3h$%w0*)c61LpC3L{6EVOrB%e2#NY3<46eBtBX!6$- zvwRSiD*R$kRM6rcpm}P8W%@1w-D@zO9G{LS$KYs_B}bx#{{+Eum4@W|;y>Q$-@wO@ zfc1%$nZrmVv)g0|j}rTw-a6f;YclW&>F4D)H=7YSJAYmLZ`w&lN){4}tiZR=!LwyX zEn4OTSFk0MkMn^~pI9D-Y~?eK#1bnMBBF!Q2RGJLD4#ynm&;uOZPJAVjWzNK7JUYb0mSEq&7gDIdK8sQw2Xg_)#3>O_e z01$nDwT|PfG>(F;CJwPWnfzGF1e#32%2leDHWEiJ3vhYvNf z$u3<{!x82S&Z@~@4}smo;b!_RxCP1|-~4d( z_F+Lj1hfw_`o^Kt44ESszDeTkb(&%#ixt}fqZO6JoK=X9bD1Wj3aCh6Hz=<1j6%eqRYp0Y<845mVxedLcwh2yGAP`6f9 z4^4Q*K%}xW5Le&tLR>A|7ICfaZp4jud{{pUmRB;o<4Sd#Z=5z!P_m((0s16SyaqM% z3ID|VD}JdCgW7b`id$y30l}a_b^ma+{jVO9ocMKqA>Ml6@fuGPlgDygMe1MUS_g=i)%uDsy6^$#u7?3mCj z^4>FT@mYwe?H+a5mCKS3x&hg(q#Hj_vJtyR^(2OW)J?O1vvP$UcY%CWa$=1SmvyY{ zSDh=s%JI7ney_K(lh5lD$4VAQ+$Dm3v;H>Jy|l)u$AcJzN_gi|>*GF6K94|Sm!BzT ztOkiLp{Pc)5*VMsHjA3lic6HPLpo1q$d0vi2|N1g0I)y_>|EqFU!%*j8*p=e_WBhN z@jOC6U0aiR$~s9(R_)D%2OI#+L!kU9PAEJYvyb}7Rh(i!$|D3?RQ04N0ZE6n@|DB% zZMTy@+uuO`WN7=NJbT#xvNUWL0cOYf@1$3a|1=ps#eaR2huQxQZkIGX1~cbHI7*Wm z`=5W%$N-q7p&I{16Nja#jiq3v9L9WCYmKS8>Q+M()@*jRc!s{i>|$}$r_D7tO1b=s z^=9%Yr2u1C6e9R`F(Pb}o8Ea95v z3!RZD-=N&~wLmZrmTV7}Z>{Iq)wU=#_>cSBHtiVGvdW87@bf<&uqn0s0El1h8&Upb zhpIQ?YD>b?M3p*)`MH5Pc9FvXU7aNRwuny9A+G> zr$vms2s@#uDY`UNRUz@2@k#T**DN67Hp?B)t$2sFg{y&&V4Xz2f{&m`b4;^nbqwoB zd3q&MB|1Rqwn;^EEE3{X$`q@aVa8FOV`k`wOkqgH2pBtNh_!%wo^ZzlZGioUAHiBnRvqT$Kw3Yy zA5I&XU4z<6yEYYT{@n>-a3&yOKpZAxIk~BmznaZb62kP(pLx*!J^wPB} z{=Pp{oMvg9F19yWj$nA6CI!x6#NA|^A0MLK80BR^1m$N-*iTCQpWxX`|Icx&7_d9^ z|NeAT$^SU$Kk5IE@=(L(6}`?T6@HQDKvVb|sQc9NtEA|V7h_}nwy^y+g^_zg`abF@ zBXn^fh`AT61gT;a6aSix8R=eBw@PefdK<`QIqnwD^%z<7UtSL9V zKZsjvvL8xkX)m71JBKELbjK>?Fz!Qn)~enUJgj*6lphsKvL0#w%{pfe{RIe9DrXhz zjFN@47xKQ)D*_Uj4-RDs@MZB_`2<*SeikCe+Pvaw&BY&5fOS!UQ(D5=wL(o#$?_DZ zK^kjssn-YkRr%_DcYAx~QP+;@`y1Pb+jCl;os96er{MPds&ax;ekF)k5vtzCbOY74 zetcQu+*TN9r>Pf-_opi+_BndxNGyh?eK?B2ea0*ZYrG8EWcAO_kVYdFM~oVM^`gafJ*Q( zqi13VRN64MI`a$pV8_#2Vw`=8@Tq4THM6vkCNk>x`sKzGJ);t|E7@?xI_LM40~q&m(h4UdXoPhz znd*M?aL}qPpT&AhDNs$~D6b8kz9_ZSBf1D_OC8gofPPg2S;%WbEFuJJNX-mqX-NbC z6HpvUDHWS6D_=sW0qs|y>F85AM~mimm>?B|*Y!Hg7GT`6G;Uay4%I9epN5ixwRW#k zy>;pDI3Q7Ah)WcJyP2_HZK1FZv6I)vvpT zsb-*_PA4Ab*?a$QVF22(|BuE~)BkTc9!;M1|HpW!{b%?7-^dmu&y@}PwP1+qPVW`~ zq()V~c9^ilKlvwp=qvCBFH!z3DiC03(4_DPT>W^? zO!Y>yW)BlvHgaQsIiyAeS0yT{RP8cK{|=2z*-b{p*L|tv0 z1fHikvntjhw6lgyC@rsZh|2iKQY>LcyMX*DT|{Mz`XPm|j~QzVcxaX3?aL_F*Oz#! zgur;%M1qGH`-Xd8vv)nzn5$_&P zL-}8I6+U{)6HZ_7eABx$fgSSyxZkhDe;iJq^1naIV~PJL?lKkt5(z#`S28;}wL+n! zSm#7rz+z<-00wzl6kwf&bjqMG!iA74>AZ644?8lMmq(!s!c53^CMB^=_sfk3{A)xn z@cWdRdmMxZ#5t+rur9!>>O{AD0JDgP2s#Cu{=r?8gr|UALONI>3`2+^;gc+jkaDzX zh=3x?kmV)<+q8K5L5{+L^(vfYIod?&n)ykk>D@X5-lp#Xk0D_6ugG9fc9H_}1WS1q z&aPll@DpPLf~SH(d2r4ly#R-R=~zlJpVXHqbj8&0KnHvTv&kq#ff5_M zY`+OGQn(JH*(lvd+Tp0d(b{VWtb(K9=-RFAl7wUl(aQ>#>lGOH?4+?4vi4R0rj$WR zpkE(%cdTs9R#V%8*LlooA&*;sjZcq`zTBLCx%od|Zo0gc)8Vi;p(b~8f$@KTC{WHW zxpSoTwd$z#5@I-m1p;FHE4^Ijagr8AJ1qZqQN*h>L@#)l#7DQ5$FxPx}NKndpX$s6==P~f;cn}b+hGLI4$e2GyJ7msU+G#Ld_iW73u?KH3 zNLN{mFw)!l4Vhg#^vSZ+QU6>ERl&=q$UL3F{9&KH^gmJQB8hN=W1wC4KL!)i|6@!( zKk0vu@L2Req2Fa`Scp_~Vv+zk5w>6nHwZuwq8M&b2nZb;s(F>W#;vuy5`w3k8I=(m zBz()sQTeq?S}&u_dRi<=QOFE|uSdW)%dsfmZ_lRQfmRKrE$?5p8Z;CYGQnt)?9{0GABM`lP+`P=V{h%bo|}1(ANEO zSR+5{Qh%~b-uKx{|I1MrHC6r^-2d+lP5*D|67r<~J;L+*(*Nkhx{vBd0a&#@2Ku*B z_-O0**ZE2?Znf`WG(6f;off7S*r6#^q3xp^S(>cVd3Go*6q>r(vKN(omQ5V`|AxD( zQsZ-o@_ddzj1*rBtbyE2>vJ%BO3RE~?W9`;?bh&{%Cz@sqm?9k--cSrulB~Cq^CdW z(@_3f<0vkU-ty>}QLFGzJLCUP29@}K{ipa(kMq#`|C?xa%I<(fF(OR=#fp$6SfW#Q z8H`4k&YI+G=x5yqdZ69%XJzMhU(}xwu-> z{UeQK&FI}@;N+N*#qI%*t(MO+f}WnQ3jGSi#WmWddLgVC*YFj9%0(e@&56#JHc(j& z4XP!MqKyM)X(;G_ME*{2)P6j&G&J~Okgl>cK?#;)f!^aBeorRtYoTb0WCg|-dV3C| z_gLOjZZJ*?3R2;gNYE>r;zqRx{PKe=TR}ppLi^MKRYdn^%_Y^zq81B}s^EG|aLKk= zlk9S4<>D^W-TjqDUQWf1qR;nxpmJkb-gaJPc&iYtV-}T?Im|NuZaqVJf-oxlC_R#u zPT6hClE9Vbtg*T5Ia;fOVq(Oz74Xm;wv?HUh7)0r(D)|dXPjyl%S8pU2!Q@K!fthf zhy*b$_pygtjoPmE+pNZN+k3p#*nWfU+E?Aft+`4H+C~fR{>#m>*!Em%jTf5HWOb3X zTw+ZYSk01pu+{W9q6TZ}0VEA&FMK#bLs`@DhP6C(00W-UXbMR2BfAEc71_9P+HD^yhV&V&xS2k8qbgy(c47Wo zk8HE2-TE(Zn$ufOtr)?X(c~%q^P@cN*5L{sQ_X`R2xe28>{90$O?UAHDDL3SCME8mtg- zNlbSI=$NfrLAyGvDX${gGHV8?R1r;!1Ta--W{bOPSlX0%Uf-V+Hl`%%{#?|mw#|EA z$z*0LWhcZAQq)!bV2OJua(&pr7^LdB3l?-ff=X!ghoPt=%CjvYjttSDP=Lksqv{yP zr>i=&{BgG8-{fhx|Klv)@GPS(B!FG=|D;!m|J)ls$^Vb?wA%lP3RxBI%x%{E&6Vu*Bmm7GH$P9av+G z>QxSXVc%zW@jLd~zau}pcI*Eg%#$ctw6p;1vj6smBUApLj0R8Z|1q8x>;ES<_yEq* zH3sW~{GF$9O#a1iQMd5ryy4|<;iAU;d!44ZZjD=^sX{tEA~bEdA3=^5=>0cQ5(2NA z|NZabe?0qGEa6~0Ic4FKe>%Iqytw@K6kM0R0wKaEz$gTVA3gxpdd%a1uz(+(=OCk^ z4QZRR#)!pn$9bA8;w{J#L7y9(DJx>1bFHyXT=+Xau+t_XYHS9nA$#C)%|MyXzFTfSV8087IuCnn4@0KV5vvm}Q zgezq*xT9wf2VVesQ;cVRE5&<;8)& zi0~2pKSTe(pZzO8qW>2!mWw0uKk>8JBu6En84T{$8QuGegRlJJU3T!5KZAD%U-@`N z{!a5~aq!jud+-JL5$5zN)y2zK#etvY=|53`5Bw-Z@Q4-9(|;cLn<7X)Tk&Z!LM=t!+O z@qJ%|)B%Ts-k{&@54yeM&H-ub3-C?!{@~y%fb%Vvl^`e(b;L#>M@hP&H&*kMEZ{U( z!_(m$M#+JzLlakrCVO{iY;u%Lsl_+43$q)B%L|C#3C@aHf3qvPX7?MFqi zM#T{+-|09zId*k&ymu!@MkmK=C#MZNIX!9D$>~W=Cr7SMj`ry!Mg{H;{h@D8&(U5T zZAR#_qvM*64wa5-?-j(x6~tEQ1_2nyKuY{T-ff|K{_XksHN$q)a_)`D-1~~(2e-qA zIRg4dzd85{1TliiI%BuPBf4|uEpKI*Ww-+i@V>cT|*BzvmS&hJr`Aa_o7PQph{1r z%FxM}P8`@YTPv1L=2*w$#6&|Moc8SJ^RvVUVxGj=Kf-Elm?a6h?|cOHvHnq;QFFdr5Gl;!r2WNF{}-T4WFhOCe2& ztPpXO+@ais@6ds7v*~Za*VvDSD!x^YXPukF<7U(n12Q}wxd&w6=wP!kx9JUf2M5*; z@&Vxt-8|z53o;AYsU8YJkmflGaJ=QcZzpLFkLx6D*Y>(^?|a6^s`h@+baGY0kM*%V*2lJA;krdi1dsF`(|OntYm_WNlz;-|nj5m?g~t{3Eq>!=fl^MF-@I}Y3dlh>Au4^)rW6d zKYX0!uxY!B3JmXP((E!rDOkcJjQN1_Errrx(oXanPMo6O)G-03`%Zv~Kh|krp8%3Q zsrtAvH^PvUVg)nifz9q>sNS3`@oK@z(sE@_oGW|ckf$d5%2N|vo|@?LlsPq`giB3X zp3V@s&MtgE(}ff6^16dFf`GGp?*WNPdg?c{Rt$&jtQEuI z#N9zV7oP0Pg(o@}o@iXS?4Ztt<1O`A;Wyi0g zyV1nKi6{GV;<2uTPc%-f&_Q9hLSNxWvLJ?Am)bIRsMOQjay2x<9JSOKSB6 z>kLr0V}A=*F&mPWs^pNWlCF8)Qbiv!6(OBPv$Nog6WkrN0 zL(d{Fo@E*9cdw;{(Q`@|W5-rH-ghe<>s#qq+e-TlZ7;)K%URN^nI(ghcHD4qQnB66 zqxa(M!KcO(R+jlrL`i`m^|o@6*uKk;_ub{k`Yu1#c6sGARZ8(iO4%o~_^i-shH^E{ zSDvO=M*Vg5!M>4?_ua_H`bIw1Hu9!NZi8t%No6o~N-AT=Mn2wmBOmJ<`B>Y?dsRv0 zhH1uI@a+#5;&eMsw?uV*uF2F~)K=4tF=8CIV+w=g8m3_1^vC;d`eS|5A8VVwg&2h8 z!7!v@M_>$K9KoVMY~QCQ1O%38fvMAxN*hLpcALWB*lD*NJ2w6CzMKBYq(je22eERa z1XI^gZZ|a=&AzEI4wIW3(?hhJODmO?8(~tU88eYa3EdJH3EGK8gNajd9lE@thI@NO4GpiTq3RXY z>kgdSId^J5QnH2g38(CVkOln+qXjB3q0nSHoX$rRMvayykOSSPg3T=60(Hheq^~** z_^{=Y8rCf-yNo^D+c#@y_+|}N->f=P8%t`~ay|{~=968@9p2YBt7mj{q;|AtEGrf_ zhgojPZmHd#rP4ZcEL5alx_cnLQGp~;86r@_FW&QPIF|D-Yv zu9z2d_f-%_S%E+Xa|{O00SsYA&n5^1qPjcz5eRQlN{jxq-FoX!YkZjcEe{I%?4ZDA zp=YDTuI@x>LJuV{#Av>b;{svlXxIgQ@?r1M=o_OkP)EZ&i#|`YEzs{}`;~K0oPuB( z#UV?q;;^P(?VaJW8QIWeBm=Ri*#1`O6p>chsL>^vqQ3|k# zHYj07N&S|`D1G-a%FyLSHQdvSiqt$Y$kS8FGd0Hg|5_IqWO=%YLIn7gHrDxIxk^JY zhY>qYgKL~-C|^Y^ST&=>xSdARA3HUgp~Hb|xUU1(&^H9w6O{~Ado|JQHZUhVg-;8n z(cm1xRU9Pk&2d4GHzw?1dc-mlV0T5NXJeQ!6p$k`pEa zWj9;rvB>EpIPIvN0@xop6~Ljx5<1-15<2t^iBT08`wg67H1Umewxz|t@3#049hTAI zzLwFUZ^&$_$kuPD>h)XN&--pytf9j$Io#JSIn?cvLthoudM8daTw>AQQjsAP4V$6i zk_Yw|2Xr(B&Cqb}4r=uGrAA+;Mqj6f%NM=xphkaRYV`d6P{*U! z1dpCeuj}ot*Yym&uBYgAy%Xl(>p;c6UV3{gH9bSA=_yLh4pi*J)7x9*?&%_TPZ7E6 zF|muhz5PU9ZkOoml1s0YdkHSbPF(DQYj0n{wWkZNy;5)`XiS`F*ag?#zJhB{7hHR# z;98G{U7YOgD^B*zL76l|!!8H)_LYNrx*XIi5$%aovOo2~4_KG;l+eUCv> zP$`{z#6>oEhXD23H;okq!UetD$?j;U?-F`-Q}NwDIccSzot!w-v#D#_o$kHuPK|AM zYHqt0FDILdcGB+r`NVbnJauj7)4jLzsj;0;&F#GJxSsJY%F$vC^AMn912!-(zye{w z++eLPBdjSG_IoW~TC-cO>*gz{W zPjf;KR}XE%(sW;8X{rk-Q$tRwbdUEbjUB$_%FRvQ4PNf32=XYi+sCI4d1tz>yffA1 zov9)3SO$$9RBW=u^xSdbYZHv7`wB)=T`-y&f)T~nj)u(wM&Iv?#z;qFTt_y}dtj2J zm|hop&9cuYJQ6+o$(AwUMp>Q)s323Fx=%#~%l@w1K{%NZ0S2WTecEJ|uGOS6-BM$C5p7$?jfgSK|D%JOtWJ)G!Y2!sh6Sh7TT zNKfiATx=5z-$#7(T6z1OxSai_4pDo$uc%Eb8iIo+H&h*5D3@EMIpPNF<$6|HS0qkv2u!HGo7QhF87kmy|GbBQJUOC>t_G?}Dl zPSWp5N9esQR>dG)y3UE{sl4U&uhAT`%XVM!qivqlD27|I`{Pt>m@?Q9TV@3j42md3 z0qF!Ak5=v>Cu4_q$kd_ZO!w7srn-(ZHFTURF_&}1Nfg~{f`PJhtBq(GgX(t%b`+mQ5u)fdmIO9KFzdC#Q{j2*2e{2x{ zdpt1mfAz=X-t;N{<6}HufD3-3faY^O_-36jm$^8ak zIHk4|A}^F*!C96ushEg9VL8OLwsx(fbc87$q1b zkTe&h1qL&O-yy^@1hToz3_C=M;rk=bw*Usq2yF<8ixkEL#~C90;^p;!`-IJaYnBI@ z@Ri~~$$EAQe);Q*zTcnty>9OpTJ)vDXb%oPg6lFo_(z(75PSqbqMQiM;N!u^uJU}; z{vm%+h!^ta80`lo)4>4^yBie%g6~kg0sR37^5*vJ_3KwJ!OM&5SLe5{|C_dW!>*1V9CX1I3t=8CQE*3P=AVCE zN5Nf}ED;PA>nKD;$u&z>>8JVPXa$osjF0|rTH}V)_;S$umex7y^}BB}lyu4PA9cVy z$_wltbioZmw3|Qw6x~HG$en{OI4@Cp85KdAhh^!Iz3>-{Bm84=b^F~T%2NRt49 zpD7P-!|fCF?kHHMX@NQi-EQ~bERMl-v{>STNM9)5pb&JytvYZ@Sk zK!{dUbrG)!yAWQ)Jf&-tP|m=^d2^;nStgy*qzBa8J=>Q15~)Cu!Krk@EntGmfCAL0 zm@cA#?Fxc2AHm-c;qJHFjBs~BJ@OYbIIFzA%H+G+9&qqcQQ6K*lf_4Fq68noFCRYr z0zQJ93ylD;O;8s$sEA*Kx=c{s7zzPQz>FOl_<&3N{-kLS>_VkcNy2=Vtq=nNY(*$Pp3`LJb;BngHu^XbdT8N(cf}6f7jX z4=!*61iwjhX1@h|K+@hc%J1nbT+ZEO;UQJe5?B;D1LycB0(urMG6;jy5MQbmk|wxPvzV=y^GpU6VXtsX(F-P zHBA)g`%M$sk~vLO$PYA4WLqt#iLBRhn)q}aO}xqU$RJ)8Y)lvQA|Gjn@h1nMyU4PO z5l}x|zb1fQ(-LLXO_nsCrG_9b=je}Dmy-Set^{4_VAkDaNyq56&k+13ijh7eJ-!0G zQ?da*_r&3)cj_H&vgAnA^~z5~lk-kJ0?T{uB`MuJM19OYN-%WBUvY&I@*t?uzYz0N z5M*OBi=L1&AwuY%WD5Lvb?Lji+(5x(8O05Xv54% zM??c%B;70xyGa_Nqc22TU6_PjnBb@@-f$)zXHkMK=u~vfE>@&=a+N^*Y#ql}X&eQH zI(sp{Oz{=d&MGuNV@XD5CeX$I3LLv2tfL5z-$^_4n&?;~@G*HXn z|M1MSqu$AQcrt>s8AK<&DLNU=`tt#d6?5vrJRG1wh$g{kKIrw~cy==FjmFdAU^EQi zF`D%!;p{jFXVah_8`?U-D7VNcZ#F2;$u>syEmA_LhC=5mR|N&K#%U42nDs;s?0<<67mNmQ*qhEy!hSG=s1FCd z(O^13C!^!}Nl=~9RkXxJBElNcS!(AJFLYRRcFd^KWy~=L&V?9ShFDjuBvhg$o2XCb zonqY1?4i1=8*^sR3Lm5LbOVg0%5a7w{?v>hw|Qu@@9P}nd}9d^s3CZ zuuq3_L|uLfN<>un2!834HZIpR4s1FHAu1xG{AFoaR4Z?yB1)6*qJl8M*U^d^yE&jC zH8L~!H}rl6D-D*cIEYz!118H&{sZ-8^D~&^h_QHu?Ilqx2%&URBx`3?fl{@ug<_pA zkPCWAO#}D}z6ZQ!9q@GmH!zCn%-E+1t-jt65$-TrY+Z2mi3rx&B8MRYvKmp|U&^+N z=R_oqLZKrNf%IDBe>&tmyF-ms8kWomaKi`T23Y~UNnWBDVN|VNg7(2nIz^zZ(dN-#QpLIgdQhvDkTDn#$yDmLyc5k@sv$D^sk!fk?l7e-^ zATd!VnIuv$QuC4YPJd<}y;F|{%k-Xmbn+<{A;(1=yn&aOH)K>u zcZ%myrW7t$Ec7O82CU!~JuQ&x~9dP?Ur{IU%bMSQsT%FzA{Pgk^{N=+3 z;9v8|@6^Zd)2F|H^RfVaP_p?ZPgndG0KPBAg1)b8@8aWa7Q5sGlx(OI3a@W1vxw6f zjQ#mKj>+PXVtLJWff5|$h&p-`F`a1gV*BLKqJlG_>ZDPNHE9qgAQeRfb7BcP<$)eY zokAv4ng(u0RrU3U0%_m5tjW_-p#7w^!MMk)+##tzZ71b%<9Hw2fj_UMjt)^N=Ry1{E zt%lHA#rgV9Et5<@UKs6EG|Phf>X|DTC4Uicd=*uneBye?H_>|(ejkNljNZW<6&5u_ zGVN4IQ83v`rF%u{@~ZYGTIqz6nkKAy6;Zily<5Knu1C+Qs-laWa>GfK%;l1vJ535gUo!x zX`^K;h4eX)HQ7gSCH*1S;%>1nt_l3g$#PhrjO?YTqai}DOV`xvBrUiEvJ&m0Bh_v6B>ZPwd{FFX1y4}V zjwonpc?+8JiKt+QaV=V<_tqM>N=r9xmH#Ls?AC|?YFXyDBV1->Ba%t++YyB-_R?z+ zCsiC)c3!{^#mcqu2j&EoF7Fb8G(#!dM%Qy9{_G%or6J~%y|rux-xHyL)@ITbD<`-% zJ6?+tmZ`9KPSy|k2jRf?{f-YVs2r9fg3O93^6okUn1UX6R>a5x(FP&f_x;b=HVVgERsh5i0?I-5>VFq_PS;dIjP4`;!s z9}Y($91MHGs5gM4hR)W={*>k-+6FH~$0XuA zhykX(NN#kl0hrt?`Z81zo&!{gp?G9L8NEFAVH;d}t6 z;pBKW8jNQr!RUB4>@~wmED6m9yK6zHh3~gLHavWlKCVj3{M^xnt+z_X4w%Ch{U(m{X@EHjoi_UukrWc<0#D@>VZzIWH0x-Po+4D78+q@4qT-F_ zI>^0cxiX-O3chAU|K;ev2x@QB`CGh1Z&}5^{_+!xkclv;D0P?I|f!J*Q0 zhpr?BG+Dsy1 z`5YuN0|do-)}?x}W)5vsZgt+uRecLlSmjIV5dB^^1?tI1)YsK%hGPs@e2nqwynekCdl`ZFNe>SoaZ+x66vrh1;Ko{2GD~PWr`B62PA2mD-gGW z?chEYrzLk~EliODm$FYy^S>W<_QB;-4=b*(XMIR4aXB;lo}Hcf4S6^r45gDp-Qxcz zMxZoG+C1TGyJfz~ZE){wg8_}=E%fg~RdLZSN5e!>*5ArJ0TGUxC7KB%`P@KqZz~W-+Y!ByvmbB50JA@8KI#brD#g@gJylAOm84h4p%9hYNbo>WHJFKgJM(Eo&`X2 zof_UelG`3W!bD`4Bfr@9WM|K86+&kB?2QQ9T<`h-?l@fU`ugeD-zwX*WGm=)Yk(C| z{sKx=rAF;4wJ6xBPRoWoNSChg{l@AWTcHdLbIq1Y?ar!>bBYN+ne$gQKwt^YoIPpp z0A848^}Rz#J6ID;w~fX=b@?t!|(qjD_?Jx%=+&7-BmwC(LKS!e7R#e zS-&+;(a?9&RH8_(P;T+J}!=PDXzx%9FpzF3AZjZs_ks$oL*)5lS&zSWAKc zkNA#v0YqoYpvGOg1%o70mzowBnZTnM2wAdLvPJ9iNqznfU>P_Br(DSH4Z;VdPc z>ifB_fI_70x{Iw9l{XSiU~o8$GJ=J#O!d9z^A9SRb~;KJiQ7ATB`U;DbC)n!HM>ew zxg6mwQM|gJZ4;|{%)2`txJAr6o{n5M@~4641>QJ9OEmT-qmhS}UgWv1}##huD#G#O`53 z6VnJHO7vc6{2tQ>k`TuF{18RqFTmH^Zu&wrWq5`!1690D;7{uLra|%sIsFYq*3U+(h6+4xxM^P2c*2Hcv=Am#nELEb3PSuy)9@=8-MAkoVZ|Cw& zb!D$&S7F`a&xib<8yy4p)^N&J?=*2`m79kuel9#;QX=x+@xEq-A*>G7QEIM%@+4v4 zxka$G5PdU)sKA9p*B8`RX^feorJ}#2UQ(gjRFCTItbO}o&f8BX{uIpz#Q^>>NporI z(pO!zzR?4?t%a@$M)Z)usVSXzbZWA-;aM;|XnYnmZEu9<9iau=GY`>no1JZpR>?M2 z<(rIBxwy79(T#k(XM{>B=N+GtXl-;VW(SQ;R;oY)m1iB7is_k0rP)$v8jSAjfowtV z1TWxYx(=}UT132tXI;Xvt;}EB06T@Tr60?y)4Cu7izZRLRRM-5Odp8K+^v>l6h->N zFe8|DsbZ9M2jjr|&v?|%2urtFRKsfl=pkm$zSz-bYtQVl<2Y-(XA6s#J+p(4)c)GD zr8}!p(k+*}bgroV^{Z(OR6Lb0EVG6J>WH<3ItfuFwE+==^ zo=iNxjj;s*h2VzpKpB;h>L}TTDc%X@suzvhehJjMq_NyXJJ3BBUu;OGFwf`%jmaJP zkwqwm5opg~>h^3CbcgqB9lfV#Z`Au(zou?AuhTUDNtTpE`rTFNG2&J^OlJ8lDB{=Cwy|$(EF4k{2s+9iAV-h{})wG zbph9A&w#I@;ea?j0Hx)Xc-vXGwn+P1)i8;GzU!oMWW+Vl-4kxz8f`6wXp6QMBe6Bq zy1fc%o<<G%)w zbhkl|iG{4&4|6>b_|rR*7c-S6Im!6^`F#Bep2EB~;HSDOm80yAr!+ z2@t$3cT(O&SS~nfAC~a`=K2SR)wWSlzGiA(0F4``J?mhd$B{FJl_0=Rz$n-=YZUzh zCk|_md)1qeHY4b=RVwxH6{(Q_JTF}*o2#V6s$((&O-wTliDL+OD6GE_1$t6i*0YP4!U2%8SwUO(6n-upS+~FII5%Ko7T7}m9Ja|Xi+%?N;8(0!iE{~1S5i%o3@k?0){~I&8 zS(2O1(eRkjJSWNE8S375J8ItwvG#L<`SwJtRr+{%^@{nUPKLM%H+8{JKXR}C3B_@U zqWjzQQ+mgKO@7R>G+R7x!=$m)4(hlDT3v-q2xiHrrb7UVkousYDz8=Zbd$#E-R@?? zkBlF5CWg9rDs4mC8>i%MP;CcICfZGr?=zs^FOoy3n_%I*15uo}8s4P=Xt5;>v;xpO zGZAzb2F5H+FnyqSi(-Bxxfg2}5s)=3M>^4;&U?{m$o?12$VbSI(P7ChlRC|mT`+34 zWmk9{Va(QV?&aCQr@=L1;0#92$aSXfSVKwRi8mR!VKDK7DRRSc5c%U^>4nQ^ibEWP z!PNEL>C|_frGx#*U0w!J6%7GP|&>zLlpDB)q?PQ`ju|QRjh@$BT=<$27UORvB4- zZ#SpvAO4%~05lrr8GYCdBF1bu&wOv^E-o%E{;+;Ytt-k(t3BULwh2}^%Y4C{_4j@L0FDK+n&S8a$;G{| i`KVEvKfB*vKd+zH&+F%@pZ^8`0RR7t{X{PSvIqb>L=GVU literal 0 HcmV?d00001 diff --git a/stable/home-assistant/12.0.14/helm-values.md b/stable/home-assistant/12.0.14/helm-values.md new file mode 100644 index 00000000000..dc110cdb8ad --- /dev/null +++ b/stable/home-assistant/12.0.14/helm-values.md @@ -0,0 +1,42 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env.PUID | int | `568` | | +| git.deployKey | string | `""` | | +| git.deployKeyBase64 | string | `""` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/home-assistant"` | | +| image.tag | string | `"v2021.12.0@sha256:c277fa3b80d91763d3e7fc08b444d50d63b33afd16b9adadd8701c65e52d276f"` | | +| influxdb.architecture | string | `"standalone"` | | +| influxdb.authEnabled | bool | `false` | | +| influxdb.database | string | `"home_assistant"` | | +| influxdb.enabled | bool | `false` | | +| influxdb.persistence.enabled | bool | `false` | | +| initContainers.init.command[0] | string | `"/config/init/init.sh"` | | +| initContainers.init.image | string | `"{{ .Values.image.repository }}:{{ .Values.image.tag }}"` | | +| initContainers.init.volumeMounts[0].mountPath | string | `"/config/init"` | | +| initContainers.init.volumeMounts[0].name | string | `"init"` | | +| initContainers.init.volumeMounts[1].mountPath | string | `"/config"` | | +| initContainers.init.volumeMounts[1].name | string | `"config"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/config"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| postgresql | object | See values.yaml | Enable and configure postgresql database subchart under this key. For more options see [postgresql chart documentation](https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/postgresql) | +| prometheus.serviceMonitor.enabled | bool | `false` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `8123` | | +| service.main.ports.main.targetPort | int | `8123` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/home-assistant/12.0.14/ix_values.yaml b/stable/home-assistant/12.0.14/ix_values.yaml new file mode 100644 index 00000000000..cb9e27439eb --- /dev/null +++ b/stable/home-assistant/12.0.14/ix_values.yaml @@ -0,0 +1,79 @@ +image: + repository: tccr.io/truecharts/home-assistant + pullPolicy: IfNotPresent + tag: v2021.12.0@sha256:c277fa3b80d91763d3e7fc08b444d50d63b33afd16b9adadd8701c65e52d276f + +env: + PUID: 568 + +securityContext: + readOnlyRootFilesystem: false + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +service: + main: + ports: + main: + port: 8123 + targetPort: 8123 + +initContainers: + init: + image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}" + command: ["/config/init/init.sh"] + volumeMounts: + - name: init + mountPath: "/config/init" + - name: config + mountPath: "/config" + +# # Enable devices to be discoverable +# hostNetwork: true + +# # When hostNetwork is true set dnsPolicy to ClusterFirstWithHostNet +# dnsPolicy: ClusterFirstWithHostNet + +# Allow access a Git repository by passing in a private SSH key +git: + # Raw SSH private key + deployKey: "" + # Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence. + deployKeyBase64: "" + +# Enable a prometheus-operator servicemonitor +prometheus: + serviceMonitor: + enabled: false + # interval: 1m + # additionalLabels: {} + +persistence: + config: + enabled: true + mountPath: "/config" + + +# -- Enable and configure postgresql database subchart under this key. +# For more options see [postgresql chart documentation](https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/postgresql) +# @default -- See values.yaml +postgresql: + enabled: true + postgresqlUsername: home-assistant + postgresqlDatabase: home-assistant + existingSecret: "dbcreds" + +# Enable influxdb +# ... for more options see https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/influxdb +influxdb: + enabled: false + architecture: standalone + database: home_assistant + authEnabled: false + persistence: + enabled: false + # storageClass: "" + # diff --git a/stable/home-assistant/12.0.14/questions.yaml b/stable/home-assistant/12.0.14/questions.yaml new file mode 100644 index 00000000000..aa0918da4ce --- /dev/null +++ b/stable/home-assistant/12.0.14/questions.yaml @@ -0,0 +1,1863 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: argItem + label: "Arg" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: git + group: "Container Configuration" + label: "Home-Assistant Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + label: "Git deploy key" + schema: + type: string + default: "" + - variable: deployKeyBase64 + label: "Git KeyBase64 deploy key" + schema: + type: string + default: "" + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: PUID + label: "PUID" + description: "Sets the PUID env var for LinuxServer.io (compatible) containers" + schema: + type: int + default: 568 + + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 8123 + editable: true + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 8123 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "/config" + hidden: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/home-assistant/12.0.14/security.md b/stable/home-assistant/12.0.14/security.md new file mode 100644 index 00000000000..9af7bccbbaf --- /dev/null +++ b/stable/home-assistant/12.0.14/security.md @@ -0,0 +1,671 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: home-assistant/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-home-assistant' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:2aa01c5c4525cfbcf1259f6bb34c5699b6744f9d3280f77e05912cc80e24184c + 'tccr.io/truecharts/home-assistant:v2021.12.0@sha256:c277fa3b80d91763d3e7fc08b444d50d63b33afd16b9adadd8701c65e52d276f' + tccr.io/truecharts/home-assistant:v2021.12.0@sha256:c277fa3b80d91763d3e7fc08b444d50d63b33afd16b9adadd8701c65e52d276f + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:2aa01c5c4525cfbcf1259f6bb34c5699b6744f9d3280f77e05912cc80e24184c + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:2aa01c5c4525cfbcf1259f6bb34c5699b6744f9d3280f77e05912cc80e24184c (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | MEDIUM | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + + + +#### Container: tccr.io/truecharts/home-assistant:v2021.12.0@sha256:c277fa3b80d91763d3e7fc08b444d50d63b33afd16b9adadd8701c65e52d276f (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| curl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| ffmpeg | CVE-2021-38171 | CRITICAL | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171
https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-22015 | HIGH | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://trac.ffmpeg.org/ticket/8190
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg | CVE-2021-38291 | HIGH | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/9312
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-20446 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/7995
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-20453 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8003
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-22019 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019
https://trac.ffmpeg.org/ticket/8241
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg | CVE-2020-22021 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://trac.ffmpeg.org/ticket/8240
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg | CVE-2020-22037 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8281
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2021-38114 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114
https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2021-38171 | CRITICAL | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171
https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2020-22015 | HIGH | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://trac.ffmpeg.org/ticket/8190
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg-libs | CVE-2021-38291 | HIGH | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/9312
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2020-20446 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/7995
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2020-20453 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8003
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2020-22019 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019
https://trac.ffmpeg.org/ticket/8241
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg-libs | CVE-2020-22021 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://trac.ffmpeg.org/ticket/8240
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg-libs | CVE-2020-22037 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8281
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2021-38114 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114
https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libblkid | CVE-2021-37600 | MEDIUM | 2.37-r0 | 2.37.2-r0 |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libcurl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmount | CVE-2021-37600 | MEDIUM | 2.37-r0 | 2.37.2-r0 |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libpq | CVE-2021-23214 | HIGH | 13.4-r0 | 13.5-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| libpq | CVE-2021-23222 | LOW | 13.4-r0 | 13.5-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| libuuid | CVE-2021-37600 | MEDIUM | 2.37-r0 | 2.37.2-r0 |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| nettle | CVE-2021-3580 | HIGH | 3.7.2-r0 | 3.7.3-r0 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1967983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
https://linux.oracle.com/cve/CVE-2021-3580.html
https://linux.oracle.com/errata/ELSA-2021-4451.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://security.netapp.com/advisory/ntap-20211104-0006/
https://ubuntu.com/security/notices/USN-4990-1
| +| openssh-client-common | CVE-2021-41617 | HIGH | 8.6_p1-r2 | 8.6_p1-r3 |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| openssh-client-default | CVE-2021-41617 | HIGH | 8.6_p1-r2 | 8.6_p1-r3 |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| openssh-keygen | CVE-2021-41617 | HIGH | 8.6_p1-r2 | 8.6_p1-r3 |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| postgresql-libs | CVE-2021-23214 | HIGH | 13.4-r0 | 13.5-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| postgresql-libs | CVE-2021-23222 | LOW | 13.4-r0 | 13.5-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + +**python-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| Pillow | CVE-2021-34552 | CRITICAL | 8.2.0 | 8.3.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34552
https://github.com/advisories/GHSA-7534-mm45-c74v
https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-34552
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
https://pillow.readthedocs.io/en/stable/releasenotes/index.html
| +| Pillow | CVE-2021-23437 | HIGH | 8.2.0 | 8.3.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23437
https://github.com/advisories/GHSA-98vv-pw6r-q6q4
https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/
https://nvd.nist.gov/vuln/detail/CVE-2021-23437
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html
https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443
| +| Pillow | pyup.io-41277 | UNKNOWN | 8.2.0 | 8.3.2 |
Expand...
| +| aioftp | pyup.io-38045 | UNKNOWN | 0.12.0 | 0.15.0 |
Expand...
| +| bsblan | pyup.io-37697 | UNKNOWN | 0.4.0 | 0.27 |
Expand...
| +| pip | CVE-2021-28363 | MEDIUM | 20.2.4 | 21.1 |
Expand...https://github.com/advisories/GHSA-5phf-pp7p-vc2r
https://github.com/pypa/advisory-db/tree/main/vulns/urllib3/PYSEC-2021-59.yaml
https://github.com/urllib3/urllib3/blob/main/CHANGES.rst#1264-2021-03-15
https://github.com/urllib3/urllib3/commit/8d65ea1ecf6e2cdc27d42124e587c1b83a3118b0
https://github.com/urllib3/urllib3/commits/main
https://github.com/urllib3/urllib3/releases/tag/1.26.4
https://github.com/urllib3/urllib3/security/advisories/GHSA-5phf-pp7p-vc2r
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4S65ZQVZ2ODGB52IC7VJDBUK4M5INCXL/
https://nvd.nist.gov/vuln/detail/CVE-2021-28363
https://pypi.org/project/urllib3/1.26.4/
https://security.gentoo.org/glsa/202107-36
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| pip | CVE-2021-3572 | MEDIUM | 20.2.4 | 21.1 |
Expand...https://access.redhat.com/errata/RHSA-2021:3254
https://bugzilla.redhat.com/show_bug.cgi?id=1962856
https://github.com/advisories/GHSA-5xp3-jfq3-5q8x
https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b
https://github.com/pypa/pip/pull/9827
https://linux.oracle.com/cve/CVE-2021-3572.html
https://linux.oracle.com/errata/ELSA-2021-4455.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3572
https://packetstormsecurity.com/files/162712/USN-4961-1.txt
| +| pip | pyup.io-42218 | UNKNOWN | 20.2.4 | 21.1 |
Expand...
| +| sendgrid | CVE-2021-43572 | CRITICAL | 6.8.2 | 6.9.1 |
Expand...https://github.com/advisories/GHSA-92vm-mxjf-jqf3
https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1
https://nvd.nist.gov/vuln/detail/CVE-2021-43572
https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:2aa01c5c4525cfbcf1259f6bb34c5699b6744f9d3280f77e05912cc80e24184c (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | MEDIUM | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/stable/home-assistant/12.0.14/templates/_configmap.tpl b/stable/home-assistant/12.0.14/templates/_configmap.tpl new file mode 100644 index 00000000000..086c40af678 --- /dev/null +++ b/stable/home-assistant/12.0.14/templates/_configmap.tpl @@ -0,0 +1,90 @@ +{{/* Define the configmap */}} +{{- define "hass.configmap" -}} +--- +apiVersion: v1 +kind: ConfigMap +metadata: + name: {{ include "common.names.fullname" . }}-init +data: + init.sh: |- + #!/bin/sh + if test -f "/config/configuration.yaml"; then + echo "configuration.yaml exists." + if grep -q recorder: "/config/configuration.yaml"; then + echo "configuration.yaml already contains recorder" + else + cat /config/init/recorder.default >> /config/configuration.yaml + fi + if grep -q http: "/config/configuration.yaml"; then + echo "configuration.yaml already contains http section" + else + cat /config/init/http.default >> /config/configuration.yaml + fi + else + echo "configuration.yaml does NOT exist." + cp /config/init/configuration.yaml.default /config/configuration.yaml + cat /config/init/recorder.default >> /config/configuration.yaml + cat /config/init/http.default >> /config/configuration.yaml + fi + + echo "Creating include files..." + for include_file in groups.yaml automations.yaml scripts.yaml scenes.yaml; do + if test -f "/config/$include_file"; then + echo "$include_file exists." + else + echo "$include_file does NOT exist." + touch "/config/$include_file" + fi + done + + cd "/config" || echo "Could not change path to /config" + echo "Creating custom_components directory..." + mkdir "/config/custom_components" || echo "custom_components directory already exists" + + echo "Changing to the custom_components directory..." + cd "/config/custom_components" || echo "Could not change path to /config/custom_components" + + echo "Downloading HACS" + wget "https://github.com/hacs/integration/releases/latest/download/hacs.zip" || exit 0 + + if [ -d "/config/custom_components/hacs" ]; then + echo "HACS directory already exist, cleaning up..." + rm -R "/config/custom_components/hacs" + fi + + echo "Creating HACS directory..." + mkdir "/config/custom_components/hacs" + + echo "Unpacking HACS..." + unzip "/config/custom_components/hacs.zip" -d "/config/custom_components/hacs" >/dev/null 2>&1 + + echo "Removing HACS zip file..." + rm "/config/custom_components/hacs.zip" + echo "Installation complete." + + configuration.yaml.default: |- + # Configure a default setup of Home Assistant (frontend, api, etc) + default_config: + + # Text to speech + tts: + - platform: google_translate + + group: !include groups.yaml + automation: !include automations.yaml + script: !include scripts.yaml + scene: !include scenes.yaml + recorder.default: |- + + recorder: + purge_keep_days: 30 + commit_interval: 3 + db_url: {{ ( printf "%s?client_encoding=utf8" ( .Values.postgresql.url.complete | trimAll "\"" ) ) | quote }} + http.default: |- + + http: + use_x_forwarded_for: true + trusted_proxies: + - 172.16.0.0/16 + +{{- end -}} diff --git a/stable/home-assistant/12.0.14/templates/common.yaml b/stable/home-assistant/12.0.14/templates/common.yaml new file mode 100644 index 00000000000..0cc42ff47ee --- /dev/null +++ b/stable/home-assistant/12.0.14/templates/common.yaml @@ -0,0 +1,22 @@ +{{/* Make sure all variables are set properly */}} +{{- include "common.setup" . }} + +{{/* Render configmap for hass */}} +{{- include "hass.configmap" . }} + +{{/* Append the general secret volumes to the volumes */}} +{{- define "hass.initvolume" -}} +enabled: "true" +mountPath: "/config/init" +readOnly: true +type: "custom" +volumeSpec: + configMap: + name: {{ include "common.names.fullname" . }}-init + defaultMode: 0777 +{{- end -}} + +{{- $_ := set .Values.persistence "init" (include "hass.initvolume" . | fromYaml) -}} + +{{/* Render the templates */}} +{{ include "common.postSetup" . }} diff --git a/stable/home-assistant/12.0.14/templates/secret.yaml b/stable/home-assistant/12.0.14/templates/secret.yaml new file mode 100644 index 00000000000..19f769cf59b --- /dev/null +++ b/stable/home-assistant/12.0.14/templates/secret.yaml @@ -0,0 +1,15 @@ +{{- if or .Values.git.deployKey .Values.git.deployKeyBase64 }} +apiVersion: v1 +kind: Secret +metadata: + name: {{ template "common.names.fullname" . }}-deploykey + labels: + {{- include "common.labels" . | nindent 4 }} +type: Opaque +data: + {{- if .Values.git.deployKey }} + id_rsa: {{ .Values.git.deployKey | b64enc | quote }} + {{- else }} + id_rsa: {{ .Values.git.deployKeyBase64 | quote }} + {{- end }} +{{- end }} diff --git a/stable/ombi/9.0.21/values.yaml b/stable/home-assistant/12.0.14/values.yaml similarity index 100% rename from stable/ombi/9.0.21/values.yaml rename to stable/home-assistant/12.0.14/values.yaml diff --git a/stable/littlelink/4.0.31/Chart.lock b/stable/littlelink/4.0.31/Chart.lock deleted file mode 100644 index cbf491e618f..00000000000 --- a/stable/littlelink/4.0.31/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.18 -digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c -generated: "2021-12-11T14:24:44.430443921Z" diff --git a/stable/littlelink/4.0.31/CHANGELOG.md b/stable/littlelink/4.0.32/CHANGELOG.md similarity index 91% rename from stable/littlelink/4.0.31/CHANGELOG.md rename to stable/littlelink/4.0.32/CHANGELOG.md index 8e2cfb2a368..41641ef34a0 100644 --- a/stable/littlelink/4.0.31/CHANGELOG.md +++ b/stable/littlelink/4.0.32/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [littlelink-4.0.32](https://github.com/truecharts/apps/compare/littlelink-4.0.31...littlelink-4.0.32) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + ### [littlelink-4.0.31](https://github.com/truecharts/apps/compare/littlelink-4.0.30...littlelink-4.0.31) (2021-12-11) @@ -88,12 +97,3 @@ ### [littlelink-4.0.23](https://github.com/truecharts/apps/compare/littlelink-4.0.22...littlelink-4.0.23) (2021-12-04) #### Chore - -* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) - - - - -### [littlelink-4.0.22](https://github.com/truecharts/apps/compare/littlelink-4.0.21...littlelink-4.0.22) (2021-12-03) - -#### Chore diff --git a/stable/piaware/4.0.21/CONFIG.md b/stable/littlelink/4.0.32/CONFIG.md similarity index 100% rename from stable/piaware/4.0.21/CONFIG.md rename to stable/littlelink/4.0.32/CONFIG.md diff --git a/stable/littlelink/4.0.32/Chart.lock b/stable/littlelink/4.0.32/Chart.lock new file mode 100644 index 00000000000..ea66fc22d41 --- /dev/null +++ b/stable/littlelink/4.0.32/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.18 +digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c +generated: "2021-12-12T12:32:55.326464144Z" diff --git a/stable/littlelink/4.0.31/Chart.yaml b/stable/littlelink/4.0.32/Chart.yaml similarity index 97% rename from stable/littlelink/4.0.31/Chart.yaml rename to stable/littlelink/4.0.32/Chart.yaml index 22954073e9c..89aecd14b2a 100644 --- a/stable/littlelink/4.0.31/Chart.yaml +++ b/stable/littlelink/4.0.32/Chart.yaml @@ -20,7 +20,7 @@ sources: - https://github.com/techno-tim/littlelink-server - https://github.com/sethcottle/littlelink type: application -version: 4.0.31 +version: 4.0.32 annotations: truecharts.org/catagories: | - social diff --git a/stable/littlelink/4.0.31/README.md b/stable/littlelink/4.0.32/README.md similarity index 100% rename from stable/littlelink/4.0.31/README.md rename to stable/littlelink/4.0.32/README.md diff --git a/stable/littlelink/4.0.31/app-readme.md b/stable/littlelink/4.0.32/app-readme.md similarity index 100% rename from stable/littlelink/4.0.31/app-readme.md rename to stable/littlelink/4.0.32/app-readme.md diff --git a/stable/piaware/4.0.21/charts/common-8.9.18.tgz b/stable/littlelink/4.0.32/charts/common-8.9.18.tgz similarity index 100% rename from stable/piaware/4.0.21/charts/common-8.9.18.tgz rename to stable/littlelink/4.0.32/charts/common-8.9.18.tgz diff --git a/stable/littlelink/4.0.31/helm-values.md b/stable/littlelink/4.0.32/helm-values.md similarity index 95% rename from stable/littlelink/4.0.31/helm-values.md rename to stable/littlelink/4.0.32/helm-values.md index 9e66569eb66..29f37afcba5 100644 --- a/stable/littlelink/4.0.31/helm-values.md +++ b/stable/littlelink/4.0.32/helm-values.md @@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here | envFrom[0].configMapRef.name | string | `"littlelinkconfig"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/littlelink-server"` | | -| image.tag | string | `"latest@sha256:0edac9d7fae8cc54e0eeb3372dba7dbe9d993691f429d7ee4a3bbab6d0c39ba4"` | | +| image.tag | string | `"latest@sha256:2c6166643027bea6f7c37feee6247d1536f37cda339114099fc46960b7dd6f07"` | | | littlelink.avatar_2x_url | string | `"https://pbs.twimg.com/profile_images/1286144221217316864/qiaskopb_400x400.jpg"` | | | littlelink.avatar_alt | string | `"techno tim profile pic"` | | | littlelink.avatar_url | string | `"https://pbs.twimg.com/profile_images/1286144221217316864/qiaskopb_200x200.jpg"` | | diff --git a/stable/littlelink/4.0.31/ix_values.yaml b/stable/littlelink/4.0.32/ix_values.yaml similarity index 93% rename from stable/littlelink/4.0.31/ix_values.yaml rename to stable/littlelink/4.0.32/ix_values.yaml index 4c13550c8c1..e23284a6fec 100644 --- a/stable/littlelink/4.0.31/ix_values.yaml +++ b/stable/littlelink/4.0.32/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/littlelink-server pullPolicy: IfNotPresent - tag: latest@sha256:0edac9d7fae8cc54e0eeb3372dba7dbe9d993691f429d7ee4a3bbab6d0c39ba4 + tag: latest@sha256:2c6166643027bea6f7c37feee6247d1536f37cda339114099fc46960b7dd6f07 service: main: diff --git a/stable/littlelink/4.0.31/questions.yaml b/stable/littlelink/4.0.32/questions.yaml similarity index 100% rename from stable/littlelink/4.0.31/questions.yaml rename to stable/littlelink/4.0.32/questions.yaml diff --git a/stable/littlelink/4.0.31/security.md b/stable/littlelink/4.0.32/security.md similarity index 99% rename from stable/littlelink/4.0.31/security.md rename to stable/littlelink/4.0.32/security.md index 934367a7d6e..4f27bbce47d 100644 --- a/stable/littlelink/4.0.31/security.md +++ b/stable/littlelink/4.0.32/security.md @@ -34,7 +34,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/littlelink-server:latest@sha256:0edac9d7fae8cc54e0eeb3372dba7dbe9d993691f429d7ee4a3bbab6d0c39ba4 + tccr.io/truecharts/littlelink-server:latest@sha256:2c6166643027bea6f7c37feee6247d1536f37cda339114099fc46960b7dd6f07 ##### Scan Results @@ -71,7 +71,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/littlelink-server:latest@sha256:0edac9d7fae8cc54e0eeb3372dba7dbe9d993691f429d7ee4a3bbab6d0c39ba4 (alpine 3.14.3) +#### Container: tccr.io/truecharts/littlelink-server:latest@sha256:2c6166643027bea6f7c37feee6247d1536f37cda339114099fc46960b7dd6f07 (alpine 3.14.3) **alpine** diff --git a/stable/littlelink/4.0.31/templates/_configmap.tpl b/stable/littlelink/4.0.32/templates/_configmap.tpl similarity index 100% rename from stable/littlelink/4.0.31/templates/_configmap.tpl rename to stable/littlelink/4.0.32/templates/_configmap.tpl diff --git a/stable/littlelink/4.0.31/templates/common.yaml b/stable/littlelink/4.0.32/templates/common.yaml similarity index 100% rename from stable/littlelink/4.0.31/templates/common.yaml rename to stable/littlelink/4.0.32/templates/common.yaml diff --git a/stable/piaware/4.0.21/values.yaml b/stable/littlelink/4.0.32/values.yaml similarity index 100% rename from stable/piaware/4.0.21/values.yaml rename to stable/littlelink/4.0.32/values.yaml diff --git a/stable/ombi/9.0.21/Chart.lock b/stable/ombi/9.0.21/Chart.lock deleted file mode 100644 index 7094df681ab..00000000000 --- a/stable/ombi/9.0.21/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.18 -digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c -generated: "2021-12-11T14:27:11.603162392Z" diff --git a/stable/ombi/9.0.21/CHANGELOG.md b/stable/ombi/9.0.22/CHANGELOG.md similarity index 92% rename from stable/ombi/9.0.21/CHANGELOG.md rename to stable/ombi/9.0.22/CHANGELOG.md index afa0284c86c..ddac1b039cb 100644 --- a/stable/ombi/9.0.21/CHANGELOG.md +++ b/stable/ombi/9.0.22/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [ombi-9.0.22](https://github.com/truecharts/apps/compare/ombi-9.0.21...ombi-9.0.22) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + ### [ombi-9.0.21](https://github.com/truecharts/apps/compare/ombi-9.0.20...ombi-9.0.21) (2021-12-11) @@ -88,12 +97,3 @@ ### [ombi-9.0.13](https://github.com/truecharts/apps/compare/ombi-9.0.12...ombi-9.0.13) (2021-11-30) #### Chore - -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - - - - -### [ombi-9.0.12](https://github.com/truecharts/apps/compare/ombi-9.0.11...ombi-9.0.12) (2021-11-23) - -#### Chore diff --git a/stable/prowlarr/4.0.35/CONFIG.md b/stable/ombi/9.0.22/CONFIG.md similarity index 100% rename from stable/prowlarr/4.0.35/CONFIG.md rename to stable/ombi/9.0.22/CONFIG.md diff --git a/stable/ombi/9.0.22/Chart.lock b/stable/ombi/9.0.22/Chart.lock new file mode 100644 index 00000000000..4c4cac83c70 --- /dev/null +++ b/stable/ombi/9.0.22/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.18 +digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c +generated: "2021-12-12T12:33:03.233104381Z" diff --git a/stable/ombi/9.0.21/Chart.yaml b/stable/ombi/9.0.22/Chart.yaml similarity index 94% rename from stable/ombi/9.0.21/Chart.yaml rename to stable/ombi/9.0.22/Chart.yaml index 5106e1831e9..dd6bcd0679d 100644 --- a/stable/ombi/9.0.21/Chart.yaml +++ b/stable/ombi/9.0.22/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "4.0.1482" +appVersion: "4.7.8" dependencies: - name: common repository: https://truecharts.org @@ -24,7 +24,7 @@ name: ombi sources: - https://github.com/tidusjar/Ombi type: application -version: 9.0.21 +version: 9.0.22 annotations: truecharts.org/catagories: | - media diff --git a/stable/ombi/9.0.21/README.md b/stable/ombi/9.0.22/README.md similarity index 100% rename from stable/ombi/9.0.21/README.md rename to stable/ombi/9.0.22/README.md diff --git a/stable/ombi/9.0.21/app-readme.md b/stable/ombi/9.0.22/app-readme.md similarity index 100% rename from stable/ombi/9.0.21/app-readme.md rename to stable/ombi/9.0.22/app-readme.md diff --git a/stable/prowlarr/4.0.35/charts/common-8.9.18.tgz b/stable/ombi/9.0.22/charts/common-8.9.18.tgz similarity index 100% rename from stable/prowlarr/4.0.35/charts/common-8.9.18.tgz rename to stable/ombi/9.0.22/charts/common-8.9.18.tgz diff --git a/stable/ombi/9.0.21/helm-values.md b/stable/ombi/9.0.22/helm-values.md similarity index 92% rename from stable/ombi/9.0.21/helm-values.md rename to stable/ombi/9.0.22/helm-values.md index 24cc195ccae..ce069072e22 100644 --- a/stable/ombi/9.0.21/helm-values.md +++ b/stable/ombi/9.0.22/helm-values.md @@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here | env | object | `{}` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/ombi"` | | -| image.tag | string | `"v4.0.1482@sha256:060b394443343f253522fef96cd618dfaaff9971181c7735a384f4faf393ea13"` | | +| image.tag | string | `"v4.7.8@sha256:f487668b806d880d61fdaf890c4f1fe655486f67a4673b7d6b89a4d163f9b91c"` | | | mariadb.architecture | string | `"standalone"` | | | mariadb.auth.database | string | `"ombi"` | | | mariadb.auth.password | string | `"ombi"` | | diff --git a/stable/ombi/9.0.21/ix_values.yaml b/stable/ombi/9.0.22/ix_values.yaml similarity index 87% rename from stable/ombi/9.0.21/ix_values.yaml rename to stable/ombi/9.0.22/ix_values.yaml index f171ed8cf21..f365fe2d1cc 100644 --- a/stable/ombi/9.0.21/ix_values.yaml +++ b/stable/ombi/9.0.22/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/ombi pullPolicy: IfNotPresent - tag: v4.0.1482@sha256:060b394443343f253522fef96cd618dfaaff9971181c7735a384f4faf393ea13 + tag: v4.7.8@sha256:f487668b806d880d61fdaf890c4f1fe655486f67a4673b7d6b89a4d163f9b91c securityContext: readOnlyRootFilesystem: false diff --git a/stable/ombi/9.0.21/questions.yaml b/stable/ombi/9.0.22/questions.yaml similarity index 100% rename from stable/ombi/9.0.21/questions.yaml rename to stable/ombi/9.0.22/questions.yaml diff --git a/stable/ombi/9.0.21/security.md b/stable/ombi/9.0.22/security.md similarity index 93% rename from stable/ombi/9.0.21/security.md rename to stable/ombi/9.0.22/security.md index f77258b4a08..af504019829 100644 --- a/stable/ombi/9.0.21/security.md +++ b/stable/ombi/9.0.22/security.md @@ -35,7 +35,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/ombi:v4.0.1482@sha256:060b394443343f253522fef96cd618dfaaff9971181c7735a384f4faf393ea13 + tccr.io/truecharts/ombi:v4.7.8@sha256:f487668b806d880d61fdaf890c4f1fe655486f67a4673b7d6b89a4d163f9b91c ##### Scan Results @@ -72,7 +72,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/ombi:v4.0.1482@sha256:060b394443343f253522fef96cd618dfaaff9971181c7735a384f4faf393ea13 (ubuntu 20.04) +#### Container: tccr.io/truecharts/ombi:v4.7.8@sha256:f487668b806d880d61fdaf890c4f1fe655486f67a4673b7d6b89a4d163f9b91c (ubuntu 20.04) **ubuntu** @@ -85,8 +85,6 @@ hide: | bind9-host | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
| | bind9-libs | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
| | coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| -| curl | CVE-2021-22946 | MEDIUM | 7.68.0-1ubuntu2.6 | 7.68.0-1ubuntu2.7 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| curl | CVE-2021-22947 | MEDIUM | 7.68.0-1ubuntu2.6 | 7.68.0-1ubuntu2.7 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| | dnsutils | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
| | libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| | libc-bin | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| @@ -109,10 +107,6 @@ hide: | libc6 | CVE-2021-27645 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| | libc6 | CVE-2021-3326 | LOW | 2.31-0ubuntu9.2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| | libc6 | CVE-2021-33574 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| -| libcurl4 | CVE-2021-22946 | MEDIUM | 7.68.0-1ubuntu2.6 | 7.68.0-1ubuntu2.7 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl4 | CVE-2021-22947 | MEDIUM | 7.68.0-1ubuntu2.6 | 7.68.0-1ubuntu2.7 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libgcrypt20 | CVE-2021-40528 | MEDIUM | 1.8.5-5ubuntu1 | 1.8.5-5ubuntu1.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528
https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13
https://eprint.iacr.org/2021/923
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320
https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
| -| libgcrypt20 | CVE-2021-33560 | LOW | 1.8.5-5ubuntu1 | 1.8.5-5ubuntu1.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| | libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -121,7 +115,6 @@ hide: | libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| | libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| | libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| -| libicu66 | CVE-2021-30535 | MEDIUM | 66.1-2ubuntu2 | 66.1-2ubuntu2.1 |
Expand...https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html
https://crbug.com/1194899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535
https://github.com/unicode-org/icu/pull/1698
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/
https://ubuntu.com/security/notices/USN-5156-1
| | libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libk5crypto3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| diff --git a/stable/ombi/9.0.21/templates/common.yaml b/stable/ombi/9.0.22/templates/common.yaml similarity index 100% rename from stable/ombi/9.0.21/templates/common.yaml rename to stable/ombi/9.0.22/templates/common.yaml diff --git a/stable/prowlarr/4.0.35/values.yaml b/stable/ombi/9.0.22/values.yaml similarity index 100% rename from stable/prowlarr/4.0.35/values.yaml rename to stable/ombi/9.0.22/values.yaml diff --git a/stable/piaware/4.0.21/Chart.lock b/stable/piaware/4.0.21/Chart.lock deleted file mode 100644 index 942a83f351e..00000000000 --- a/stable/piaware/4.0.21/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.18 -digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c -generated: "2021-12-11T14:29:25.220403944Z" diff --git a/stable/piaware/4.0.21/CHANGELOG.md b/stable/piaware/4.0.22/CHANGELOG.md similarity index 91% rename from stable/piaware/4.0.21/CHANGELOG.md rename to stable/piaware/4.0.22/CHANGELOG.md index 1fc9eeb2806..911f7019be5 100644 --- a/stable/piaware/4.0.21/CHANGELOG.md +++ b/stable/piaware/4.0.22/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [piaware-4.0.22](https://github.com/truecharts/apps/compare/piaware-4.0.21...piaware-4.0.22) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + ### [piaware-4.0.21](https://github.com/truecharts/apps/compare/piaware-4.0.20...piaware-4.0.21) (2021-12-11) @@ -88,12 +97,3 @@ ### [piaware-4.0.13](https://github.com/truecharts/apps/compare/piaware-4.0.12...piaware-4.0.13) (2021-11-30) #### Chore - -* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) - -#### Fix - -* move conflicting ports to 10xxx range ([#1415](https://github.com/truecharts/apps/issues/1415)) - - - diff --git a/stable/unifi/9.0.21/CONFIG.md b/stable/piaware/4.0.22/CONFIG.md similarity index 100% rename from stable/unifi/9.0.21/CONFIG.md rename to stable/piaware/4.0.22/CONFIG.md diff --git a/stable/piaware/4.0.22/Chart.lock b/stable/piaware/4.0.22/Chart.lock new file mode 100644 index 00000000000..cffa970a5ad --- /dev/null +++ b/stable/piaware/4.0.22/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.18 +digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c +generated: "2021-12-12T12:33:09.503168626Z" diff --git a/stable/piaware/4.0.21/Chart.yaml b/stable/piaware/4.0.22/Chart.yaml similarity index 97% rename from stable/piaware/4.0.21/Chart.yaml rename to stable/piaware/4.0.22/Chart.yaml index 4149289f8e1..1599f5e544d 100644 --- a/stable/piaware/4.0.21/Chart.yaml +++ b/stable/piaware/4.0.22/Chart.yaml @@ -19,7 +19,7 @@ maintainers: name: piaware sources: - https://github.com/flightaware/piaware -version: 4.0.21 +version: 4.0.22 annotations: truecharts.org/catagories: | - media diff --git a/stable/piaware/4.0.21/README.md b/stable/piaware/4.0.22/README.md similarity index 100% rename from stable/piaware/4.0.21/README.md rename to stable/piaware/4.0.22/README.md diff --git a/stable/piaware/4.0.21/app-readme.md b/stable/piaware/4.0.22/app-readme.md similarity index 100% rename from stable/piaware/4.0.21/app-readme.md rename to stable/piaware/4.0.22/app-readme.md diff --git a/stable/unifi/9.0.21/charts/common-8.9.18.tgz b/stable/piaware/4.0.22/charts/common-8.9.18.tgz similarity index 100% rename from stable/unifi/9.0.21/charts/common-8.9.18.tgz rename to stable/piaware/4.0.22/charts/common-8.9.18.tgz diff --git a/stable/piaware/4.0.21/ci/ct-values.yaml b/stable/piaware/4.0.22/ci/ct-values.yaml similarity index 100% rename from stable/piaware/4.0.21/ci/ct-values.yaml rename to stable/piaware/4.0.22/ci/ct-values.yaml diff --git a/stable/piaware/4.0.21/helm-values.md b/stable/piaware/4.0.22/helm-values.md similarity index 93% rename from stable/piaware/4.0.21/helm-values.md rename to stable/piaware/4.0.22/helm-values.md index 201c67b9504..bcba7084df6 100644 --- a/stable/piaware/4.0.21/helm-values.md +++ b/stable/piaware/4.0.22/helm-values.md @@ -16,7 +16,7 @@ You will, however, be able to use all values referenced in the common chart here | env.TZ | string | `"UTC"` | Set the container timezone | | image.pullPolicy | string | `"IfNotPresent"` | image pull policy | | image.repository | string | `"tccr.io/truecharts/piaware"` | image repository | -| image.tag | string | `"v6.1@sha256:41e52e09881054e639d7d39f869e2832a04d957467de46a1c5b52bb0512bc748"` | image tag | +| image.tag | string | `"v6.1@sha256:8e95ecd6c2993b46b29290b075e4846c9ec03d58fb3f4cc8f6b027ec0540489a"` | image tag | | persistence | object | See values.yaml | Configure persistence settings for the chart under this key. | | podSecurityContext.runAsGroup | int | `0` | | | podSecurityContext.runAsUser | int | `0` | | diff --git a/stable/piaware/4.0.21/ix_values.yaml b/stable/piaware/4.0.22/ix_values.yaml similarity index 93% rename from stable/piaware/4.0.21/ix_values.yaml rename to stable/piaware/4.0.22/ix_values.yaml index 763c2fef6f6..c79b3923511 100644 --- a/stable/piaware/4.0.21/ix_values.yaml +++ b/stable/piaware/4.0.22/ix_values.yaml @@ -2,7 +2,7 @@ image: # -- image repository repository: tccr.io/truecharts/piaware # -- image tag - tag: v6.1@sha256:41e52e09881054e639d7d39f869e2832a04d957467de46a1c5b52bb0512bc748 + tag: v6.1@sha256:8e95ecd6c2993b46b29290b075e4846c9ec03d58fb3f4cc8f6b027ec0540489a # -- image pull policy pullPolicy: IfNotPresent diff --git a/stable/piaware/4.0.21/questions.yaml b/stable/piaware/4.0.22/questions.yaml similarity index 100% rename from stable/piaware/4.0.21/questions.yaml rename to stable/piaware/4.0.22/questions.yaml diff --git a/stable/piaware/4.0.21/security.md b/stable/piaware/4.0.22/security.md similarity index 99% rename from stable/piaware/4.0.21/security.md rename to stable/piaware/4.0.22/security.md index 1a51c8b5a4e..1b2bd6a86cb 100644 --- a/stable/piaware/4.0.21/security.md +++ b/stable/piaware/4.0.22/security.md @@ -37,7 +37,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/piaware:v6.1@sha256:41e52e09881054e639d7d39f869e2832a04d957467de46a1c5b52bb0512bc748 + tccr.io/truecharts/piaware:v6.1@sha256:8e95ecd6c2993b46b29290b075e4846c9ec03d58fb3f4cc8f6b027ec0540489a ##### Scan Results @@ -74,7 +74,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/piaware:v6.1@sha256:41e52e09881054e639d7d39f869e2832a04d957467de46a1c5b52bb0512bc748 (debian 10.11) +#### Container: tccr.io/truecharts/piaware:v6.1@sha256:8e95ecd6c2993b46b29290b075e4846c9ec03d58fb3f4cc8f6b027ec0540489a (debian 10.11) **debian** diff --git a/stable/piaware/4.0.21/templates/common.yaml b/stable/piaware/4.0.22/templates/common.yaml similarity index 100% rename from stable/piaware/4.0.21/templates/common.yaml rename to stable/piaware/4.0.22/templates/common.yaml diff --git a/stable/unifi/9.0.21/values.yaml b/stable/piaware/4.0.22/values.yaml similarity index 100% rename from stable/unifi/9.0.21/values.yaml rename to stable/piaware/4.0.22/values.yaml diff --git a/stable/prowlarr/4.0.35/Chart.lock b/stable/prowlarr/4.0.35/Chart.lock deleted file mode 100644 index f038f2ba390..00000000000 --- a/stable/prowlarr/4.0.35/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.18 -digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c -generated: "2021-12-11T14:30:28.049966211Z" diff --git a/stable/prowlarr/4.0.35/CHANGELOG.md b/stable/prowlarr/4.0.36/CHANGELOG.md similarity index 92% rename from stable/prowlarr/4.0.35/CHANGELOG.md rename to stable/prowlarr/4.0.36/CHANGELOG.md index 3c309e67750..db45440b7a7 100644 --- a/stable/prowlarr/4.0.35/CHANGELOG.md +++ b/stable/prowlarr/4.0.36/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [prowlarr-4.0.36](https://github.com/truecharts/apps/compare/prowlarr-4.0.35...prowlarr-4.0.36) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + ### [prowlarr-4.0.35](https://github.com/truecharts/apps/compare/prowlarr-4.0.34...prowlarr-4.0.35) (2021-12-11) @@ -88,12 +97,3 @@ -### [prowlarr-4.0.27](https://github.com/truecharts/apps/compare/prowlarr-4.0.26...prowlarr-4.0.27) (2021-12-05) - -#### Chore - -* update non-major ([#1466](https://github.com/truecharts/apps/issues/1466)) - - - - diff --git a/stable/prowlarr/4.0.36/CONFIG.md b/stable/prowlarr/4.0.36/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/prowlarr/4.0.36/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/prowlarr/4.0.36/Chart.lock b/stable/prowlarr/4.0.36/Chart.lock new file mode 100644 index 00000000000..f52b7ca7c90 --- /dev/null +++ b/stable/prowlarr/4.0.36/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.18 +digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c +generated: "2021-12-12T12:33:17.696559404Z" diff --git a/stable/prowlarr/4.0.35/Chart.yaml b/stable/prowlarr/4.0.36/Chart.yaml similarity index 94% rename from stable/prowlarr/4.0.35/Chart.yaml rename to stable/prowlarr/4.0.36/Chart.yaml index b0e3f3df515..31e27176eb2 100644 --- a/stable/prowlarr/4.0.35/Chart.yaml +++ b/stable/prowlarr/4.0.36/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "0.1.8.1232" +appVersion: "0.1.8.1234" dependencies: - name: common repository: https://truecharts.org @@ -21,7 +21,7 @@ name: prowlarr sources: - https://github.com/Prowlarr/Prowlarr - https://github.com/k8s-at-home/container-images -version: 4.0.35 +version: 4.0.36 annotations: truecharts.org/catagories: | - media diff --git a/stable/prowlarr/4.0.35/README.md b/stable/prowlarr/4.0.36/README.md similarity index 100% rename from stable/prowlarr/4.0.35/README.md rename to stable/prowlarr/4.0.36/README.md diff --git a/stable/prowlarr/4.0.35/app-readme.md b/stable/prowlarr/4.0.36/app-readme.md similarity index 100% rename from stable/prowlarr/4.0.35/app-readme.md rename to stable/prowlarr/4.0.36/app-readme.md diff --git a/stable/prowlarr/4.0.36/charts/common-8.9.18.tgz b/stable/prowlarr/4.0.36/charts/common-8.9.18.tgz new file mode 100644 index 0000000000000000000000000000000000000000..6e2f571328db086b65cf53a58ba3fac4408a7186 GIT binary patch literal 37896 zcmV)(K#RX0iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0POw!ciT3yFplrf`YZ4->9=;D=+(09=x+A8u9LPon>aqU(|+&W zdyfN=kc2fwummMX>*jy|9J~?$L5lKQ)2(@S8;b-617I+i84PAZvRII$dpw6(-dV#% z{FnQGdc9t6G#v7Od%d3fZ*R2M|4V<^-{0@|2YY)5f9drH!_nSfK<@!?DLqS?!|X4; zJGbR_?ho?76#tAeib*mCt3eB4ap_&9fy6d6_OuQ`*flgt`kzbCh-EdqIjV9I}QK z2)Ked%xFh|T2hpSB*{^dbEwPi!D!g)9qjM7uF(3LWDy;=+MsBx)mE6c`HNN?$Y!pV z6QsNP?cZMYJN;3o*Y17WT0orS5GN?(z|aEXcnokdCI49f?vQNO0w95`zs3Lnu*~8D zeW!vbE-}d0DH<#ES}TRiVdrJ1f7p7Y`IqZ|1>+^655xd!*MGk^*c%Mo^?xwvKdt}A zc%FfF8+=Gn^7H8lpeYLR6o()r$rR6)8Dwj{^$h%Hgr;yA=dAEKLSTYoa@`^+N>*v| zb^&K-+ya2ZI_EIfAfF>33xF`jD9Hh41zP}QC?yojLAs1%kdhdO>lWa@PWg{9cso5I`DunI>rjhB`vqs{ z$0f|7ZAbkYXK2PMR*!oDyWx;)m<^zr1HI~ZdYwUU(C@wM5A}FQ2YUyD{^amrbodhX zC&R;VG(4Q{O{U??Xc8Sx4qx_1{g*FC{ob?}jl%wP|1bnO!h4eED)eeA$bJXtIAW+Mo9K2BU*v?{IqXa({o=pP+Db z(3?&NgD^yUht1mGii}~L;sk9w)S_1PFdqr14M$i&+XTlQ*I{R%#&y_xxxe>v2qzPW zUiJ>q%i*Ly9ZaJE8boLm4yS`&AMQ_H9`uI$2YZ9zUI-7-q(6!#hha212sbvp9p5E1 zpJj;tx;^LBHEVcp0lg{r)is*Hv-i1Sr(clo0K#5B+z*HQgZ*$i38($R{>$lTGT9r3 z`=ggHC!>SmaQZUZ8yxng2M4IP|FS;_!^0jL4Eu*e?=Y8|Z#vYiSxhD{F2)Gu049K} zP?q5caScuIcr?YI0h#h&(`6hpZA9uYA7p6@3M+?_9A}7^0TG(w1oMdl8h}|7)AQq_ zcW=gE3S){|EvBkvB#u$0;i3diVk8%=`r2s$`5_u}<;}&SC<>U?)ZyQMhB1x+;hHH0 zFk=X&F)}DB?YYF@Q-zawwpagyT`v z=^7xrx~YrVrXAA^7VuYfOgMM@S(4*W9!09U-kTmGks%iS>;gPSiEy^G-l#oK@t z74F)nTQ+NUsP)(0Gko(S4HLt%zsj=+xOSi1lw5jZ1pjFZ{NG=jOLO9ty)_U0UUfqh6`qZs9= z459!pfW78J!N34KOGw6+4yNpz!k;az%ml$+7~L<%*lB42KZ9igR}jZ+>G4{|?`^=) zWi}H4_+L&{V``ncDa>-kP(blZbBi-EqYOxfR+wUvfH|g&!-E(vaL#94eE3Pcf5%>r z!CtF{t*t{a)nbRRw+p*e!TIg?l`L6qc#0QFl3Ofb67A4k&4Sfl$EcATm|C(BUr}Wc zFq_eu%Iq_**=oqXQWCXN5*>M1lxHz}mvZZw(O8of_{#MnXtM%Y^PSCQnxo}sFcwq; zm7^#E5d1_k{4X|~F*qd=I9ld}hA>8%BbfX(!j$h$e``Tm1}B_2^sXg#JVrFx4CP}+ zHpPmOym5h(GtHvFGtQ+J@U#7{*V9mrPd|Rlag6`PNAeV9Axd&a)2!fOQSLojkZfIB zRP_2-a4;q$;}F3xB+DeP6vAY&BT>we!7!rWdXDlr$^cXlfdmQYoGjxAOb`%EGim|( zmzE7AG=ow=P8fNxf7sMHFg+Waf^jjI0*aJvTx@azmQ*t5w^NWXU6qq>B#{D`asshI%30d(=?dx!moz5}{4ZH0CDA#GQJ9lVOE!97 z<|tl>V;MkYp|+Sl4$7!I)&tBK1j#^#7Hqs^mzhA%>WHoRg8dTvqPG%aY8DlRF|Q}y zY*hs(Mjc+`BNeh4>s?CHWi0prWpZN6faj1{9PlMtCa#00u$oTDb|35nJM0T_m?A9DPSLmx23 zG3vAgvRc?aJvu-C<-^(QF<7kIDWvq8WRdLddx#T&k`>NK!ll9$%rK{w4!Dr)QBer% z;rTkr;b*0;ja$#a(Jr|7?=kpzam)r_SG4we48Fa&0i81xBS=x_gt6N%U%qWU1IM}u zmjM7Hz|{{KS?J#YbUK|DN>;oF&zOoRaT48^Bg&ZnG$RYm#_0=yKEp-I#_SpRg^v`- z1O{qnVG84dybwyUD9qXyFu^sBV=zIYP#Z=IoG?5t(pV4X#hdr1?~X3sT>gCY?&F&= z2t3^sHQ8QLg*(T4hplmm#4g9^HMvf%VHSa-)3>ZLTjJ^r@@hFjS%PvzJD7AM64GuC z=@sqbgz=Pi1asJiDHlT6~|7I*z!YM{^bcUwtw|sL7^ZA&sgHA#s#73djQnRY$KVdR@4^v)W)K&+n>`QwA z)3y{1+j6~?ii+2|SQ{L3Mg`IglMLr;5XO)SVLQUpDasg0=Zqb5;+_a24GrfgS~3Aq z)jMX@PIwdG8K7&LqeYwbr5$EC$03ZB#2LrrnyNL=Bnl{*WdW7r+R{HYSa^NKCbu2I zWQH=br0oKcD(L7ln^2sCIiXwtWn`bT4N$#MTFWnUlt>|meL4|b9xUJ$V(J_cyo#xS z2~`Z2fKPH;`vGS(XG`WMQTJ2J0HU`B-q34<{|9FE0N|Pk^dr4I7?7UZXshu zr>fo?rYu9@Jfs1z5jY_naa}ERX2hBkV^(|}jPVqO>o7)DJ<|nDYlJku!(|fPR5sk0$KE^AQAWGYeQZfIF<}k~bX**@j)9!BFng2u(Ajj&R1O-wL-mHut3IGZR z!xZ|aIQob!uq`3W+UFmZ0b6JlpV+5QY}aEu@-?P&&K2eCugNmwlca#3YS@D36$?

FeArNR8r9jl~b8vBd8u0hxRORCMv}oY%6hQFP#l@*?0aL-t zl_toSEBoGM|2fwi(yr)o3iG+D<7>JbNV72$BGoT#5n|&aq)bKB)KtJ+v#K>}9SQ2~ zR0=;#4Mh?7q(+j@#0!C@Xk$*|h$@Kkm`rU%Uf5NX132bmDG+c-Fn*03|-7KL>a>DOJQq|Aifo?>t*IAcK!K5s9i&U zBKK{`-5$1krguN^uZ`f(#h$P=xy!x8PwdnLde5XTVLuW2HiT{t+C7uG5A=Nyxl7Cg z`TiM`C@}>K1QQCFY7Z%ZU;#hl#d5*0+W&5^_o~0&V`>ts%gKmg36?3C28L-#iq78LZQlf zAy2G*`soJ1M;;WUP6eY#82lNUoNpT{98)DJUf>vJ%B24-BgtmN_$!P z@JH70Y-vT^_wY)cf$-f2FBqEYICh8c5jYW>27SS{BW`-n!%nBOYcOYil)-k0g>ZO* z3Fs>@FAT#ZKP(|hye>ZTS}?mp5z}`i3IeqJQNr4Cxe%7p<#dWa3-D@h6H|w&H4wG~ zoCl=dh2%k&*a_6BmOMFhe3evB*v2crevo!UaE=#gjCS4;7)@XdlMrRQF97@bz5Mw? z**o8!z5pjALZ>9ljg4G?6=oH$w_1g7SEYBC?7(S8R;<$%PAFmnSim(S>0L$#iL(G+;^7CrC+_1LIglvW86}1*=vJkgqLa{%g>P z!Gk!|TQeZW(+vjHs0&IgDp=7*c9bfruHZ)-coH9r4GhVEb4#8iM!b?CRWKz>+T|b; z?(taEAz40l%Cc3?`jL~6#2w??`7-4&jML;#Oe+8MLi~Hq{Oz2L zpQI?C!s`S;rVkW;Hc13#C@=UVPI8nnQu=uIj(_D`wK$eAdM^+jbLdW&v{|#@h}_+Y zch%9A#F?GNK6$UjG4C7!<6MG&>DaUTsQ~?n&6xC8N0C$pjA_t20#3ARsj!$D8Ujve zj$j1H)M$s5{*>}2_-u6849hcnHbRkHdg{cVim5X9{0DNq-B*>^4hL+_qiK!Ng~SaY^8g zwDgbvZ5gdr3U{(h6X~ufdN=V-!l@STly^#V@lFka#ZI+fPc1K%Rqra_NibEsRJHQp z@|_;sIss1~w-V)+4HNB^0~R=n;%k^8b3A{*pHcLleL?(F2~SSjWGZTlGK$CK8AMZj zWq!Fjq~d@$g&|U|lW>_6wz-E;C|msaoBNbe024#ZD*Ta5n2ZU)G(}9GWANE;*>usC zb{{HgijT6rQ$7tiUKitPoxo~bi*>O>QOcbycP(@nj%1kw?s_86)E6dMsT0$$Q?yrGiM@5GMaR8x#vqyD|J za;ICifPz1`vT)C8hEgKsfO7YwCXDVGI1|9B>BPdrV!Y%9On}-kDc}<&r{LK$XJ?!f znispGxx?@;#Ud4`|3oOiAHb2a&zRMInLDX1R+nQk06(75CeZKU*y#zuV0EVhsH+IF7m0!&RnatpgHdQXdzZ9D{SB@6>7dzi^X5PQ*SX4*W^HTp*>a z*=Mn8fK8Y4Pu;&VbS}yCGM}SMQT=b9UdW=-4V;zyw*9T#J*nB!WSQHmM7)2`FcJ-N z0@C-sGI1fB4JM{)#3D~ME`7BB`-k&SFD#!84FY8z z`+@9N86I2H`J7*Vh$#{vXLyAYKt-=ar^@x02{+xM2<#YW>~hi+pp#`BzW@obAaQY& zyQA=9LAG}0L|ZC+y%BAiFoYV_Hc4H2r(8pEbu~jveh~to&zN!w4P%HGFN#T*?kM^@ zTX>dsVx07-LdOgSZ+uObS(}42aQG-qc_B&usX{(-6su zn8u;*+8CT682ysr9DQJ-Ytj9SIRa2HM>5qos$Q^-2hrjvp>k{}{udg9moH!bh&6Cw zR3Kc55fsUotho2^^D$VaBmtl1Oc+}xY;s{7f0B%g6?AVOA8WltZ9a-J*ksIM#^ja! z8leQh*mPrW8Kb<-AnTFk?L|1-t@rO^C`4mhxKcJ#hIf#DUKCw;SGSFIQcRC}L^DOP~lOtZRFpZUl=iGSy-N;GV< z8h$8sj{k+k$M1RTKZ_Cj1f~e)Y?;jDEqOT}FF1z^VWRfV;;0V)ORT>I2M1(ty%qh zm>LnzQFx`?)$?pEwQ?I*g%z79I%O(*M;a!y0u5n=XB1LQ6R$5moXBn!5orFv z^!w1{>z#3Vw7z+|W#pb_b1e#Qo@m*6!&!ErKFx3ygNh0UrJW)97%fb@tTCPz>o_<# z@bWr2TjKP!JX!pG;Z1af)?=`wDAR{eK>Oq@*6mqFmT7mfZtEhg4JL0RP_?A8;xO=& z;c0=B2(NIogfW|$D`9p(B4P;5VG^QFON=l#o~tNnR7SeuXVyGum8m(hxBR7P1P&}K zaKOI{%Pm)(o;?E}GQf`wK#XZ_gi&S6*D@`&V!YO7_IE%xi&x{77c9R+a8z4_M$P9osr*5Q(xpr%@D!z60MB*$&_X1AsO@*tU$l*DAV zK2O<_Jia5Q>TV^!QYr3Lss`GWx6m#Ig9!>%%~Kt`Z2>=@U!m(U_$y9wG(*|nIC-dw ze`jm;uQbnaG812}=P3D@P?%#n<*}-q@BB!-n6|$PPW?A06i&_uAt$lCaYFB5&Nxgy zKLuPq2D%X^8YGj?k75id(vB}uYC}n$Vez($@~|uX+1O~MDP#L@Pn9F2D5OHR-Akx0 z7)5P~KszU#22mciISy^c@%W!@C@}Btwv2x0dBy1%1pSwTPJeXR>390Qp5Ou+Q^CpF zAW$xCAz1|K-Szc#$9mtgjAH6)uR6A(pew?C(~1C3otC~0JZ^z!;1>jzbP3~l4Kfsx z#R4S}_dPJeDio10WKH3CO+bv`N?vo|_v;zShnOrWgB;EYHavyc9?}uF@?lH~zzN$6 z_zjOaWB63~5>b#X6Q)8N!PsP6#~9~%j2LK*$O}N1;hZ)89w(ShZ$}*pM?{|st9}^O zmWk-A7{w`xV{*+y-aZ2{V;3&~jQ+W#xp1V16eNi8beOG0AW<3ZRHzqOyatnuyPm^o zjxz9VF~;9^c!(o5BVykT)8!Zpd%fO58W$Hl3CH1&n8$|^vuG6UI|cW9@3AC;3mH3| z?FJ$?tT=(CfT9)3V9b_An<>GpDAkU*I{s6{&-10vL#?kBj3OD0Z$r!4!|UhM6WM$R zyv-Xl4P-(9e$xdfQ}RMu1jsT6{~*hZDfv_^=5d#=-p5h}Y5YwX;*fX-K48}4ctOpui}C>7&Y z*tN-WrhJ!`tfJShcuD zV41U|CdPUtvMVs2Dvx%!vk}Kws(UNT2%*9Tf6WM6{)hlPGaV99vMNj@VCx`bl_u=}9fpGZnh>s|T5aFE zDRp~eYRR0+#w%!f_6C*uw!Ax-DaZs@=5n9#DiZFwU*E1_Al+ooD3Z&S17Ky#Bq@(X z!Lx9Yl*41iu{j=0)-|DPP59dE`4DWv%))mYZei4aP^MvxozbXFFvI0P0J9m#P~Z7t z8XIP$r|eB_ZWR$B!6VFF*P-bu787}gJ|`f}L?hN@C_o_(QY$*f^VDebOuG%2n!mI` zLK1@uxCj_u0_jfM?W`zk(R7(KMHi{&0FM3~=6YV4@WA%}IZAAlbD6mr6!}58+o*7{ zglVb*wu)t;E@Cpalft>qsD?9|8#HCu<2Y=I*K3@Kpk}5}BwWVhwFsW8I0ghi;@rqm z#27o1I=EwP!X_reE0`m2e*P2V8ym%^8O|-y=?q@;x(beh0i@?U*Uq)T!>fD`DH;vi zC}ATQxwShYnD~V7fc0vfF`<#W$8z0Hwt0n^mVSjOqoa_Ca4KAg(Yk2O#o>)|bd`2N zxggmae{V!2ULn(?&nZvNftA@e6^ZmT4@Te!@&Bq*WJxrAr3!y<4+ z;YaOm5S@)XvK_F8GaQ53wUev$-@B%Tp!dnPx_41NxzfM}xI5riPKyyh+!}f|vx0H&CjM}%6iJWZHk0B8m zBkYrh3NgjFK_&?7v!Y|^AC(TY-fuLeXE?)&P-n)6B2-|Wy6-eh>5x#q%Vz2 zA%|7ye%E0Iy!yKAxRG6;x81tXNvVx>k&z`M0scDCNi}$ei))#Z|Bd($eaTSr>@iY8%(A{r=~5A9STJcbZV0D^QanLVeg zgycwG$^3Zs?p&q@GPtO*Q*eAL=nMe1sNQ!z&q9P?~Cr{&Bw$bbLdZXcx|J&>J+H8}0Ymq$FmPk6S@48>Uv~F&+&rl!=bml1x zK>G{Zg4tI*1)ZOT)L`V^?MSvG3yPx8=PBfOa>uV!a!n0YoSv%$t^w%SHHGrpyz-YX zt#-TJf+?2D%orHhbytH4%3;5Cg_CFuDppi$fpRFEew3f&%}vn>j-J%oG@>qM;yc6W zH;`b)!*eiXRaLZk-qZ!}olL(6fQ5CM((bA+&#xG^H#ZgiFWjJ*awbOs00Vd5M2V3F zziCT_Io2G2l@_@Iic!V@)t3Ow9LiMyiZTX(JqZBi84k^1_7h!wT4psIZE3hUlgH&s zRF^*s#aSjXOqcqNXy9mtGB`szXoyvw!hioN~kRz|GJ?9v>(%rWP7gRnJX`e`MBDUjOzVyls1(l>E@=W5B zknmuSXaCnhZ|_S0*s%Za4G;F+{eRTkf7<^at}m!moVwiH7-%&h z$IL_=xMm4H2I$wip6-wgbm%ghA<$VSa0PJ;Co$4PU^OuIh!jSpqWuN@{IPg1Ccj3G zuptU;OjzgaO#>*NlQD%4v4L6s0EiKpK5U!=ioX!%#SCk(s4dgWOC74cTs{N-oE;;-QN?ER67*HpIT z3$cOZ4oJ(GFU1FLm)~*Oj6zfj!1FvdrobJ-yv*Y96m)blE%T%7mvw|Peg$@b62!h)wZB;fAjo6UsR(@r_BfYl zXVbBaugy}Eywy608!>X^p3)2!W9TD>I?Oj80ii7aiNq1g0;3)8u(^bQvb-a1mgH6WGD}JU-P~lfGP2tSK2Zdgbt| zjXhB(r?S4~xT#@Yp*8h%;Wv3Nw+!3{@Mm=qE6acK;?F6Gak#!0DR7hj$7nQiI2zqEatY5}g~Sgxby;Wh;z!8_J6s40ovvS6c22 zHW*WFJt>(v?q=jL_v{9pVgFpLQzXScl6Vd%&nq|b&1WXsH4w+Jd3)(u!!|niy7;(igXva zc&^ff#|*YbX)k)KG--yH8_{5kVN+F`51Ojc3^n&s`4*_Ds?AYTH8!C3{SwDf;h(vH zsfmiu{;Ql9&8@8mDu5RL?)6UNtI&2pFZ-zTAS6d&NR~Q+y(F)I|Mh>G@Eo|-YS>o1Z zm^{x6`^^7PrtWG3rv%6(^1Dsn_c)1gGJBfE?V8C*jAS4fnBpHZvP^46zNLb~nCoWi zBax+G4y?_#gm-RPJ2;XXfZFzv6LT6xU7EsBdVijw7(t3UC+fAwt=2!d3fH2HXIuxB zlFT1ZPb}~MLKnYJ31Gwi-`nrG=fA^)-r#Bfe~d@&{|KCWG9t=Nyn3rvb{o%Tta-Ko z{QK}};Vu6mg}*LQc>|MnDaN9Bg0a^Uy}D)p@20-^)<0*okLUk881_o%f4%*u_5UbO z$^N5~CEe2AqYcS*4!|l1dsF{k75Uw;0I64wf1M)U3jaF!*|6OxIJb%Sq3Tvd`zU;b zt!A712&>LC^%1sv_dxMM^aR_@H8m3z)wlKhY#E-P>Rg&y#JY(n>%2YB6-jP#_N<{r z*V%IeF_xS?H4YEt>uI1~YO>DNQ`IwFJ)I%_{aihD51u?dZ}U{{|4=Ae_aO#slK&4% z=Rc$2-qZc>M|lkS-_)$#BLQP$=ze^ zdW;E9BPE-S*VfbM;`Kc%AfEMKct+fl4zOYU5BCOrSN=cPKX_XIkMZ0h{=>N>ko%4R zWx3?YBF|S^RF_Ljf60WAPsQxEjD9}GVh4~gI`I{mknbykL>=IJV&1)&sqH#6S#k zgFe}Ex!1>UC@s6HFbkeQ50%UADe^)wYpdeO`9eu71E?^wjbdFb1GqA{aC8g94-n&>Sxy^WD5B5wcS6wOQRA(R5M7NO2IHAsGFV z;T(P79zMI^H}LC{m|BTjJ8i#u7}tig0_P6J|FYV9`SRtDIPkUNbNm$0gn1|c zJHY3Y#3nMB#bg5G06Z`G&i=cY;(wQ?B>xL{{H}35qkC!Gwz!Q(uu1+O^qu%0gZ^OH zdy@Yj;}P<|68&?cqWU}6b4b!sVgJ<gamo+?jfn0n$y0qB6rWslAEz-L9 zV!*WQo7x_1^t6mzz#DCwgH!@oGOTvL18*hn;!wj%W~{8PXp!b?tM~GRv`N<;m_>%A z!W!<}0w~~@oko2U&6I;5POYzH|K3QU`4hX-ta~)5sViqOn`YALWmF4xDE40>! zDUxyn5aihs1t8!_#ZO^A4?xgnuX(1WAY9U%ECLX$4BR9JyLCermDhl><{QIQySl1Q zG5iN=8{t$8SpDHu;PM0yfZLu|H9V~Y{Md*{BL2a^nqev=L6#VAh5k zD$Rz3(ESd)MmfqBjHmOvaU%DZbx!*K6RFDeaj77qRjBMZMi?ElnI;zAwgZx94R1n| z{N9lDf#Ybxle)#_3-EkSXl}-ilF)fR?aDL09idV1${mp{xVLLir=(WV7d;*U!z0k0 z*{wK8Yq}OThIgu43r29KJFJDOzkhEz=+F8zl>eoCak~S7P5wUz2P0Sh@AsbM|3`WB z`JW{sxQVOfIUr6b%4!b+>m*{f%w@_${k_GrT#rFu84T6ex9nplLn)y+C)pZ&`7*94 zn8O+P@+A;3PnU5lf^j(3NV`s|i*bW?Im^10VO{=|ZqvOMN><~Ru|3F~-1VD|D&!iU zRc&EH(!aRUBnr0;bCFe8@?)9i+x#qQTgI3hEBcEzSqG>5{6wZWU-PEAqWY9%#+-Tc zsRvaDmA;z;-Z4>idUYa!aX! zqn2hQCn1T);NtkS1+y77>7*JoE6ES9L=J6i@ysKh0+Q7rJHvUQ#x*VXJ)~$f zY+CwU`wSN(sr5Q>D4X^sjJccf5$5U8}|Qx|6tF}|Gjtcl>hTl9=-p6NKx|h=?Mrk#K;E2m`XDX)w{n4 z`L@OGUor}{A7Lfm_A-KYfT%kIY@3Vy{_Z8z>iqU#l&&iXHnL&QvSGOUij)STTSJsX zzi|tGQu)5JrxE`b8}-BS|2ka!)_dg!x(fnVUvv)EyMHxy$oXo%s=Y?>y>nMQ$ zCpj?=P=wihi_;yy#r-jMh^=Kku@QO#d2S&s3K-hq2!ec1-h@pyR4AR}OyL?S{(cY>2Ho%6rjA^(TQ z2&DigQ=H&@y&36yHqt!cvzhsKjMu;1}Zci}<2zI@x<1N(dxV^iz#wUsblwflmBm)It5ILWMLY(- zi4z^JxGM>8p6BUh%)S0DQ+}HGvUk{%A7@z_+8@OiF6)~2L8drHqLbZxk#_ZW-mw4n zm^->Lxxz{w3S*3tTmfHZv7IN?y{ZvrFhz3dmu^^8w>P83U59^?$)%p9j&rpkhdB;y z_^gg_7;`Q-#3Y3AoX}jqb+5eu)|jsy_FP`3FrQyuN?n8f;0i;<6@ovR38NAJe^~v0 zFevN)!>9aDkMorI|6TQeb1Nw8|C$qf^ndkjgZ^(9Yoh<#HSVbYZ=uv1``jN9uKe7Z}7U&$Tar35!+RV?aZ&bC=UxJX-Ne^$+1OsMirBgO70@nFm1q&hm`%nL1@1SJ=d5Zt{I8T-R$4oNy znD(C{-_#cBqu>5xYP9!n|M7`A4{ZM_#%Ajqe_AcCzUx;MY1HQ;Nmi+&5{%W+;`P>- z{ank$-EaNreykqqs-LsdKlp{eTWhbI`TrfAe;U~T_XZ{XuQzzQ|M4hKt^bc8-g|QV z@h-YHKYWu0zB}0Up5(<_K2_^~l_uRwp1tzH<3IM6*%D@V%KT~q@if?KByp_LM9CT+ zOvI-ja4aKT|5?r5PmlA|@qf7tx|f1XA58!69}HdjZ!mny|Me(O75`V)fyC4UwFy8S z!opFhV@z{Ere4*$1(S%^gr3_)jFSrc^AvABT+p1^uksUhiRmFUe%baTD*U>)TkHGu zj)8qtU+H}Z^Lg59zOJVc|9{x{4|@kAm;d+s`%n7+qdcYipLad}^>E4J^jCiL9sbHs z8_s^MQcaG2tqOMw_OONHw|aB_U+0(aKfM0=*&V{^Off;4RkyyKW!vW$;Iy!5=xJ-@nc1S5qm;z>W_+ z#denzWqi5s)|X2mrPm~j#K@pz^+QG$!dF4aaWY9L*qoWuvB@ePZy;axhcLVzOh28% zpwXdon4zen3#wrh$cV4i7eyVLhc!*wQd082V8V{7*~H(0m5uQVC5Y0~j7)e#){CYt z5A6-DJeWg8Bl+)P-;xd|97$gZL

@eM^ZMk?#V;Su{(gS>_VnjriJZ#tow5J-w?j1? zyOA??jYnlOG5=A_Gbj%YndExb`!gA89_T5_e=^+vecbz3&nEwm16Tg*AM^%K`ro5G zwfSG6ll>LO$_f8HOz$=Kt4cEAgb$D`ce;#Yl^ha-5tQ|`G3DRbnpN7NBe`P_5&zBwvoo^O6_!0`Wv)AJloV(;2BZC^SoovI)&GAKBUD7wzrpwJWw+6ZJn17KgYwARfr z>q;RIRDdcpZ~VFa4eL`ClyXXS&1CRr6urk$6r*dH362o>aT7NNc$0PNa071q6m z=x9{#+HfI<*)o|kjf<)obf;zEosq?sld)(v4~x1fSlnUstJ|*}_$`_%kGaEXJ=4F- z-Y%>cnw4%EFF(bWVd=48vr@N+Y8s@z#&%2nb=4Ve6iSd3ohnoybMO7? z6rhrN6XY30Q+%cSTu@U7lWs^fPATd&xh+&Tm7(7}ZP9yX{buIAwMM6U|FgKCu`A_jYV)`hu1|BlJT_9pma78L z20V%B*vQzgf#}LI(P=?QfCo-u8fu3trk=e2R&c=r`2r>lVT_KEN}mQmDZhck-pv0w zf@_e+BE>0V*a7|=BA!Fl*VyyU8RExNoint;Y{7cDE}nu;fleigd8WJIhx&y<_4t(x>OhN zl+NX<03^%B1ZARnksPtq4@PVdwdCOSm8@0!+6(ksjh|>2YLOP=u7wL7c^>9*G7S$_vd&#@!1Iy^7+0Sq;2=`SM2`xC&xvpd={4m;$f^gbmf; z89}jZXEB+;H~`O0dxb$V!r7)E%Hp?$s!_~$Pwd`2MXL9IB^E#Q`Csp#f8g%_Pv?J+ z^=!TWs{@sX*zqOF)$aPHdU%%|-&HfW+U;AWGWvUM`BwYoUEKUy3CWdU=qlverePK5 zL97g>Y0Qp1JhD!yWUc!-of3cS?$-L2NQ$hG0L)>yt69}yZ8h zu^nrCJ84F85|Y@Sid_)=ba8Qdt_`O3_EI(MB4G)o;T*AXn&){+eHO;eqRFicr8^`O zlBy!N;5c5=9A$4$gI%yA!qupcyK)~DIkR=a@^pmilPIr$TKlR~=;p?}4z7%S7HV%k z=O{}cKW`39R5*3XQv5YCO4`FwEfA&S;^`UYWVDxQ*Ge zW_C=IrpS_Hn>#zjOJj$4ZeHWDTGQK!{gH>4U~I-N#5b9MAMaLtJg@wEaeQhVF01!r zaB+Ov@>zh35=G}d$hyZUUI`KHrjtKg^G3;E6}Fe%?_=nG+(|Hn)^11ljN^Gt~bC z-_ZXF{!gIY5!g;s?Xa35%2={+a@;g#c88rYvz?|{jX+J-t`@%pO*jK8ad;(%aGL>S zLX@g+8Q?U`E3~E#;=h3@&S+lkJ8b~G7u)!s;VJWfbytmcIqQdaNc<(A4g7z2usjkQafW5v*V^dRLIs)(EE3i{|DY8P(E4?jwc|Q#2o2yzn zrR^cDa0FAxmwX?KA$IG1g@GJc7&h%U5Cim3KV~ z*>ibvAeQf(kShi;Cgf_Ff?(ATK%g)224=fKQ6nh&WjJ`Vj@h2w4xQD=Ng5CV}Q17&)VBwjIHIGV_VOh zZ^~m_44(CEnZ>0W4&!e3o7MQ6mGH+?D2PS{_~&w3Hiq}9SA|OQe~c&H5M_DylKuDm zZjpb*v&sLrKj^#i|DgYr|Nl`QpZt%q+zQ^Syj}Fgmd4I5dTX}Bp`a}PiNui=>C*7y zsVZ#y$M}-ZNLLu|U7^4#RMm*%HLGq9RTeMq6770Vft#Uc<954NEk7lD%PLG?u8Wk^ zbPCWq(($hCX|&zw1{^`riJ~{9>sPy8zbfheQqtKNS;7^>vAAK*ln0qbw@7KHF#Dh6 z8~Q&<0D^YA&3D?ZgHJ!VE_}6bZb132n0XMi)fOdu18m=%Jf?aJ%46CIP-Ba-L^6nHBM+txbkOyh7_bh#6kN95n@b^BB=-pPq+)HthfR5&mam{NH}b z{x^Ec|My6bI{(QqS|PyLX?F^x%F747^*xWA*d@Rm?#;~Oz58q?0vW=}8E3{jNi zh4+8kR2kI|F`h1;v<^mE_B06Q4zAD|5NjIh2j18dzPh0Vfq@+(GrjlwHlt!hH;t6o zw6-5AW3&6}#_EIuU*@}t#-hUcFA>zuVW0G zA%^U3TsLMfrx{u3XwqD)tL@o_9zB;RapJf=;)Rk^KQ_8Kt9{qUzF}R{MY@EsUX_aG zc=e7sl4YJI3&};q)?N*BdlC-6=EpDp%^?#24Kvz9`v3GsgHrt8(cmfn|D!xS$I7v| zr)6I75D~lq3^QT`d#p_SU{K06$*y7oqYh1xyujVa{OX+I;LqB1Gs#glg(0HHQUc{I z@u*g;;?*JTtoofW!JRM(r%abtG1qyM|0Fm8!3z-F0(ONRwdoja+5O*vP1db{E4I}g z7{EsVzd^6$|JQ%Y|Mn=4$gvd1oA6dNq5x`Z2LAvixtX_$s*cUMX=AdbJp9eOIDP;-TD!fw+^zUFLdgYgn9d?j{nOW8F#h-ZsPyFvi)y= z@Z|sZD32-s$@|LNiGJ#ggDpN4|Af;|O$tx`U53W2JT~#%1Txu7=a>QM9Hpt^@BEY} zb#6SbjM$y!DpjF1%5WAifio1fCo-v+Itw~4f|8Zl?76x*b%&8H4MW?D--e{AMSf;a zU7XMyCLywWX1bX@ao2y>r;h&%(s}UsFT;ZaSNLNMCnf8xdYayrGILC_BTQh4i_N6Z0GV=!ID@f!TP zgfX6Cwo#-hpO8-L7bKwb@;PgRO%4SU6v8D%fRY8`3Y_5TVj8Cy#gVvj6ypWXQ6$pk zVhVO9Yd*!VPtI9coXmKF#@$Zq?G$8U2M|DH4o@nnfxp8t7w`muC1rS006Fp!+j^2I zoP-RrNoxIyJn22e6#O6)LEICqmB5whtyILJIn}$(bZ2MAbL&;MXQ7=4mmHT`w*+RH z_YHqqJ@@jGoFy7Kx4|SP{xYQo>`FykcJ8%q!)SWDOsj}u4T@^bRw9rq(I9cg52ftL z$eWY7Tr;8+m(DgYM=9qzwgRK02FHr!Mr3PZ9? za>f!E2dVD~wd$NWtJg5w+66lzD3~>SidIWTf|3j2ZWYwT4k}q9T^%4v-=}B@sM26! z-H;_I%HlN$AtMS!Bx=tjNuH57Mi~zPvxz`->5FyhF{Bvz=wvzRHy@!iChLVhigipu zuS=hA>@Y&rfFW9tgrW+#{OdW|8Z6CWj;70)1NK2amj!&V+cno}a{$2##yA3Qn>*jo z-Jl91A6Ks2pxL|zf+qhj2s-?~`uu3p82?CQB6eZtlh* zl>ApG|5KDN@1Fg0^ZDPwuoVAsxc7Aa_b88tWcjokp5NW?z=~`;+y2W6nxh$91$EkSNAJBz-a1dnUfhxP{vkXN@zaI5dAd z`LOoi!Qi0pp8t>b51!(GJj%nRn>#IU|Gu{>#b7mrL>o97AWl#*a1OtwL)QIwd9jLS{zRI zJHQKqltf2`Gr>Dda}kiselLc;xGrgadyT_fhg2y_*;(&B%@_a+H%AX>AvlXkHYyc2 zG8IlRNeCZX-Z6j6-WGhA==rqETSG0|+^rZ_VMMovRJr3#F8G=;G%ABY9pTu+7{iHo6pNZ(BK3Z@N7q|q+mVJ%NVmGBW_EOXropH}s?JTo z<%^WZT63GM=z_hU@Y;1acyZ=qTDem=jcMVxjJpmxQAq?PvB~}PXj9){YZ72KN@8A^ zx0q`y3xJERwOy5FdBfHuC)g*RSuHe}T5DpZ170zmDl(P1S>a@MtIf&;{&jCus)r5O zFhi)shSjKPKy@rw7Pe+lUk!3so-FKTz2$G)tUZNuvvpT)>%Q1+1?2l#$VRJ{Gk*2H?`^nn%v9<~J^69@ABV4t#FZl0JDa zDO@2ymuVWK1xj)l|Co_wNvWm3q0ZVU$x+6p#^`};4kz9oRLo9FqH|}0Jfq_8*sI$@aVYL6 zP1zfs+>Ui>rl-OKWIN(33i?K0O&u8Yz@Qv=|MvLtTh2e8e%!P)R59Q5OXP+_(C-~o z;uey{1Si6kLzr`699Iyw+NVuYrpvS-w~!(<$wY zt%qi-UC&%{fTn3W%jp&d5Idn=^*n7u5(C-JfEAO#3N*_t4Q@*kg9bD)*hCbAyHdrV ziV`d-#Yx~JK$Wz-I_i*82`}TA-FX=K(%xMCL(>pk=41hL9KtwW^Hz?JPA^a1TwH$t z_T=^D`J1z!-yXjy@72dJJ&GdFZW}IXP8OA)Iq$3d8m$w!z+vTg)%5F(q;+jqd{>QE zd@fq|7pM`ztea{uiYj{i>J|Xpps0-?M63f99dC$)4WbGQJ>*s0x9H(j<9b`P=k(Pk zg4!0nUDWF{!z&ddTm(dMc%92ZT~;X5DHw4<$~nA5$X=^#Y~2)~ZCwf)849q)}5dPlg4K5F~w(8Q$jS8g2 zQ9!`fTTsBM*so+$b~mCeZ37gZ4C z+&?!+S7DhxD&hTfx&hpr(EJqUb2}t=hobxxWedy`F4A)js{)W+G}u(P#ElgOwT%>L zR+hijI<@C*RV4SnQ0{1tIf0E4E$tH4L}2*2(4F9W(u)NX17Wc871}wzjeAMOE&Qd>*vW2=c^$&I(|q0AMd0X zN)Zx^t-#9{;Q2h|7A=>+4Qv_lNj~u9i^#)}E;@oEiNp$2MRaibP>ppN%9k(o_-|-f z_m0tkkZMFv#->f{!KYXfpjh&&G!by+BGH(S?b)p|o!NY{a-ys@-Q=)VtG-chS?QSg zXS$r&ALWYzK&gZW`}>iV{vDr<@}Il|jI!I`1F4t)`n~>e;K+Zyy}|yI{P!5ojkuF^ z!Q?uK6QHMCT{(&XPTZTV#>J#+IgWulR?vhLXE27%`9t{fE##8o(&U(5omO5Cu7I-R zgmW;W{n&MKINP-Y0P**y%Q!wIF%H+3I3((%`ePvzSTco_3p_%CWNONyM!CGF`^lIl zYt3R>R#v;4n;O|o1?{zajG*-9WPE&Id>b1>yFGA&7(L((I`)}1P_i0ZJND_1Z(mD#HO^G2 zB(U?*<=LB~*Owno-u>6**@q7oc0YoC;P*k2lGhblt1}2wK}E^RNVjQ9UNS7VJ6L%d zD=^PJ!?I=D{I4G}vS@|@D_N*%H)e2hnQ`jxXnlsJMK!+q_4}f(k*TNXkp)Aj&~6{) zqf+5i)n%xAtD1)8ZCmfaR{tL|pRop*9te^V^4V0ee6>OS8%i%?Lq z;+_FEkr-Zsmia_}lKoY`Oou^>oUGy=%61?)V^H3+WH5=~R75+XDGKp)%^U0r5KKEn z$qHvAS+EgN4r9Jdk@|<9ccWzGQKzohvJ#mFEcHdZOgz7GKIldGd{t7I?9)1Xm}~=7 zhJIb*3`HRDb&raGPW*U`Ou+)CRMh~`2rZ?K1U-HkhW=$tp_q{8<>ChN3!Yw9bhGWC z@1{?XDVhU&iC81`O5x~-sFt!1EMryqae?(WccV-WsW;MFZ6funf^nT3mV| zbL;PTMswGN=8^ZFTZ_*#nAYx5hh4EO<)k~1tCe);2TE3I*C?OF$d9&Z7D!fZu;Vt+ zuL@3V@!_J5m;IWw0=yi*UBU0|RyOi^n{d3tQW1BFq2H{(4RtT8aqjV;CZQDGxzPHg zPg6%mpz+JkoHLe#L>Ev@qgeq=Qn1gWX0%czO4lKskqPo+tzE*p-?e}UlpxMUF0v&$ zIXVaD$4Bqp02R+80^GGVnG(@SR(C zMFB`Vq!q6!Oy7Px`SaTw$e#>tf0SpV{VyfaT_eD3IR72>O7Wi#`g>3DUmxWW_P^G} zoQKB{<~*EZlGND$I;}FUP}%$6|85A7|q8H=wXYVl@=z9OYF|hJDBsMO=)4aRr5V3slpIbUd&oxO4wA zSZm3u!@QVC@8|8O(+6hLq;92MyNb1ZTkI1>JB|1FqZmUfn6>fq?y^xrBBYb4eEHHc zf8QNCoN}R;uU+-`-J#|rB{7+;&(jRS=$Irl&mfj=GL;|iqum%~ML-1O=a#Ual=wfv z(?I{v@;k6{r^!OZrD8K*V(kfuksvN3V#E2pId&76dn3vY;4~a z_TQ#(a!+XAM>}PNEe@peTA#d-SF_dglGZL?DlA}#IIuFVfqW-wx3@jK5UB&uXI8tL zF;QDM(5r(r(a=njzWSY;f>-4ti7<~_lkl9x~M(Xb@jk@i0< zGvUxrK}5KmMVBcb7S>)Q`@*jXXkZ<%qf3Bq=nLZ$5W)FHh!}74hO4y{e^>$0MFUP@ z2^ZH2Ej=a8NKQf$TW`772m00c8vJx|aT;*fj`I6+--nB1US6Dx$hTu~aeP`j!708n z#LEbkZ(~*iwYKGZ%DBFn|MRnvhs^)IH#!)U@_!GX@;^SxBltg`V<0jOVv>NE%y8I@ z>&v4vecvX{@B(IQl^0R!;V!c;sVDM7M^@K4ZcUi#5_eEECvWQSJ=qC0r(?s^yTb3VEk>r~{m;#^0kWssW#FLENc zL-x0IeMwBL$^Jy4((dXsXSSw32Z5n3^gyYiv@>&Jvb;)Vlj7dKn*vIFqbUk~E)WB2 zk98bk3r`}41gwc~m%JGYl=!`gw#R!!+}|`y1xFt*J_M!0o{=+KFF3xh6(=QD1w_92 z*Q0A0DL^TBnbR}10~&2OTb=ubeemNM%=0|`5#{5+H*0QbB~7H<@AaEipn8^yJ2WNN z;VJ+$oFgXi6d*XVl@KaNoA)6P({mDD)%T)yNUb?H#1l_zdJMQYBRk-&ysYhDk#m`$i+P6VoWxNXwp*eh;2bXyS>}}} z+us`kO>Jww3)A}ShuBb$@c(%~`~ODy&-Avrr4+b9{u}J|_TBs6z0u%F{(FpvtEfK< z({GIhpfb-(rPG$H?l%tyZQAlhtT)1eS`tTbZE*am&{Dg65%QLHU4sJp)eK~zuL+5W z5TYS7Gn}U-6#z^@sYps`*kncd0zwVwP6?WgK9_T>Xl^?RGC>6GU{}}zoLiR84a>rz zS_I>>P%^N#?p2z%E;}0zNDLV25(SWMX5!bjP(%kZlEN7`WQ&6C+YL~wn5(<7-)v64 zXeBeOKGIx;mLq(1coRttt1#DY-`3P98DkaZr3iOcEnk5$CGmyDix%suL^SMsCE=(x zU0Iyhs-&Cp*GOq|7_m>8`*;N zxw2!wRt(YH>8k|*tx*-PD@@%cmn_(}yR(~c#0GB!fl|u$Dm+m^N;i4OKQBoZHmaX7 z&2cj0jNWE*-S5Crd=1wWq#2r`48R1~#qm@J(xE8V(cfJ(U)43aA?J4YJMbZ&qwE?} z1Oys9DLewFKOYNIz0<7Q!^D@3+}U4txDlbM5*Jm)?h3rr5BC1=o4=I#=%voC? zK#MeAzs8xpzSLVQ{E{u{nV=RZ!poASusF=q-~v%H@JP?~El~U~^bRkud#dMcL>Kn8 z!+)x>W2d_wi{`LAk|Zmy7crXpx=^rNRYY9$39N|8&&lMUD9klW)7Skp6&nTkSsoJM zy-Zfj^)yE6ij1ws3jmcZ%iChco9CdUlGS!v9{`Hqf<6oOZ$S21iN(-}TH^1MO?7R_ zvrIQ~Z+TB5UC($mE=Nh&1dxrgRs;Btu|bX=Kb=vvXk5E6olukNr)VuzGJ0__R4ciX zKAfFYf3EGFDs`cQBLbclzhX*D32%pqq@sT0b~+< zL>4+bIk!Tggf26tE#zutPyoY>Pzsi5#EA$+IHyXk0oooPvI z)&6D`fX*4>7x+7znFkU?0Mt3D;jpg2o9aZn-GV8WA%ezW)o)$lBpL&838}R}IgDTq z8J`qcgp8w2M+8(^hCDYB#HJJ@|(W_{ZW@v@UQus*`ah3g=?jq-hDI~*-IR(lPBm2gxX-MY113?W-W{IbHyasl>x{-N;} z^7d8%<|BiW(7rxi-LaxIUrlQZUS_cz3w_-BYdr3DzgdmHS^eiXtF~-qytmgIag)2d zz~sLlDaynpcZsyURx4_~hB=%-ih!E`QZJWToDfR4!}9-88ZStMUdb?tkB)U3L!6`} z%NZkcQ0KgiV_MD7YT;JF+#cLNqepUzezLZQ12EDixtFV4+i&gAmYpp5m>6j*1O#USAG!9Z*^6}M=E&G}=r!)VsiP6Kki zWn&c`yY~h|vPff;BfG8Nk=bpBK3kSH>JPP04ZM7c%+ndnANFaW|EZgyZxfu~>KJI# z{g1(@BC1l+sk^~Ilg1j%;R*o=A{4_liU1qOhH75vuJP7d zUI8I6&WwtP4H~}ZDL&$-XFGpndCSI z>Fg5I48dp(+8=?p-^QPM3;gm0wCCdZKuqYDFaH4|0%(j-3I>4vNKoL5x%+l{Lh{oL zQIzCQd(DGCTk-!}8UQ!h|MrHi{cq6Uf4cwiD9_hr|FbrRTblr#&7tA$@R)|c`>+8v zGykQthcNybTj(bHpG2T3H2G&8SWn{{Om`LNmY}(fZvoba_pJ?sdd$2xW5BCO^?p!ZE)N9b*y0DqEs6 z=zdbUzX5AtRWwu_qi46YE&70^CMdnswg9!IanYTg+qKlx#CSigRT&x?O*~+eRp!Qr zY1VIa{OVZf*8QrmMn33Lf3i#7^=Y90Whlb8SNTm2xdis+-UiojCPrdkxhF||W2ar`bh^e6 z2}u}J1c!j^XqrC1{aM%mNbm)+#JHKxJkf{5wt$U|jg9?=jScm66;kmAXX~?YjoT*o zgs#@&90e6|UR%dC&f`y7M+xBfT}L&7>|(B_9KMWpmEdcVo2xbbf2FnDvwEMfaK)O* z&E7*jwOf9d73@{tt0I3#=HeQRXgDIc&-77B&K zT_6EhHqDLd9`edBina|TtS&I8Q`AJXyJ#+{E;qH=c;JFpYl0VITMel$XErYGD&O7P zRLHBTcxw6cfsYzDmW$iYn@sF1qMg>87M3~AGVgY~AbCmz;T~m!qSLv$ZCMhyF`U((SU3Up#PT?w^f3e2V#!YV~@8R zD_ZTJvl~mb_xX0?@d~!zzUv-u&o!Q)J!r#y`gUvCY#q1S!5ghMWOI`pxy26IV0*UI zqwS{8V``|89>LPEbm8L}8rGJ6$jM_0UuOsww>Xjxk}KWMi@R1oOn2sMe^rO4tG? zpf>jifa(Z^1}t;6O$7|E7}ZMTE;|Uksf%d!Z}IVg|XNC0TB=U@@< zIg4&djv#Fuy(25iMZVLAPYA?1dK!}~ClMATK1W+lP<7twNdfy6MVfL!aD2LFIkK{O zZBYsd>|B@N%>CW)v|KgQNd11u5>~K!L<$nATd&c=DzG+h_S4A^-oYFd`8bIE|&#rC7wtyqbedbE|H@ z^8med?`ykSFpz>QMKQ?|wo`?cxpqHncLEX>_+3UUdd)Q~+ z{^x?_aHr`L1;7LQe;AI&_5DAceyRWbSw6?xf3^m`QXGQddEz#0YFG#!)F@S`RXM5M z473Z8mBt|2t0`+^6%S?nhyDVPRIf$ZmEi0z3yY9#MYgpc8z~ZM8tn^*^C|f|>h*io zCe>n*2JW9x?=QW-^m;8GCP2Bmc=q~5|9`%_szF1wVrvFkdGb#`^mT_m&;g1SB5jFP zQvpuvqql-~O}OH`n#Y#aFvzBg8QMGm(}Y$Z@!=jVV;1kcez;iUTv!iv|6bH;j;&|k zc*(4-RXZUbAjQ6}zqZspG;e*hgQ=0~)ZLH+KcYry^v9v7qsnvJgE&Qr28#l!rXRRt z8lS$M(DJXNivKB}efnQy$(?>v^ph-rhwT4}Kdt9~grhI^|7ZCerT?W1%2ip!Em4(< z_3M14Q|+C+=XgcV+pK|-p_DsY8U*m?c2fZUbg;YJ9HJ%=<@73#AF9dJBJm-;jwiRg0<bQ%XrK@Czaw5@}LMcXqA$-SZ+@vB$6pr6=7H`#Cj3m9IIZHPr z72e5z(saqtT8NCF4+b%dxVNAp#T)8HY%?fd^&hO+eP6J_7G$=-Y24SN^yMghtEHX$ z`^OMUUp}AhqvgN1Cdr1vLI2~A@o@aN9{(9mreEs+ewNP@bcux^c?!{0#R2GkO;WVj z(j=BrDZ|k%oI#vCL2y${zx>P*Uy~$3(zjDNA2eN^p`0XG&^rP}#jU^NG(LHPQlj5* zdYa{ANk5QS6*l_6Pdx-LMX?lmN|aDWa+J`NcqiWTtG`|emXnhw=mJ<4{djSOVw&?4 zZ$-rb{#EFoc#D7J1NhhcVZ9p2f6TA^E*+GB7C5@yW}y4{$=4pg&rZJf7Wnq$Yfo(C z&n%~_ldu2R$rJP=&fzN6tLHEHiI?TTlo-X?zZG4}8OvF|tce>naU|NShVC+K30(-leB>Q9UOo0F51KVdl0|FgEX z`ZI6t1+(5ae;VL#PM$n@f_|=i@yk*PhOa83rgryyMP zLof8Ep66Adoua2he;D+GVLu2?Pvm$KL%C~DzSh@EQOeT(2LFxaC{`!HPk(+AjQ#0B zs8G(ggb!r<)6)~ze5bDY9yUmAzR+`0o9on?t3NYy{f>T+GZpzx+lCl%0*U7Ym|Qea5}l;!wDj%n(g(8M*NN#_ZTYZIEZPRPA@a@9t&!x+e{+GsZ0vub14B*&d6 zIjT)^Y)^7};3TK><0d(s@0sMtHObK@ZN)l!jyg^BFhZ9T9q*ZFXic>8cMGv`1F;Re zBM2u6Dm)xi+~olq=lbH}ox*l>B=3zR?|rTBzqiB3IYCv!=I-Qc6eR?w+f3btr?7G5 zkETK-%J7OHj22X!e2o^{O{V92@-@nd$mwcDa{VW1UP(XGxdfBLHgqwm$pj|V4s3KJ z^CpR#+;$@770 za|fTaxrepQ9h~mnLyyQ=k3tpSMHT;(s1nqu;@eaSoq}oZz~->M(xPN$RXpZ(G^&ep zy!iS3MdBk$4+qg*252YyQ+BMGp0?%bA7FWQmuQX&x-8Dl24_v7m*!^B5B&ot*h$Jd zCg?KGI@@M7(`;-_a5%3?9<1Kogm)4VmXgb+$wi$wi;*Tw0bIq9{@f zk0iy=O$wI@*U5sD9m6UqMm8zxu0@7Lv^Lg+c?Bb(=`G1!_=XOA4`crpd~5nBwDE09 zyjI=}XNOVCEJ!#Txff*UnBZY+-sU${Cpc`Kpk5Fy(Cax3XeGH&onn$0MJ&%rB$Az; z{c)CdINN7wyVPsf+50ucYR`Un=<*(>+sg_1?g_f=hfe0h%$wDh*KeKRcLWPLzgL?q zAsdnk#My=*PB&RXmo$PnC`ZejZP2&s5JydYdYlptr%s=E=2+WV*R`Eh*LGH2+n^zJ zIg^G5yH`GsI%KBl3egmClHbutdOWf!mub!PO(ABBW zQcdWYa8EDak%DRJ6iidc@=d!g-?X}X)BVe*MUGzpk(>T!!s#OZm zU~-)47fzg}-_*eX)2<9K@y1mev@<{R=p;CPw*|t5#Mn^HrzFj zc4KJL)fk#ojiE`!7zz#yONQekwa?h8eI^d;Y0}ktnpCZ)NyT~!CI?P%beuUGj-2M~ z#9=*6x>`?@s)U|Ytf%0>Xhj$v7p(}xiF<!t5^kN{gKENNp54wb8^Oi6>np@wn=QPb!kwqJt%FjlZIgpizQ% zF1KauaH+>#UFvbwr5;yY>R{C1ONjcSZH6Gt+S}nxqL$=HS26@w(#7XTy6B;D(F;sP zL&dezvi~%ao8dsI@*qhk2Y?#n;=~bo4XIZA^?H_4j_)ZIB>`dy@dXeT;lKHlHvR~X*irWVz*2B!JIvK5Ij+BRjvq4xxkQJ<|1*smLGT3^5d$O zA6K-zb(&gO@tlG9R1u#I*(^wIKWmmVCW{>`>(6u8MqIRpjG}BKMn?%9Zkrcj)`~ugvLo!gkViKC9T&+SIn6S5w589VZlq zvpqtgUFnazD*bU)>5nT)zl9i5%I^=I-nmZVA6T!W1X5D^CdDnLE5e1O&}14;m!pZI#*rtG z!)i`NC5a9$A3TLWohsnrky|RICx!8(gZa?f#1>p&2JA!?{4iGlXND!P$fqK;XN}Um}wo3$zHP$L+UZ zx+jMzIP#z%PzMEV5qh;+>Z%fDDI7`&EXZ=3B%BE6YP1{t@{7)^5!6;=Xs<^7Ec$|F zJ5;@g?lsOq1w+xACb4=*#t}yjUAa?X$J{CCS>Jd;`((6jCKXyyxxs8IrQaHplGdtP zHQ16V6Kgm|;b=wgNUDyKf+LSn0{1aW=*prBJ7!VIp7R=ce49Me+FJjATP{$RvpX6S zq_6O)$w%uAi_sEOb)1H`f@LJ%P*t2;QDS_YM-z;l9!=;-;0n7YaD`sYfSuc9XvV9h zXLpBlDN{6CD33>3FTy_&^n8;rpL$uJf3O-}a6 zh=1UY_=k?jXxKF}8hSOG%{JMB16{q~$oP5SPQ?lxamlc2Tr#Z2B}30P)%>{=4VPKe z*($0TMd4v+xa@)M=0FvV;bCYvHF;Mw>U#VzG+YX^qrM#07sWpWjiF;vhFuqBSY4E1 zbx}r6G};$s*mY5c)kPUr7sZW6`=SiHE=o|RhJOeefrA=BS84=RY6MkkxN^}02Q`AO z)bPC^tm5Gxf`{+&>-^4sonQ0oe9N!%=PJS1flB*+@jE*;e$A=zEvM!IRN9xv?`(4W zRg>GdOz!=dw41zsH#AW8hrQLA#yBe;3)o}Go!&Ra&aiY;~xcXfU zSHEhw`laEzAB}c%((h_c`t?Pb9EL`_9prblgZ!!;)Vaie7?-I;xs6-Z7hSNK z*7Tl&WT8?f_n3=p_?95Z+OG#II1wB!cd9$u>^_C7n^x}re14RFHlI7(v#Cq%PCKjJ zX-(};>uR?p%c;#pn;&=nJa-*GPhIMK+F6}XYwCPjSLcD_dd5A?$!d%97?Jc2-Qk?0 z6%k0K!M3K1sG(fgciO(t)30G~Z(u8RN@1UFZ`IwuA1~kPd_k_tQ{593v-B$g2L?}f zM4TeF6^Jc$T@>e(+9biWvr#jx8a30pQPY@_?4J-pprjUDZQQ0?PU2#A5Wg>WoOE6rI>Lgwf^SFGBxk|@?(Ozw`oZUf&6Z}L_oT`PD zTSS*Ig_L2wO9lQw_39m!?KgKN`%N9D_Oz?1Ej!i>hl<_MOmG1yw_!Qa0qpg5QIZ@8 z{r$^}cW6WNTrchTsLM0+@vMGYszqzO%@P_()-jUE)M$mPcr}a8MLw5V(%mYllCNTu z_;n_IBPRm)vQ(EE>DV@xrl<8+-Txg~Vs+W>Ykjn>A8|_XPHKO_jKVC64XJI$rD4En zOd>f6wH`;Mhs?*0?2xI$$C-BZai&!tXIk@dn#5e=I|7PST0$7oDlf5E7j;^ceqGXp zmUgaXw{mO@3bT*$c>*N1OsypKhH&2+kiB9ol>aRoi*Bgch9jb;1HyQWyE zu6||eVb!1UoB2DHsyj#!F3Qv;sxp4($5kGgy9$qJ1f8?)zTorvq#X-htq`!y^i6V{ zKzN~&&lMB6gbX!ca3r=kNp_M+NUTV5oM8m_{r=g-3BP=P_m5)2!MhjFp1*nVdldgX zp#J-KSbzU*=m+C3^*=wy=LveHZ&<*4z9-*pQ=kNa8lVTUWQ}19) zIm=J1SMScz%{PAzykO$_eg6iUKDQLl$;n6bt}GA#5niA~AJLB_myQJbc=EAteLhzH zlRp8(SH(>_mwvuV22pLKiQey}L%QuF%^buF;zp z&)#06>mSg!FVL&ESJ%&8zkcx?J%9D?#l`jO|ArB-)K%J(lRmmsCG4X$iEhD%`1$W! z8r}Bg77=K*r7_{97AaMS$MV%+gVQZe2LC_wxRO2opP~Of^cna;|A&mEeYyODQ?#Tx z7v4!9T@eD){P`z(OI?spPx|PhMCm!@5zFJUb*%p2tyTl^Bfq?U`O~$?WhXf#!sutv zX~$^4l-v)ZHDjEdp7i_ulV?eS-qF=saA}Q_{Eoz^kFKk%t@Dci#gwL&|7((L`a0_H z=t^L}{GX13@uVjI!!VeBk^i6LBW0LMQI?XWub$*MIkEVfa+KwCgL9hfR8e>-guxcw z0sp^!cBNC9<@WYYUb1^~NAfdtPxQrG)fOj-mjBiRqA;o&$wRMFCH7+$ZJ}V2gg`go z%9%e&abdEm^^?9d1<9bxxoe>aA`|wuoB@RY7rRm~$qs;wU`0|g$0;cbEI^Qzt!SjQ zf}zYu^j}0u_v>9IrMsb?{7D7iZCT$G^8JbqIQeL~uoqsr@L0Km!mbw;U1uLdgYh-4pBii+(R#Lv~G8m`I>E$SOq|+;1DyqB|A^4nX;xt zgj2LohbSJ>SWD;A!c&U!1(C}9BS=OQmx2{2Uks3(ffL!k&rl z-4ewOfKWN87qM6g;k-V+9X73CVeE(k4@nIut}TJ}H8h13gjS-6aIT&N@X#x90D|AK zT!k}fx@2dC4i)HU$!al+wB|I=wpcDZs3Nw_`yhq2KGNQy#=NfyHh5woeA-SGPet%z z^bsu>la#nw;)D~)MlW=5Z=0sg`Ime_^*h@vb`EjZ#-wn=erG>fgYIxn<(TTY${r3F z)(QSK)*CsFx|U z)oS%rAySFIJ{VZi;yv;939P7aZH^x@wGEX-l*X@OHjKWf0$C3XEp||mKv&noQVK&r z_Uh`TWI6Z9p1L=$!3aK6TBtD z#M)XooD;-}I0HK88X<{@sxX%2BqA}q&Uy%H`oZ@mYA-%e4mY~=(Wzc|`IkBcu8q%t z$cGHh$|(363#g~dB_o>+PtXmG|C)1rvqv&{G+pI{^8@xGPLXbG1)S?b$u*3=1Ku)> zG;Qrsih6s;4|31)Tbiz()4WRLLC@Aq5~gm6Vw&qD1HC6%Mp6>%>ps@N;8}3=O1;?y zSDzGD;4D*}jjq@GdBe7;$ne_iQg9_KNuZAS-^f<>Y*Hflnz6>F?4U6UP^G#MIonFc zhCio7NHP@lQK(qM_Pu2BfvThh@1taTf#E{}-GbgtoEIb2Ww{OcktBIB){%0&=y#wL z&vLdAm?n?FDg`KuRSM%GVJrPi{hGql0AS}P?3NzSCT5_c*rdSjAvUp~cVm-cq&l0} zkRORnim{GllcL{|Y~sN>*726?kzujsYE4&gu~81Am zm!$`DY0VHXc=X51w}trsLm9e7!d?F^OHXUl_7sBO(S%evvZr@I?_4Utvz|H3?Va}q zcUd|xeS76s(v$0*_av;|SubUvJWPL~zAV51$6soP5$mF`^dCg!Z5XmC&VmzTWkeYN zQ?kI1mv24ybiCsDxvFa`$V()CTGME)9$C}8C3_l|ZlP6W)nRjurJY%8JfMc9-W9V{ z+T%EuR;yxw1zAd-5IM9IOpUH~78Yv{n6r$f*7l&>ZMxV;1KoC^bG%@H)U)Gcg4`Pi ziUW=5BMGtJA6IFRwTO?>Ng=6(sF96ooZSx0+j5epD(YRAVi&oz=mo_I*NF|O997R( z4t1sN)2Fak;PHw+K2?tb>WUS*J{zJOk(6y$>pCL!EQ!6sQR*!-xD^sHGj71D4ka2} z#-!UdtYSHUZ0?~SaYAFm>EH&LPG`uh2+OTpV;FR~q$w4(QmlZd4p9s(06 z-$L->=bv-3{H2V3-xhn&qYNbUAYy4mGQkHtT9bGSkHnHY6-F9J4|J9GGZyz#7L&mf zGgcp`aUZ9G_RU|kkWMn1l2^cr4(?J-_A*xq#LKoxa>)`J)!f-v%ePEiD(|d8^Ji)Z zwId`1lxYw(=(&AlV?kf7qg+zRJ|ci_`-iH7SC0@|aPOdS&G7%#FAtCW`8b@9@M3|< z+@F&9Xb~)j%XmnJF_}c8<{tGW>PHdp9~9sBSl>tBaB|Moc=@hO{CX@p6QMn zPU%_hWfD7b<7Si^ux`v^d!+3gQy=CCuCah0FmT&otvodJe8WSFVGs`SVm89l$znR6 z#}S^-$I;x6M`SUcPR7e198RVqf3}>?$Kz43Akk#%FPFn%6p?Ut09uBTq_HM_mc6{B z8$IQx4{%hOLg(Ot3uA_sCFiXu30SmJiF%Untmw9Bsf}5sS{J+0=(S?xw`5lwK5K3C zl>+gV#>uPVs_iGQOv-MH*FUqql|El=MI=q}{8q3r7Ptjo*$Wy##%d~RfqI?089Ok3 z&^hF&%o^v1AgkX%XrlXCeeuA|Mb46h5a;61b8_H!}(Sa$G#EBTh zm~2?eiKvh0j;`rsSv@<`zTV$SruK%1%&L5SqRWJG0x8fEC21;rL^pvPWZwc`$pi~d_`Q)OKR4DZ}11Cd+r0iP4OM332;W2Au9c= z14-jfkk!rwx5|iUo2_yj6I67Q&inIXY4KF?pxSZB-R6cL>WXTm|EU zbAN#|yr2mcl+?Cx565xu{O4cJdU4J&`4a)k5;g5?>WlKQ6i&(|zgB$-FS22>t&qN+ zapb;#|4MG_>dCr9M%)uLa{`N|)ikuEVD{M-Wa-~XVR#bx%vCTC1#wl+xMD<>MZn6vnL%oY+%LU25qd6BnM3)d|d0QMK zAkfmVjVeulqGJ70wQTDpRg}U+DJkt=zozLecbfnMt^U;=W>rN?M;YAl-SPpXqr6Ss ztFKQ?Xu2BcxIiCg>W+?F>b`C`c%mZb(mfSxV*Y%p=hzk{dV^`&j<<)d8%EO=+_W;X z;v79YMc4mxj^1Bipl?sn<+H1+pPrwiuYUa%dGB;3e8}WE#8KAp_zRG1J5dC-q=yaiFJB2gs78p^!Ccy07m!seG?(P5n$4NkvZ8 zUk5})1KEpfA=t64DyUpY9l_9zLtNYxLpGvydaa%%3A;D3N(kwa4{}FR zQFhZJ6kySP&bNly?pf1){&c0M-KOYR_l+w(jMr+;*B|sUB?Icl~*{qY=Z@jAe-g_ z3>pp=P2uyYKr&N}AR99-N#p*O>sU#J(jZHI_J4sNs&+9jYoC0;n=Bz-!Xli2 zfh@Pa5qb5nf#%-~^CH2oeK`9qGQbe0P z`)~e?0xuZ#{X+&a`7Be-q$!nKHb6NgQ^EKrAH<=*%gmIRF{KV$?|0;NigZkN*h zd4TMVfmBZRu0723BT!M9ATbt>Om^Ln>3 z>!g6ur7z4C86$iuL+|yS?KTf-{v(~;s>Y<^;7spY;|Ef_E3MtR-PdbUhXB@zPPY>z z-_TSsD9dA#Kb#Go&?Sj>Q9T#qx0{A>Rkk!FmfTP~7BG+eIm|Wlwe?^@^IS+b^0s-K zKNVF&G{Dg~MFjJmPR{~!N^T8w4|x{v-@U$)O}Cs_Ib3oA&%aefFnMNs54Fl9HusTM z1(5SV>lwUg-#EIdWxLg_?JDdePO(hKhX!m8(m1^WCKBfGYV42Wa1{C^o<>1D3YR1f zX7M5pg6VWIoseiTSw`V>5(MEQ8U=AUit#Y?qme(vquF@;5JJWW&<vKmJw&pTc9oJ@B9(RH6vit1eK%2Ti>-z{738tGi)fb(iAWe!) zM+8s(o|U$vj+qtTU;cPe^|mZo)q>EHH(2P$C;zB9-9P;d{R!>~U|OCeP$@L;Ey z5MFMqS;v5IiqJ@I)U*Ey%$rK;pw5=n&Op^v@G3#{o57zXYJX+Rzlt^atLpg8%~=tp z5)6IS|4N^Fa2xt!E2`^h-63$2?vd?$HKcR2oZuJ|;aa%TYVB6Xx^z_q51D#%f{MvUs<|OeQCP-x4m08CiQmJT$k;`&4aCsvb)I z^iwiI|K<$EyA*F|q;7U{%2NHdj!9LjbSR$exjC!ksuZ0`-V)-`OK3ylY(vyDJ|y8p z0fQ?o)i=28p4${c?j%M}t)Wk0Cn=!mHc6zD)_g)ps!|CIZc@Q@b#sK(G6OgHw+q*X ze6Kylh^2osRUg2KzNtvE8&C6~v>7ns+eIHj5;Wyz0~Aq@G5gzD)@X%^Rn_=jHpMXZpvNmuD!ui_Q?)WMcQ6=4aZwJS#I*&dO?FQje&!g?2nQ zI5S~4mwtMozh+Cgd1;cLHpOkFy-@#sq^CV8MX06{+U!)@{sw1F8{blXB^@=*RmQy$ zdk_l1SXtg z^XSnY7)OPOtZ?M7y<4*Do%hTYvff!QQ`a^(yFL`V9Bg*|;@jVTsi|o_tb)7W0<59( zZ(u~#X5==hRl~jJv?k<1wsdXW-`RZQYn(%1u02v&q_Y}#&I}?wbJ?{h5Ll`1&Ob?a zz*sTOo4P|`>upF(x2?fGbNH@X2!?uZ$cE*+UdeA5iA}cT=;^y>Z~6-y-I7>^FLzv! z&8h80!`kUki2=FB0?A(bkbuQ4Q5cOUr~e=(lfNx4DFNJE(SHzyPS`rNP znOAZN;C80I)VO0?2uN~ssEHuR1R2Eu2us~XLd^u8;TO*|cOm@Re4n*o z-U7!n$73ztAE->KykZrDp*q)r@-=9Cy%an1bdiCo$ksO8gEbFT!eM0+ZE)(j?7cxx zsZNYuUSD78p61Bj++78^CBGlYf3AuwfBgW5YABD(pBiX`JI!DR@g}cKpasfjS$C}>u5Gi%E}1G7?ir>LjyJkX_}HlZ{!8W zlAMK$h>&wsX8mLl7+;P=Op{h$R zlHBE4HgDn=3ZUqVih>E|^tD0e_nZ_qM8>jhqU4QkUtEpUN)mLS8qq`F5`^K(BZMUd zJlJ8?`H`B5q*1=hgo?{)&3dLEV&5h)f(wO^hHytY)i>2~x?8Y#rv^8xXr1=!LY+&R zXdSwzy64TWJ$OvvGN*SmAuIBNM>qiv?485bJ?q&;cjU@8tM{DsGSfdUx|vhWcZ`Ye ziV&`;4{X2Ks{VFN%&X<{o4M_KP^|)EIz1FXE!urrr2=zr*+$e=Mxbg>HpOKz&pN0_ z&a8Kiqv~KEMCL2|1~yHXEZ->M)*!S3+Lg*{A+mi`2IyT0t}dJJ0hzLxTsm%~SF#06 zJC&1TSnoB%@wYg^X+(0^`fp7;vjozbeT4cdML8e|4~o*tNu2JTo9m|iwINKZO5g2; zapa9_fcwC8Yv*lijfCsAwcQxd`mI}TBhw-Kacmww_Oo4Ch zF53KM#FNe*Dn-BLL)Oj)Z!!Q3ivX9mwI-D$inYKodRUkDx8)x=t1hmn9y7HIKMjr6xFY~^Qo=7l0o)I+iwVO?hL45^31y@^J`r z60DMU;1=g~QQoDc(4ylSXstl+xm`i`#;P$()0p1Tc#9M1lH4lUMO4WeE^zVCU-9n6 z-az(GG$-G~>lk|?*;P>8LfPd&?Xm3I7)J!Ni=GdT*)mQ`YJ}%|Lw^|f^I%kzl8C3_ zbQmmV)5&a(gT-hTO-8e2xL8K>coEMQvw1KH=JQG5Fa3BD1G%65YZ{aD6NLIm zum~Q!KY3EdETyY+N6G!k$)6IM-lBC*mVfTGKh;0@tJDBA8i<_U?YxNd9{4kV?g{ci z4B+>iB!BL4u}cVF6C!$O@C`h$UA_b^e|_@g3A&1KDuv265&Y!j;M1& literal 0 HcmV?d00001 diff --git a/stable/prowlarr/4.0.35/helm-values.md b/stable/prowlarr/4.0.36/helm-values.md similarity index 91% rename from stable/prowlarr/4.0.35/helm-values.md rename to stable/prowlarr/4.0.36/helm-values.md index ec6ee136596..346c9cbfccf 100644 --- a/stable/prowlarr/4.0.35/helm-values.md +++ b/stable/prowlarr/4.0.36/helm-values.md @@ -15,7 +15,7 @@ You will, however, be able to use all values referenced in the common chart here | env.TZ | string | `"UTC"` | Set the container timezone | | image.pullPolicy | string | `"IfNotPresent"` | image pull policy | | image.repository | string | `"tccr.io/truecharts/prowlarr"` | image repository | -| image.tag | string | `"v0.1.8.1232@sha256:8882e1ab8b1ef02ea4e59175dd1a1f8ae9cd065b3ef41cb929ce9ab964f8e639"` | image tag | +| image.tag | string | `"v0.1.8.1234@sha256:c9477aa58c0e07f972e48fbad4d1dd7faa3040e9f7fc8c0d79c3c96f3f034615"` | image tag | | ingress.main | object | See values.yaml | Enable and configure ingress settings for the chart under this key. | | persistence | object | See values.yaml | Configure persistence settings for the chart under this key. | | securityContext.readOnlyRootFilesystem | bool | `false` | | diff --git a/stable/prowlarr/4.0.35/ix_values.yaml b/stable/prowlarr/4.0.36/ix_values.yaml similarity index 89% rename from stable/prowlarr/4.0.35/ix_values.yaml rename to stable/prowlarr/4.0.36/ix_values.yaml index adc9f8df089..67c622b8982 100644 --- a/stable/prowlarr/4.0.35/ix_values.yaml +++ b/stable/prowlarr/4.0.36/ix_values.yaml @@ -2,7 +2,7 @@ image: # -- image repository repository: tccr.io/truecharts/prowlarr # -- image tag - tag: v0.1.8.1232@sha256:8882e1ab8b1ef02ea4e59175dd1a1f8ae9cd065b3ef41cb929ce9ab964f8e639 + tag: v0.1.8.1234@sha256:c9477aa58c0e07f972e48fbad4d1dd7faa3040e9f7fc8c0d79c3c96f3f034615 # -- image pull policy pullPolicy: IfNotPresent diff --git a/stable/prowlarr/4.0.35/questions.yaml b/stable/prowlarr/4.0.36/questions.yaml similarity index 100% rename from stable/prowlarr/4.0.35/questions.yaml rename to stable/prowlarr/4.0.36/questions.yaml diff --git a/stable/prowlarr/4.0.35/security.md b/stable/prowlarr/4.0.36/security.md similarity index 99% rename from stable/prowlarr/4.0.35/security.md rename to stable/prowlarr/4.0.36/security.md index 2fd71de389a..7f8b15aad8b 100644 --- a/stable/prowlarr/4.0.35/security.md +++ b/stable/prowlarr/4.0.36/security.md @@ -35,7 +35,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/prowlarr:v0.1.8.1232@sha256:8882e1ab8b1ef02ea4e59175dd1a1f8ae9cd065b3ef41cb929ce9ab964f8e639 + tccr.io/truecharts/prowlarr:v0.1.8.1234@sha256:c9477aa58c0e07f972e48fbad4d1dd7faa3040e9f7fc8c0d79c3c96f3f034615 ##### Scan Results @@ -72,7 +72,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/prowlarr:v0.1.8.1232@sha256:8882e1ab8b1ef02ea4e59175dd1a1f8ae9cd065b3ef41cb929ce9ab964f8e639 (ubuntu 20.04) +#### Container: tccr.io/truecharts/prowlarr:v0.1.8.1234@sha256:c9477aa58c0e07f972e48fbad4d1dd7faa3040e9f7fc8c0d79c3c96f3f034615 (ubuntu 20.04) **ubuntu** diff --git a/stable/prowlarr/4.0.35/templates/common.yaml b/stable/prowlarr/4.0.36/templates/common.yaml similarity index 100% rename from stable/prowlarr/4.0.35/templates/common.yaml rename to stable/prowlarr/4.0.36/templates/common.yaml diff --git a/stable/prowlarr/4.0.36/values.yaml b/stable/prowlarr/4.0.36/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/unifi/9.0.21/Chart.lock b/stable/unifi/9.0.21/Chart.lock deleted file mode 100644 index eb4b45d4bc4..00000000000 --- a/stable/unifi/9.0.21/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.9.18 -digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c -generated: "2021-12-11T14:34:09.9294385Z" diff --git a/stable/unifi/9.0.21/CHANGELOG.md b/stable/unifi/9.0.22/CHANGELOG.md similarity index 92% rename from stable/unifi/9.0.21/CHANGELOG.md rename to stable/unifi/9.0.22/CHANGELOG.md index 95bfdadefaa..82eb23cc26f 100644 --- a/stable/unifi/9.0.21/CHANGELOG.md +++ b/stable/unifi/9.0.22/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [unifi-9.0.22](https://github.com/truecharts/apps/compare/unifi-9.0.21...unifi-9.0.22) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + ### [unifi-9.0.21](https://github.com/truecharts/apps/compare/unifi-9.0.20...unifi-9.0.21) (2021-12-11) @@ -88,12 +97,3 @@ * move conflicting ports to 10xxx range ([#1415](https://github.com/truecharts/apps/issues/1415)) * fix port in questions.yaml - - - -### [unifi-9.0.13](https://github.com/truecharts/apps/compare/unifi-9.0.12...unifi-9.0.13) (2021-11-23) - -#### Chore - -* update non-major deps helm releases ([#1386](https://github.com/truecharts/apps/issues/1386)) - diff --git a/stable/unifi/9.0.22/CONFIG.md b/stable/unifi/9.0.22/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/unifi/9.0.22/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/unifi/9.0.22/Chart.lock b/stable/unifi/9.0.22/Chart.lock new file mode 100644 index 00000000000..b8ab21a9a7c --- /dev/null +++ b/stable/unifi/9.0.22/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.18 +digest: sha256:c8ffe014352b1463eb3223515092f17b7e698cf90aa94cf9278dea355cea496c +generated: "2021-12-12T12:33:40.196342772Z" diff --git a/stable/unifi/9.0.21/Chart.yaml b/stable/unifi/9.0.22/Chart.yaml similarity index 97% rename from stable/unifi/9.0.21/Chart.yaml rename to stable/unifi/9.0.22/Chart.yaml index 28928575211..1a889a7966e 100644 --- a/stable/unifi/9.0.21/Chart.yaml +++ b/stable/unifi/9.0.22/Chart.yaml @@ -21,7 +21,7 @@ sources: - https://github.com/jacobalberty/unifi-docker - https://unifi-network.ui.com type: application -version: 9.0.21 +version: 9.0.22 annotations: truecharts.org/catagories: | - Networking diff --git a/stable/unifi/9.0.21/README.md b/stable/unifi/9.0.22/README.md similarity index 100% rename from stable/unifi/9.0.21/README.md rename to stable/unifi/9.0.22/README.md diff --git a/stable/unifi/9.0.21/app-readme.md b/stable/unifi/9.0.22/app-readme.md similarity index 100% rename from stable/unifi/9.0.21/app-readme.md rename to stable/unifi/9.0.22/app-readme.md diff --git a/stable/unifi/9.0.22/charts/common-8.9.18.tgz b/stable/unifi/9.0.22/charts/common-8.9.18.tgz new file mode 100644 index 0000000000000000000000000000000000000000..6e2f571328db086b65cf53a58ba3fac4408a7186 GIT binary patch literal 37896 zcmV)(K#RX0iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0POw!ciT3yFplrf`YZ4->9=;D=+(09=x+A8u9LPon>aqU(|+&W zdyfN=kc2fwummMX>*jy|9J~?$L5lKQ)2(@S8;b-617I+i84PAZvRII$dpw6(-dV#% z{FnQGdc9t6G#v7Od%d3fZ*R2M|4V<^-{0@|2YY)5f9drH!_nSfK<@!?DLqS?!|X4; zJGbR_?ho?76#tAeib*mCt3eB4ap_&9fy6d6_OuQ`*flgt`kzbCh-EdqIjV9I}QK z2)Ked%xFh|T2hpSB*{^dbEwPi!D!g)9qjM7uF(3LWDy;=+MsBx)mE6c`HNN?$Y!pV z6QsNP?cZMYJN;3o*Y17WT0orS5GN?(z|aEXcnokdCI49f?vQNO0w95`zs3Lnu*~8D zeW!vbE-}d0DH<#ES}TRiVdrJ1f7p7Y`IqZ|1>+^655xd!*MGk^*c%Mo^?xwvKdt}A zc%FfF8+=Gn^7H8lpeYLR6o()r$rR6)8Dwj{^$h%Hgr;yA=dAEKLSTYoa@`^+N>*v| zb^&K-+ya2ZI_EIfAfF>33xF`jD9Hh41zP}QC?yojLAs1%kdhdO>lWa@PWg{9cso5I`DunI>rjhB`vqs{ z$0f|7ZAbkYXK2PMR*!oDyWx;)m<^zr1HI~ZdYwUU(C@wM5A}FQ2YUyD{^amrbodhX zC&R;VG(4Q{O{U??Xc8Sx4qx_1{g*FC{ob?}jl%wP|1bnO!h4eED)eeA$bJXtIAW+Mo9K2BU*v?{IqXa({o=pP+Db z(3?&NgD^yUht1mGii}~L;sk9w)S_1PFdqr14M$i&+XTlQ*I{R%#&y_xxxe>v2qzPW zUiJ>q%i*Ly9ZaJE8boLm4yS`&AMQ_H9`uI$2YZ9zUI-7-q(6!#hha212sbvp9p5E1 zpJj;tx;^LBHEVcp0lg{r)is*Hv-i1Sr(clo0K#5B+z*HQgZ*$i38($R{>$lTGT9r3 z`=ggHC!>SmaQZUZ8yxng2M4IP|FS;_!^0jL4Eu*e?=Y8|Z#vYiSxhD{F2)Gu049K} zP?q5caScuIcr?YI0h#h&(`6hpZA9uYA7p6@3M+?_9A}7^0TG(w1oMdl8h}|7)AQq_ zcW=gE3S){|EvBkvB#u$0;i3diVk8%=`r2s$`5_u}<;}&SC<>U?)ZyQMhB1x+;hHH0 zFk=X&F)}DB?YYF@Q-zawwpagyT`v z=^7xrx~YrVrXAA^7VuYfOgMM@S(4*W9!09U-kTmGks%iS>;gPSiEy^G-l#oK@t z74F)nTQ+NUsP)(0Gko(S4HLt%zsj=+xOSi1lw5jZ1pjFZ{NG=jOLO9ty)_U0UUfqh6`qZs9= z459!pfW78J!N34KOGw6+4yNpz!k;az%ml$+7~L<%*lB42KZ9igR}jZ+>G4{|?`^=) zWi}H4_+L&{V``ncDa>-kP(blZbBi-EqYOxfR+wUvfH|g&!-E(vaL#94eE3Pcf5%>r z!CtF{t*t{a)nbRRw+p*e!TIg?l`L6qc#0QFl3Ofb67A4k&4Sfl$EcATm|C(BUr}Wc zFq_eu%Iq_**=oqXQWCXN5*>M1lxHz}mvZZw(O8of_{#MnXtM%Y^PSCQnxo}sFcwq; zm7^#E5d1_k{4X|~F*qd=I9ld}hA>8%BbfX(!j$h$e``Tm1}B_2^sXg#JVrFx4CP}+ zHpPmOym5h(GtHvFGtQ+J@U#7{*V9mrPd|Rlag6`PNAeV9Axd&a)2!fOQSLojkZfIB zRP_2-a4;q$;}F3xB+DeP6vAY&BT>we!7!rWdXDlr$^cXlfdmQYoGjxAOb`%EGim|( zmzE7AG=ow=P8fNxf7sMHFg+Waf^jjI0*aJvTx@azmQ*t5w^NWXU6qq>B#{D`asshI%30d(=?dx!moz5}{4ZH0CDA#GQJ9lVOE!97 z<|tl>V;MkYp|+Sl4$7!I)&tBK1j#^#7Hqs^mzhA%>WHoRg8dTvqPG%aY8DlRF|Q}y zY*hs(Mjc+`BNeh4>s?CHWi0prWpZN6faj1{9PlMtCa#00u$oTDb|35nJM0T_m?A9DPSLmx23 zG3vAgvRc?aJvu-C<-^(QF<7kIDWvq8WRdLddx#T&k`>NK!ll9$%rK{w4!Dr)QBer% z;rTkr;b*0;ja$#a(Jr|7?=kpzam)r_SG4we48Fa&0i81xBS=x_gt6N%U%qWU1IM}u zmjM7Hz|{{KS?J#YbUK|DN>;oF&zOoRaT48^Bg&ZnG$RYm#_0=yKEp-I#_SpRg^v`- z1O{qnVG84dybwyUD9qXyFu^sBV=zIYP#Z=IoG?5t(pV4X#hdr1?~X3sT>gCY?&F&= z2t3^sHQ8QLg*(T4hplmm#4g9^HMvf%VHSa-)3>ZLTjJ^r@@hFjS%PvzJD7AM64GuC z=@sqbgz=Pi1asJiDHlT6~|7I*z!YM{^bcUwtw|sL7^ZA&sgHA#s#73djQnRY$KVdR@4^v)W)K&+n>`QwA z)3y{1+j6~?ii+2|SQ{L3Mg`IglMLr;5XO)SVLQUpDasg0=Zqb5;+_a24GrfgS~3Aq z)jMX@PIwdG8K7&LqeYwbr5$EC$03ZB#2LrrnyNL=Bnl{*WdW7r+R{HYSa^NKCbu2I zWQH=br0oKcD(L7ln^2sCIiXwtWn`bT4N$#MTFWnUlt>|meL4|b9xUJ$V(J_cyo#xS z2~`Z2fKPH;`vGS(XG`WMQTJ2J0HU`B-q34<{|9FE0N|Pk^dr4I7?7UZXshu zr>fo?rYu9@Jfs1z5jY_naa}ERX2hBkV^(|}jPVqO>o7)DJ<|nDYlJku!(|fPR5sk0$KE^AQAWGYeQZfIF<}k~bX**@j)9!BFng2u(Ajj&R1O-wL-mHut3IGZR z!xZ|aIQob!uq`3W+UFmZ0b6JlpV+5QY}aEu@-?P&&K2eCugNmwlca#3YS@D36$?

FeArNR8r9jl~b8vBd8u0hxRORCMv}oY%6hQFP#l@*?0aL-t zl_toSEBoGM|2fwi(yr)o3iG+D<7>JbNV72$BGoT#5n|&aq)bKB)KtJ+v#K>}9SQ2~ zR0=;#4Mh?7q(+j@#0!C@Xk$*|h$@Kkm`rU%Uf5NX132bmDG+c-Fn*03|-7KL>a>DOJQq|Aifo?>t*IAcK!K5s9i&U zBKK{`-5$1krguN^uZ`f(#h$P=xy!x8PwdnLde5XTVLuW2HiT{t+C7uG5A=Nyxl7Cg z`TiM`C@}>K1QQCFY7Z%ZU;#hl#d5*0+W&5^_o~0&V`>ts%gKmg36?3C28L-#iq78LZQlf zAy2G*`soJ1M;;WUP6eY#82lNUoNpT{98)DJUf>vJ%B24-BgtmN_$!P z@JH70Y-vT^_wY)cf$-f2FBqEYICh8c5jYW>27SS{BW`-n!%nBOYcOYil)-k0g>ZO* z3Fs>@FAT#ZKP(|hye>ZTS}?mp5z}`i3IeqJQNr4Cxe%7p<#dWa3-D@h6H|w&H4wG~ zoCl=dh2%k&*a_6BmOMFhe3evB*v2crevo!UaE=#gjCS4;7)@XdlMrRQF97@bz5Mw? z**o8!z5pjALZ>9ljg4G?6=oH$w_1g7SEYBC?7(S8R;<$%PAFmnSim(S>0L$#iL(G+;^7CrC+_1LIglvW86}1*=vJkgqLa{%g>P z!Gk!|TQeZW(+vjHs0&IgDp=7*c9bfruHZ)-coH9r4GhVEb4#8iM!b?CRWKz>+T|b; z?(taEAz40l%Cc3?`jL~6#2w??`7-4&jML;#Oe+8MLi~Hq{Oz2L zpQI?C!s`S;rVkW;Hc13#C@=UVPI8nnQu=uIj(_D`wK$eAdM^+jbLdW&v{|#@h}_+Y zch%9A#F?GNK6$UjG4C7!<6MG&>DaUTsQ~?n&6xC8N0C$pjA_t20#3ARsj!$D8Ujve zj$j1H)M$s5{*>}2_-u6849hcnHbRkHdg{cVim5X9{0DNq-B*>^4hL+_qiK!Ng~SaY^8g zwDgbvZ5gdr3U{(h6X~ufdN=V-!l@STly^#V@lFka#ZI+fPc1K%Rqra_NibEsRJHQp z@|_;sIss1~w-V)+4HNB^0~R=n;%k^8b3A{*pHcLleL?(F2~SSjWGZTlGK$CK8AMZj zWq!Fjq~d@$g&|U|lW>_6wz-E;C|msaoBNbe024#ZD*Ta5n2ZU)G(}9GWANE;*>usC zb{{HgijT6rQ$7tiUKitPoxo~bi*>O>QOcbycP(@nj%1kw?s_86)E6dMsT0$$Q?yrGiM@5GMaR8x#vqyD|J za;ICifPz1`vT)C8hEgKsfO7YwCXDVGI1|9B>BPdrV!Y%9On}-kDc}<&r{LK$XJ?!f znispGxx?@;#Ud4`|3oOiAHb2a&zRMInLDX1R+nQk06(75CeZKU*y#zuV0EVhsH+IF7m0!&RnatpgHdQXdzZ9D{SB@6>7dzi^X5PQ*SX4*W^HTp*>a z*=Mn8fK8Y4Pu;&VbS}yCGM}SMQT=b9UdW=-4V;zyw*9T#J*nB!WSQHmM7)2`FcJ-N z0@C-sGI1fB4JM{)#3D~ME`7BB`-k&SFD#!84FY8z z`+@9N86I2H`J7*Vh$#{vXLyAYKt-=ar^@x02{+xM2<#YW>~hi+pp#`BzW@obAaQY& zyQA=9LAG}0L|ZC+y%BAiFoYV_Hc4H2r(8pEbu~jveh~to&zN!w4P%HGFN#T*?kM^@ zTX>dsVx07-LdOgSZ+uObS(}42aQG-qc_B&usX{(-6su zn8u;*+8CT682ysr9DQJ-Ytj9SIRa2HM>5qos$Q^-2hrjvp>k{}{udg9moH!bh&6Cw zR3Kc55fsUotho2^^D$VaBmtl1Oc+}xY;s{7f0B%g6?AVOA8WltZ9a-J*ksIM#^ja! z8leQh*mPrW8Kb<-AnTFk?L|1-t@rO^C`4mhxKcJ#hIf#DUKCw;SGSFIQcRC}L^DOP~lOtZRFpZUl=iGSy-N;GV< z8h$8sj{k+k$M1RTKZ_Cj1f~e)Y?;jDEqOT}FF1z^VWRfV;;0V)ORT>I2M1(ty%qh zm>LnzQFx`?)$?pEwQ?I*g%z79I%O(*M;a!y0u5n=XB1LQ6R$5moXBn!5orFv z^!w1{>z#3Vw7z+|W#pb_b1e#Qo@m*6!&!ErKFx3ygNh0UrJW)97%fb@tTCPz>o_<# z@bWr2TjKP!JX!pG;Z1af)?=`wDAR{eK>Oq@*6mqFmT7mfZtEhg4JL0RP_?A8;xO=& z;c0=B2(NIogfW|$D`9p(B4P;5VG^QFON=l#o~tNnR7SeuXVyGum8m(hxBR7P1P&}K zaKOI{%Pm)(o;?E}GQf`wK#XZ_gi&S6*D@`&V!YO7_IE%xi&x{77c9R+a8z4_M$P9osr*5Q(xpr%@D!z60MB*$&_X1AsO@*tU$l*DAV zK2O<_Jia5Q>TV^!QYr3Lss`GWx6m#Ig9!>%%~Kt`Z2>=@U!m(U_$y9wG(*|nIC-dw ze`jm;uQbnaG812}=P3D@P?%#n<*}-q@BB!-n6|$PPW?A06i&_uAt$lCaYFB5&Nxgy zKLuPq2D%X^8YGj?k75id(vB}uYC}n$Vez($@~|uX+1O~MDP#L@Pn9F2D5OHR-Akx0 z7)5P~KszU#22mciISy^c@%W!@C@}Btwv2x0dBy1%1pSwTPJeXR>390Qp5Ou+Q^CpF zAW$xCAz1|K-Szc#$9mtgjAH6)uR6A(pew?C(~1C3otC~0JZ^z!;1>jzbP3~l4Kfsx z#R4S}_dPJeDio10WKH3CO+bv`N?vo|_v;zShnOrWgB;EYHavyc9?}uF@?lH~zzN$6 z_zjOaWB63~5>b#X6Q)8N!PsP6#~9~%j2LK*$O}N1;hZ)89w(ShZ$}*pM?{|st9}^O zmWk-A7{w`xV{*+y-aZ2{V;3&~jQ+W#xp1V16eNi8beOG0AW<3ZRHzqOyatnuyPm^o zjxz9VF~;9^c!(o5BVykT)8!Zpd%fO58W$Hl3CH1&n8$|^vuG6UI|cW9@3AC;3mH3| z?FJ$?tT=(CfT9)3V9b_An<>GpDAkU*I{s6{&-10vL#?kBj3OD0Z$r!4!|UhM6WM$R zyv-Xl4P-(9e$xdfQ}RMu1jsT6{~*hZDfv_^=5d#=-p5h}Y5YwX;*fX-K48}4ctOpui}C>7&Y z*tN-WrhJ!`tfJShcuD zV41U|CdPUtvMVs2Dvx%!vk}Kws(UNT2%*9Tf6WM6{)hlPGaV99vMNj@VCx`bl_u=}9fpGZnh>s|T5aFE zDRp~eYRR0+#w%!f_6C*uw!Ax-DaZs@=5n9#DiZFwU*E1_Al+ooD3Z&S17Ky#Bq@(X z!Lx9Yl*41iu{j=0)-|DPP59dE`4DWv%))mYZei4aP^MvxozbXFFvI0P0J9m#P~Z7t z8XIP$r|eB_ZWR$B!6VFF*P-bu787}gJ|`f}L?hN@C_o_(QY$*f^VDebOuG%2n!mI` zLK1@uxCj_u0_jfM?W`zk(R7(KMHi{&0FM3~=6YV4@WA%}IZAAlbD6mr6!}58+o*7{ zglVb*wu)t;E@Cpalft>qsD?9|8#HCu<2Y=I*K3@Kpk}5}BwWVhwFsW8I0ghi;@rqm z#27o1I=EwP!X_reE0`m2e*P2V8ym%^8O|-y=?q@;x(beh0i@?U*Uq)T!>fD`DH;vi zC}ATQxwShYnD~V7fc0vfF`<#W$8z0Hwt0n^mVSjOqoa_Ca4KAg(Yk2O#o>)|bd`2N zxggmae{V!2ULn(?&nZvNftA@e6^ZmT4@Te!@&Bq*WJxrAr3!y<4+ z;YaOm5S@)XvK_F8GaQ53wUev$-@B%Tp!dnPx_41NxzfM}xI5riPKyyh+!}f|vx0H&CjM}%6iJWZHk0B8m zBkYrh3NgjFK_&?7v!Y|^AC(TY-fuLeXE?)&P-n)6B2-|Wy6-eh>5x#q%Vz2 zA%|7ye%E0Iy!yKAxRG6;x81tXNvVx>k&z`M0scDCNi}$ei))#Z|Bd($eaTSr>@iY8%(A{r=~5A9STJcbZV0D^QanLVeg zgycwG$^3Zs?p&q@GPtO*Q*eAL=nMe1sNQ!z&q9P?~Cr{&Bw$bbLdZXcx|J&>J+H8}0Ymq$FmPk6S@48>Uv~F&+&rl!=bml1x zK>G{Zg4tI*1)ZOT)L`V^?MSvG3yPx8=PBfOa>uV!a!n0YoSv%$t^w%SHHGrpyz-YX zt#-TJf+?2D%orHhbytH4%3;5Cg_CFuDppi$fpRFEew3f&%}vn>j-J%oG@>qM;yc6W zH;`b)!*eiXRaLZk-qZ!}olL(6fQ5CM((bA+&#xG^H#ZgiFWjJ*awbOs00Vd5M2V3F zziCT_Io2G2l@_@Iic!V@)t3Ow9LiMyiZTX(JqZBi84k^1_7h!wT4psIZE3hUlgH&s zRF^*s#aSjXOqcqNXy9mtGB`szXoyvw!hioN~kRz|GJ?9v>(%rWP7gRnJX`e`MBDUjOzVyls1(l>E@=W5B zknmuSXaCnhZ|_S0*s%Za4G;F+{eRTkf7<^at}m!moVwiH7-%&h z$IL_=xMm4H2I$wip6-wgbm%ghA<$VSa0PJ;Co$4PU^OuIh!jSpqWuN@{IPg1Ccj3G zuptU;OjzgaO#>*NlQD%4v4L6s0EiKpK5U!=ioX!%#SCk(s4dgWOC74cTs{N-oE;;-QN?ER67*HpIT z3$cOZ4oJ(GFU1FLm)~*Oj6zfj!1FvdrobJ-yv*Y96m)blE%T%7mvw|Peg$@b62!h)wZB;fAjo6UsR(@r_BfYl zXVbBaugy}Eywy608!>X^p3)2!W9TD>I?Oj80ii7aiNq1g0;3)8u(^bQvb-a1mgH6WGD}JU-P~lfGP2tSK2Zdgbt| zjXhB(r?S4~xT#@Yp*8h%;Wv3Nw+!3{@Mm=qE6acK;?F6Gak#!0DR7hj$7nQiI2zqEatY5}g~Sgxby;Wh;z!8_J6s40ovvS6c22 zHW*WFJt>(v?q=jL_v{9pVgFpLQzXScl6Vd%&nq|b&1WXsH4w+Jd3)(u!!|niy7;(igXva zc&^ff#|*YbX)k)KG--yH8_{5kVN+F`51Ojc3^n&s`4*_Ds?AYTH8!C3{SwDf;h(vH zsfmiu{;Ql9&8@8mDu5RL?)6UNtI&2pFZ-zTAS6d&NR~Q+y(F)I|Mh>G@Eo|-YS>o1Z zm^{x6`^^7PrtWG3rv%6(^1Dsn_c)1gGJBfE?V8C*jAS4fnBpHZvP^46zNLb~nCoWi zBax+G4y?_#gm-RPJ2;XXfZFzv6LT6xU7EsBdVijw7(t3UC+fAwt=2!d3fH2HXIuxB zlFT1ZPb}~MLKnYJ31Gwi-`nrG=fA^)-r#Bfe~d@&{|KCWG9t=Nyn3rvb{o%Tta-Ko z{QK}};Vu6mg}*LQc>|MnDaN9Bg0a^Uy}D)p@20-^)<0*okLUk881_o%f4%*u_5UbO z$^N5~CEe2AqYcS*4!|l1dsF{k75Uw;0I64wf1M)U3jaF!*|6OxIJb%Sq3Tvd`zU;b zt!A712&>LC^%1sv_dxMM^aR_@H8m3z)wlKhY#E-P>Rg&y#JY(n>%2YB6-jP#_N<{r z*V%IeF_xS?H4YEt>uI1~YO>DNQ`IwFJ)I%_{aihD51u?dZ}U{{|4=Ae_aO#slK&4% z=Rc$2-qZc>M|lkS-_)$#BLQP$=ze^ zdW;E9BPE-S*VfbM;`Kc%AfEMKct+fl4zOYU5BCOrSN=cPKX_XIkMZ0h{=>N>ko%4R zWx3?YBF|S^RF_Ljf60WAPsQxEjD9}GVh4~gI`I{mknbykL>=IJV&1)&sqH#6S#k zgFe}Ex!1>UC@s6HFbkeQ50%UADe^)wYpdeO`9eu71E?^wjbdFb1GqA{aC8g94-n&>Sxy^WD5B5wcS6wOQRA(R5M7NO2IHAsGFV z;T(P79zMI^H}LC{m|BTjJ8i#u7}tig0_P6J|FYV9`SRtDIPkUNbNm$0gn1|c zJHY3Y#3nMB#bg5G06Z`G&i=cY;(wQ?B>xL{{H}35qkC!Gwz!Q(uu1+O^qu%0gZ^OH zdy@Yj;}P<|68&?cqWU}6b4b!sVgJ<gamo+?jfn0n$y0qB6rWslAEz-L9 zV!*WQo7x_1^t6mzz#DCwgH!@oGOTvL18*hn;!wj%W~{8PXp!b?tM~GRv`N<;m_>%A z!W!<}0w~~@oko2U&6I;5POYzH|K3QU`4hX-ta~)5sViqOn`YALWmF4xDE40>! zDUxyn5aihs1t8!_#ZO^A4?xgnuX(1WAY9U%ECLX$4BR9JyLCermDhl><{QIQySl1Q zG5iN=8{t$8SpDHu;PM0yfZLu|H9V~Y{Md*{BL2a^nqev=L6#VAh5k zD$Rz3(ESd)MmfqBjHmOvaU%DZbx!*K6RFDeaj77qRjBMZMi?ElnI;zAwgZx94R1n| z{N9lDf#Ybxle)#_3-EkSXl}-ilF)fR?aDL09idV1${mp{xVLLir=(WV7d;*U!z0k0 z*{wK8Yq}OThIgu43r29KJFJDOzkhEz=+F8zl>eoCak~S7P5wUz2P0Sh@AsbM|3`WB z`JW{sxQVOfIUr6b%4!b+>m*{f%w@_${k_GrT#rFu84T6ex9nplLn)y+C)pZ&`7*94 zn8O+P@+A;3PnU5lf^j(3NV`s|i*bW?Im^10VO{=|ZqvOMN><~Ru|3F~-1VD|D&!iU zRc&EH(!aRUBnr0;bCFe8@?)9i+x#qQTgI3hEBcEzSqG>5{6wZWU-PEAqWY9%#+-Tc zsRvaDmA;z;-Z4>idUYa!aX! zqn2hQCn1T);NtkS1+y77>7*JoE6ES9L=J6i@ysKh0+Q7rJHvUQ#x*VXJ)~$f zY+CwU`wSN(sr5Q>D4X^sjJccf5$5U8}|Qx|6tF}|Gjtcl>hTl9=-p6NKx|h=?Mrk#K;E2m`XDX)w{n4 z`L@OGUor}{A7Lfm_A-KYfT%kIY@3Vy{_Z8z>iqU#l&&iXHnL&QvSGOUij)STTSJsX zzi|tGQu)5JrxE`b8}-BS|2ka!)_dg!x(fnVUvv)EyMHxy$oXo%s=Y?>y>nMQ$ zCpj?=P=wihi_;yy#r-jMh^=Kku@QO#d2S&s3K-hq2!ec1-h@pyR4AR}OyL?S{(cY>2Ho%6rjA^(TQ z2&DigQ=H&@y&36yHqt!cvzhsKjMu;1}Zci}<2zI@x<1N(dxV^iz#wUsblwflmBm)It5ILWMLY(- zi4z^JxGM>8p6BUh%)S0DQ+}HGvUk{%A7@z_+8@OiF6)~2L8drHqLbZxk#_ZW-mw4n zm^->Lxxz{w3S*3tTmfHZv7IN?y{ZvrFhz3dmu^^8w>P83U59^?$)%p9j&rpkhdB;y z_^gg_7;`Q-#3Y3AoX}jqb+5eu)|jsy_FP`3FrQyuN?n8f;0i;<6@ovR38NAJe^~v0 zFevN)!>9aDkMorI|6TQeb1Nw8|C$qf^ndkjgZ^(9Yoh<#HSVbYZ=uv1``jN9uKe7Z}7U&$Tar35!+RV?aZ&bC=UxJX-Ne^$+1OsMirBgO70@nFm1q&hm`%nL1@1SJ=d5Zt{I8T-R$4oNy znD(C{-_#cBqu>5xYP9!n|M7`A4{ZM_#%Ajqe_AcCzUx;MY1HQ;Nmi+&5{%W+;`P>- z{ank$-EaNreykqqs-LsdKlp{eTWhbI`TrfAe;U~T_XZ{XuQzzQ|M4hKt^bc8-g|QV z@h-YHKYWu0zB}0Up5(<_K2_^~l_uRwp1tzH<3IM6*%D@V%KT~q@if?KByp_LM9CT+ zOvI-ja4aKT|5?r5PmlA|@qf7tx|f1XA58!69}HdjZ!mny|Me(O75`V)fyC4UwFy8S z!opFhV@z{Ere4*$1(S%^gr3_)jFSrc^AvABT+p1^uksUhiRmFUe%baTD*U>)TkHGu zj)8qtU+H}Z^Lg59zOJVc|9{x{4|@kAm;d+s`%n7+qdcYipLad}^>E4J^jCiL9sbHs z8_s^MQcaG2tqOMw_OONHw|aB_U+0(aKfM0=*&V{^Off;4RkyyKW!vW$;Iy!5=xJ-@nc1S5qm;z>W_+ z#denzWqi5s)|X2mrPm~j#K@pz^+QG$!dF4aaWY9L*qoWuvB@ePZy;axhcLVzOh28% zpwXdon4zen3#wrh$cV4i7eyVLhc!*wQd082V8V{7*~H(0m5uQVC5Y0~j7)e#){CYt z5A6-DJeWg8Bl+)P-;xd|97$gZL

@eM^ZMk?#V;Su{(gS>_VnjriJZ#tow5J-w?j1? zyOA??jYnlOG5=A_Gbj%YndExb`!gA89_T5_e=^+vecbz3&nEwm16Tg*AM^%K`ro5G zwfSG6ll>LO$_f8HOz$=Kt4cEAgb$D`ce;#Yl^ha-5tQ|`G3DRbnpN7NBe`P_5&zBwvoo^O6_!0`Wv)AJloV(;2BZC^SoovI)&GAKBUD7wzrpwJWw+6ZJn17KgYwARfr z>q;RIRDdcpZ~VFa4eL`ClyXXS&1CRr6urk$6r*dH362o>aT7NNc$0PNa071q6m z=x9{#+HfI<*)o|kjf<)obf;zEosq?sld)(v4~x1fSlnUstJ|*}_$`_%kGaEXJ=4F- z-Y%>cnw4%EFF(bWVd=48vr@N+Y8s@z#&%2nb=4Ve6iSd3ohnoybMO7? z6rhrN6XY30Q+%cSTu@U7lWs^fPATd&xh+&Tm7(7}ZP9yX{buIAwMM6U|FgKCu`A_jYV)`hu1|BlJT_9pma78L z20V%B*vQzgf#}LI(P=?QfCo-u8fu3trk=e2R&c=r`2r>lVT_KEN}mQmDZhck-pv0w zf@_e+BE>0V*a7|=BA!Fl*VyyU8RExNoint;Y{7cDE}nu;fleigd8WJIhx&y<_4t(x>OhN zl+NX<03^%B1ZARnksPtq4@PVdwdCOSm8@0!+6(ksjh|>2YLOP=u7wL7c^>9*G7S$_vd&#@!1Iy^7+0Sq;2=`SM2`xC&xvpd={4m;$f^gbmf; z89}jZXEB+;H~`O0dxb$V!r7)E%Hp?$s!_~$Pwd`2MXL9IB^E#Q`Csp#f8g%_Pv?J+ z^=!TWs{@sX*zqOF)$aPHdU%%|-&HfW+U;AWGWvUM`BwYoUEKUy3CWdU=qlverePK5 zL97g>Y0Qp1JhD!yWUc!-of3cS?$-L2NQ$hG0L)>yt69}yZ8h zu^nrCJ84F85|Y@Sid_)=ba8Qdt_`O3_EI(MB4G)o;T*AXn&){+eHO;eqRFicr8^`O zlBy!N;5c5=9A$4$gI%yA!qupcyK)~DIkR=a@^pmilPIr$TKlR~=;p?}4z7%S7HV%k z=O{}cKW`39R5*3XQv5YCO4`FwEfA&S;^`UYWVDxQ*Ge zW_C=IrpS_Hn>#zjOJj$4ZeHWDTGQK!{gH>4U~I-N#5b9MAMaLtJg@wEaeQhVF01!r zaB+Ov@>zh35=G}d$hyZUUI`KHrjtKg^G3;E6}Fe%?_=nG+(|Hn)^11ljN^Gt~bC z-_ZXF{!gIY5!g;s?Xa35%2={+a@;g#c88rYvz?|{jX+J-t`@%pO*jK8ad;(%aGL>S zLX@g+8Q?U`E3~E#;=h3@&S+lkJ8b~G7u)!s;VJWfbytmcIqQdaNc<(A4g7z2usjkQafW5v*V^dRLIs)(EE3i{|DY8P(E4?jwc|Q#2o2yzn zrR^cDa0FAxmwX?KA$IG1g@GJc7&h%U5Cim3KV~ z*>ibvAeQf(kShi;Cgf_Ff?(ATK%g)224=fKQ6nh&WjJ`Vj@h2w4xQD=Ng5CV}Q17&)VBwjIHIGV_VOh zZ^~m_44(CEnZ>0W4&!e3o7MQ6mGH+?D2PS{_~&w3Hiq}9SA|OQe~c&H5M_DylKuDm zZjpb*v&sLrKj^#i|DgYr|Nl`QpZt%q+zQ^Syj}Fgmd4I5dTX}Bp`a}PiNui=>C*7y zsVZ#y$M}-ZNLLu|U7^4#RMm*%HLGq9RTeMq6770Vft#Uc<954NEk7lD%PLG?u8Wk^ zbPCWq(($hCX|&zw1{^`riJ~{9>sPy8zbfheQqtKNS;7^>vAAK*ln0qbw@7KHF#Dh6 z8~Q&<0D^YA&3D?ZgHJ!VE_}6bZb132n0XMi)fOdu18m=%Jf?aJ%46CIP-Ba-L^6nHBM+txbkOyh7_bh#6kN95n@b^BB=-pPq+)HthfR5&mam{NH}b z{x^Ec|My6bI{(QqS|PyLX?F^x%F747^*xWA*d@Rm?#;~Oz58q?0vW=}8E3{jNi zh4+8kR2kI|F`h1;v<^mE_B06Q4zAD|5NjIh2j18dzPh0Vfq@+(GrjlwHlt!hH;t6o zw6-5AW3&6}#_EIuU*@}t#-hUcFA>zuVW0G zA%^U3TsLMfrx{u3XwqD)tL@o_9zB;RapJf=;)Rk^KQ_8Kt9{qUzF}R{MY@EsUX_aG zc=e7sl4YJI3&};q)?N*BdlC-6=EpDp%^?#24Kvz9`v3GsgHrt8(cmfn|D!xS$I7v| zr)6I75D~lq3^QT`d#p_SU{K06$*y7oqYh1xyujVa{OX+I;LqB1Gs#glg(0HHQUc{I z@u*g;;?*JTtoofW!JRM(r%abtG1qyM|0Fm8!3z-F0(ONRwdoja+5O*vP1db{E4I}g z7{EsVzd^6$|JQ%Y|Mn=4$gvd1oA6dNq5x`Z2LAvixtX_$s*cUMX=AdbJp9eOIDP;-TD!fw+^zUFLdgYgn9d?j{nOW8F#h-ZsPyFvi)y= z@Z|sZD32-s$@|LNiGJ#ggDpN4|Af;|O$tx`U53W2JT~#%1Txu7=a>QM9Hpt^@BEY} zb#6SbjM$y!DpjF1%5WAifio1fCo-v+Itw~4f|8Zl?76x*b%&8H4MW?D--e{AMSf;a zU7XMyCLywWX1bX@ao2y>r;h&%(s}UsFT;ZaSNLNMCnf8xdYayrGILC_BTQh4i_N6Z0GV=!ID@f!TP zgfX6Cwo#-hpO8-L7bKwb@;PgRO%4SU6v8D%fRY8`3Y_5TVj8Cy#gVvj6ypWXQ6$pk zVhVO9Yd*!VPtI9coXmKF#@$Zq?G$8U2M|DH4o@nnfxp8t7w`muC1rS006Fp!+j^2I zoP-RrNoxIyJn22e6#O6)LEICqmB5whtyILJIn}$(bZ2MAbL&;MXQ7=4mmHT`w*+RH z_YHqqJ@@jGoFy7Kx4|SP{xYQo>`FykcJ8%q!)SWDOsj}u4T@^bRw9rq(I9cg52ftL z$eWY7Tr;8+m(DgYM=9qzwgRK02FHr!Mr3PZ9? za>f!E2dVD~wd$NWtJg5w+66lzD3~>SidIWTf|3j2ZWYwT4k}q9T^%4v-=}B@sM26! z-H;_I%HlN$AtMS!Bx=tjNuH57Mi~zPvxz`->5FyhF{Bvz=wvzRHy@!iChLVhigipu zuS=hA>@Y&rfFW9tgrW+#{OdW|8Z6CWj;70)1NK2amj!&V+cno}a{$2##yA3Qn>*jo z-Jl91A6Ks2pxL|zf+qhj2s-?~`uu3p82?CQB6eZtlh* zl>ApG|5KDN@1Fg0^ZDPwuoVAsxc7Aa_b88tWcjokp5NW?z=~`;+y2W6nxh$91$EkSNAJBz-a1dnUfhxP{vkXN@zaI5dAd z`LOoi!Qi0pp8t>b51!(GJj%nRn>#IU|Gu{>#b7mrL>o97AWl#*a1OtwL)QIwd9jLS{zRI zJHQKqltf2`Gr>Dda}kiselLc;xGrgadyT_fhg2y_*;(&B%@_a+H%AX>AvlXkHYyc2 zG8IlRNeCZX-Z6j6-WGhA==rqETSG0|+^rZ_VMMovRJr3#F8G=;G%ABY9pTu+7{iHo6pNZ(BK3Z@N7q|q+mVJ%NVmGBW_EOXropH}s?JTo z<%^WZT63GM=z_hU@Y;1acyZ=qTDem=jcMVxjJpmxQAq?PvB~}PXj9){YZ72KN@8A^ zx0q`y3xJERwOy5FdBfHuC)g*RSuHe}T5DpZ170zmDl(P1S>a@MtIf&;{&jCus)r5O zFhi)shSjKPKy@rw7Pe+lUk!3so-FKTz2$G)tUZNuvvpT)>%Q1+1?2l#$VRJ{Gk*2H?`^nn%v9<~J^69@ABV4t#FZl0JDa zDO@2ymuVWK1xj)l|Co_wNvWm3q0ZVU$x+6p#^`};4kz9oRLo9FqH|}0Jfq_8*sI$@aVYL6 zP1zfs+>Ui>rl-OKWIN(33i?K0O&u8Yz@Qv=|MvLtTh2e8e%!P)R59Q5OXP+_(C-~o z;uey{1Si6kLzr`699Iyw+NVuYrpvS-w~!(<$wY zt%qi-UC&%{fTn3W%jp&d5Idn=^*n7u5(C-JfEAO#3N*_t4Q@*kg9bD)*hCbAyHdrV ziV`d-#Yx~JK$Wz-I_i*82`}TA-FX=K(%xMCL(>pk=41hL9KtwW^Hz?JPA^a1TwH$t z_T=^D`J1z!-yXjy@72dJJ&GdFZW}IXP8OA)Iq$3d8m$w!z+vTg)%5F(q;+jqd{>QE zd@fq|7pM`ztea{uiYj{i>J|Xpps0-?M63f99dC$)4WbGQJ>*s0x9H(j<9b`P=k(Pk zg4!0nUDWF{!z&ddTm(dMc%92ZT~;X5DHw4<$~nA5$X=^#Y~2)~ZCwf)849q)}5dPlg4K5F~w(8Q$jS8g2 zQ9!`fTTsBM*so+$b~mCeZ37gZ4C z+&?!+S7DhxD&hTfx&hpr(EJqUb2}t=hobxxWedy`F4A)js{)W+G}u(P#ElgOwT%>L zR+hijI<@C*RV4SnQ0{1tIf0E4E$tH4L}2*2(4F9W(u)NX17Wc871}wzjeAMOE&Qd>*vW2=c^$&I(|q0AMd0X zN)Zx^t-#9{;Q2h|7A=>+4Qv_lNj~u9i^#)}E;@oEiNp$2MRaibP>ppN%9k(o_-|-f z_m0tkkZMFv#->f{!KYXfpjh&&G!by+BGH(S?b)p|o!NY{a-ys@-Q=)VtG-chS?QSg zXS$r&ALWYzK&gZW`}>iV{vDr<@}Il|jI!I`1F4t)`n~>e;K+Zyy}|yI{P!5ojkuF^ z!Q?uK6QHMCT{(&XPTZTV#>J#+IgWulR?vhLXE27%`9t{fE##8o(&U(5omO5Cu7I-R zgmW;W{n&MKINP-Y0P**y%Q!wIF%H+3I3((%`ePvzSTco_3p_%CWNONyM!CGF`^lIl zYt3R>R#v;4n;O|o1?{zajG*-9WPE&Id>b1>yFGA&7(L((I`)}1P_i0ZJND_1Z(mD#HO^G2 zB(U?*<=LB~*Owno-u>6**@q7oc0YoC;P*k2lGhblt1}2wK}E^RNVjQ9UNS7VJ6L%d zD=^PJ!?I=D{I4G}vS@|@D_N*%H)e2hnQ`jxXnlsJMK!+q_4}f(k*TNXkp)Aj&~6{) zqf+5i)n%xAtD1)8ZCmfaR{tL|pRop*9te^V^4V0ee6>OS8%i%?Lq z;+_FEkr-Zsmia_}lKoY`Oou^>oUGy=%61?)V^H3+WH5=~R75+XDGKp)%^U0r5KKEn z$qHvAS+EgN4r9Jdk@|<9ccWzGQKzohvJ#mFEcHdZOgz7GKIldGd{t7I?9)1Xm}~=7 zhJIb*3`HRDb&raGPW*U`Ou+)CRMh~`2rZ?K1U-HkhW=$tp_q{8<>ChN3!Yw9bhGWC z@1{?XDVhU&iC81`O5x~-sFt!1EMryqae?(WccV-WsW;MFZ6funf^nT3mV| zbL;PTMswGN=8^ZFTZ_*#nAYx5hh4EO<)k~1tCe);2TE3I*C?OF$d9&Z7D!fZu;Vt+ zuL@3V@!_J5m;IWw0=yi*UBU0|RyOi^n{d3tQW1BFq2H{(4RtT8aqjV;CZQDGxzPHg zPg6%mpz+JkoHLe#L>Ev@qgeq=Qn1gWX0%czO4lKskqPo+tzE*p-?e}UlpxMUF0v&$ zIXVaD$4Bqp02R+80^GGVnG(@SR(C zMFB`Vq!q6!Oy7Px`SaTw$e#>tf0SpV{VyfaT_eD3IR72>O7Wi#`g>3DUmxWW_P^G} zoQKB{<~*EZlGND$I;}FUP}%$6|85A7|q8H=wXYVl@=z9OYF|hJDBsMO=)4aRr5V3slpIbUd&oxO4wA zSZm3u!@QVC@8|8O(+6hLq;92MyNb1ZTkI1>JB|1FqZmUfn6>fq?y^xrBBYb4eEHHc zf8QNCoN}R;uU+-`-J#|rB{7+;&(jRS=$Irl&mfj=GL;|iqum%~ML-1O=a#Ual=wfv z(?I{v@;k6{r^!OZrD8K*V(kfuksvN3V#E2pId&76dn3vY;4~a z_TQ#(a!+XAM>}PNEe@peTA#d-SF_dglGZL?DlA}#IIuFVfqW-wx3@jK5UB&uXI8tL zF;QDM(5r(r(a=njzWSY;f>-4ti7<~_lkl9x~M(Xb@jk@i0< zGvUxrK}5KmMVBcb7S>)Q`@*jXXkZ<%qf3Bq=nLZ$5W)FHh!}74hO4y{e^>$0MFUP@ z2^ZH2Ej=a8NKQf$TW`772m00c8vJx|aT;*fj`I6+--nB1US6Dx$hTu~aeP`j!708n z#LEbkZ(~*iwYKGZ%DBFn|MRnvhs^)IH#!)U@_!GX@;^SxBltg`V<0jOVv>NE%y8I@ z>&v4vecvX{@B(IQl^0R!;V!c;sVDM7M^@K4ZcUi#5_eEECvWQSJ=qC0r(?s^yTb3VEk>r~{m;#^0kWssW#FLENc zL-x0IeMwBL$^Jy4((dXsXSSw32Z5n3^gyYiv@>&Jvb;)Vlj7dKn*vIFqbUk~E)WB2 zk98bk3r`}41gwc~m%JGYl=!`gw#R!!+}|`y1xFt*J_M!0o{=+KFF3xh6(=QD1w_92 z*Q0A0DL^TBnbR}10~&2OTb=ubeemNM%=0|`5#{5+H*0QbB~7H<@AaEipn8^yJ2WNN z;VJ+$oFgXi6d*XVl@KaNoA)6P({mDD)%T)yNUb?H#1l_zdJMQYBRk-&ysYhDk#m`$i+P6VoWxNXwp*eh;2bXyS>}}} z+us`kO>Jww3)A}ShuBb$@c(%~`~ODy&-Avrr4+b9{u}J|_TBs6z0u%F{(FpvtEfK< z({GIhpfb-(rPG$H?l%tyZQAlhtT)1eS`tTbZE*am&{Dg65%QLHU4sJp)eK~zuL+5W z5TYS7Gn}U-6#z^@sYps`*kncd0zwVwP6?WgK9_T>Xl^?RGC>6GU{}}zoLiR84a>rz zS_I>>P%^N#?p2z%E;}0zNDLV25(SWMX5!bjP(%kZlEN7`WQ&6C+YL~wn5(<7-)v64 zXeBeOKGIx;mLq(1coRttt1#DY-`3P98DkaZr3iOcEnk5$CGmyDix%suL^SMsCE=(x zU0Iyhs-&Cp*GOq|7_m>8`*;N zxw2!wRt(YH>8k|*tx*-PD@@%cmn_(}yR(~c#0GB!fl|u$Dm+m^N;i4OKQBoZHmaX7 z&2cj0jNWE*-S5Crd=1wWq#2r`48R1~#qm@J(xE8V(cfJ(U)43aA?J4YJMbZ&qwE?} z1Oys9DLewFKOYNIz0<7Q!^D@3+}U4txDlbM5*Jm)?h3rr5BC1=o4=I#=%voC? zK#MeAzs8xpzSLVQ{E{u{nV=RZ!poASusF=q-~v%H@JP?~El~U~^bRkud#dMcL>Kn8 z!+)x>W2d_wi{`LAk|Zmy7crXpx=^rNRYY9$39N|8&&lMUD9klW)7Skp6&nTkSsoJM zy-Zfj^)yE6ij1ws3jmcZ%iChco9CdUlGS!v9{`Hqf<6oOZ$S21iN(-}TH^1MO?7R_ zvrIQ~Z+TB5UC($mE=Nh&1dxrgRs;Btu|bX=Kb=vvXk5E6olukNr)VuzGJ0__R4ciX zKAfFYf3EGFDs`cQBLbclzhX*D32%pqq@sT0b~+< zL>4+bIk!Tggf26tE#zutPyoY>Pzsi5#EA$+IHyXk0oooPvI z)&6D`fX*4>7x+7znFkU?0Mt3D;jpg2o9aZn-GV8WA%ezW)o)$lBpL&838}R}IgDTq z8J`qcgp8w2M+8(^hCDYB#HJJ@|(W_{ZW@v@UQus*`ah3g=?jq-hDI~*-IR(lPBm2gxX-MY113?W-W{IbHyasl>x{-N;} z^7d8%<|BiW(7rxi-LaxIUrlQZUS_cz3w_-BYdr3DzgdmHS^eiXtF~-qytmgIag)2d zz~sLlDaynpcZsyURx4_~hB=%-ih!E`QZJWToDfR4!}9-88ZStMUdb?tkB)U3L!6`} z%NZkcQ0KgiV_MD7YT;JF+#cLNqepUzezLZQ12EDixtFV4+i&gAmYpp5m>6j*1O#USAG!9Z*^6}M=E&G}=r!)VsiP6Kki zWn&c`yY~h|vPff;BfG8Nk=bpBK3kSH>JPP04ZM7c%+ndnANFaW|EZgyZxfu~>KJI# z{g1(@BC1l+sk^~Ilg1j%;R*o=A{4_liU1qOhH75vuJP7d zUI8I6&WwtP4H~}ZDL&$-XFGpndCSI z>Fg5I48dp(+8=?p-^QPM3;gm0wCCdZKuqYDFaH4|0%(j-3I>4vNKoL5x%+l{Lh{oL zQIzCQd(DGCTk-!}8UQ!h|MrHi{cq6Uf4cwiD9_hr|FbrRTblr#&7tA$@R)|c`>+8v zGykQthcNybTj(bHpG2T3H2G&8SWn{{Om`LNmY}(fZvoba_pJ?sdd$2xW5BCO^?p!ZE)N9b*y0DqEs6 z=zdbUzX5AtRWwu_qi46YE&70^CMdnswg9!IanYTg+qKlx#CSigRT&x?O*~+eRp!Qr zY1VIa{OVZf*8QrmMn33Lf3i#7^=Y90Whlb8SNTm2xdis+-UiojCPrdkxhF||W2ar`bh^e6 z2}u}J1c!j^XqrC1{aM%mNbm)+#JHKxJkf{5wt$U|jg9?=jScm66;kmAXX~?YjoT*o zgs#@&90e6|UR%dC&f`y7M+xBfT}L&7>|(B_9KMWpmEdcVo2xbbf2FnDvwEMfaK)O* z&E7*jwOf9d73@{tt0I3#=HeQRXgDIc&-77B&K zT_6EhHqDLd9`edBina|TtS&I8Q`AJXyJ#+{E;qH=c;JFpYl0VITMel$XErYGD&O7P zRLHBTcxw6cfsYzDmW$iYn@sF1qMg>87M3~AGVgY~AbCmz;T~m!qSLv$ZCMhyF`U((SU3Up#PT?w^f3e2V#!YV~@8R zD_ZTJvl~mb_xX0?@d~!zzUv-u&o!Q)J!r#y`gUvCY#q1S!5ghMWOI`pxy26IV0*UI zqwS{8V``|89>LPEbm8L}8rGJ6$jM_0UuOsww>Xjxk}KWMi@R1oOn2sMe^rO4tG? zpf>jifa(Z^1}t;6O$7|E7}ZMTE;|Uksf%d!Z}IVg|XNC0TB=U@@< zIg4&djv#Fuy(25iMZVLAPYA?1dK!}~ClMATK1W+lP<7twNdfy6MVfL!aD2LFIkK{O zZBYsd>|B@N%>CW)v|KgQNd11u5>~K!L<$nATd&c=DzG+h_S4A^-oYFd`8bIE|&#rC7wtyqbedbE|H@ z^8med?`ykSFpz>QMKQ?|wo`?cxpqHncLEX>_+3UUdd)Q~+ z{^x?_aHr`L1;7LQe;AI&_5DAceyRWbSw6?xf3^m`QXGQddEz#0YFG#!)F@S`RXM5M z473Z8mBt|2t0`+^6%S?nhyDVPRIf$ZmEi0z3yY9#MYgpc8z~ZM8tn^*^C|f|>h*io zCe>n*2JW9x?=QW-^m;8GCP2Bmc=q~5|9`%_szF1wVrvFkdGb#`^mT_m&;g1SB5jFP zQvpuvqql-~O}OH`n#Y#aFvzBg8QMGm(}Y$Z@!=jVV;1kcez;iUTv!iv|6bH;j;&|k zc*(4-RXZUbAjQ6}zqZspG;e*hgQ=0~)ZLH+KcYry^v9v7qsnvJgE&Qr28#l!rXRRt z8lS$M(DJXNivKB}efnQy$(?>v^ph-rhwT4}Kdt9~grhI^|7ZCerT?W1%2ip!Em4(< z_3M14Q|+C+=XgcV+pK|-p_DsY8U*m?c2fZUbg;YJ9HJ%=<@73#AF9dJBJm-;jwiRg0<bQ%XrK@Czaw5@}LMcXqA$-SZ+@vB$6pr6=7H`#Cj3m9IIZHPr z72e5z(saqtT8NCF4+b%dxVNAp#T)8HY%?fd^&hO+eP6J_7G$=-Y24SN^yMghtEHX$ z`^OMUUp}AhqvgN1Cdr1vLI2~A@o@aN9{(9mreEs+ewNP@bcux^c?!{0#R2GkO;WVj z(j=BrDZ|k%oI#vCL2y${zx>P*Uy~$3(zjDNA2eN^p`0XG&^rP}#jU^NG(LHPQlj5* zdYa{ANk5QS6*l_6Pdx-LMX?lmN|aDWa+J`NcqiWTtG`|emXnhw=mJ<4{djSOVw&?4 zZ$-rb{#EFoc#D7J1NhhcVZ9p2f6TA^E*+GB7C5@yW}y4{$=4pg&rZJf7Wnq$Yfo(C z&n%~_ldu2R$rJP=&fzN6tLHEHiI?TTlo-X?zZG4}8OvF|tce>naU|NShVC+K30(-leB>Q9UOo0F51KVdl0|FgEX z`ZI6t1+(5ae;VL#PM$n@f_|=i@yk*PhOa83rgryyMP zLof8Ep66Adoua2he;D+GVLu2?Pvm$KL%C~DzSh@EQOeT(2LFxaC{`!HPk(+AjQ#0B zs8G(ggb!r<)6)~ze5bDY9yUmAzR+`0o9on?t3NYy{f>T+GZpzx+lCl%0*U7Ym|Qea5}l;!wDj%n(g(8M*NN#_ZTYZIEZPRPA@a@9t&!x+e{+GsZ0vub14B*&d6 zIjT)^Y)^7};3TK><0d(s@0sMtHObK@ZN)l!jyg^BFhZ9T9q*ZFXic>8cMGv`1F;Re zBM2u6Dm)xi+~olq=lbH}ox*l>B=3zR?|rTBzqiB3IYCv!=I-Qc6eR?w+f3btr?7G5 zkETK-%J7OHj22X!e2o^{O{V92@-@nd$mwcDa{VW1UP(XGxdfBLHgqwm$pj|V4s3KJ z^CpR#+;$@770 za|fTaxrepQ9h~mnLyyQ=k3tpSMHT;(s1nqu;@eaSoq}oZz~->M(xPN$RXpZ(G^&ep zy!iS3MdBk$4+qg*252YyQ+BMGp0?%bA7FWQmuQX&x-8Dl24_v7m*!^B5B&ot*h$Jd zCg?KGI@@M7(`;-_a5%3?9<1Kogm)4VmXgb+$wi$wi;*Tw0bIq9{@f zk0iy=O$wI@*U5sD9m6UqMm8zxu0@7Lv^Lg+c?Bb(=`G1!_=XOA4`crpd~5nBwDE09 zyjI=}XNOVCEJ!#Txff*UnBZY+-sU${Cpc`Kpk5Fy(Cax3XeGH&onn$0MJ&%rB$Az; z{c)CdINN7wyVPsf+50ucYR`Un=<*(>+sg_1?g_f=hfe0h%$wDh*KeKRcLWPLzgL?q zAsdnk#My=*PB&RXmo$PnC`ZejZP2&s5JydYdYlptr%s=E=2+WV*R`Eh*LGH2+n^zJ zIg^G5yH`GsI%KBl3egmClHbutdOWf!mub!PO(ABBW zQcdWYa8EDak%DRJ6iidc@=d!g-?X}X)BVe*MUGzpk(>T!!s#OZm zU~-)47fzg}-_*eX)2<9K@y1mev@<{R=p;CPw*|t5#Mn^HrzFj zc4KJL)fk#ojiE`!7zz#yONQekwa?h8eI^d;Y0}ktnpCZ)NyT~!CI?P%beuUGj-2M~ z#9=*6x>`?@s)U|Ytf%0>Xhj$v7p(}xiF<!t5^kN{gKENNp54wb8^Oi6>np@wn=QPb!kwqJt%FjlZIgpizQ% zF1KauaH+>#UFvbwr5;yY>R{C1ONjcSZH6Gt+S}nxqL$=HS26@w(#7XTy6B;D(F;sP zL&dezvi~%ao8dsI@*qhk2Y?#n;=~bo4XIZA^?H_4j_)ZIB>`dy@dXeT;lKHlHvR~X*irWVz*2B!JIvK5Ij+BRjvq4xxkQJ<|1*smLGT3^5d$O zA6K-zb(&gO@tlG9R1u#I*(^wIKWmmVCW{>`>(6u8MqIRpjG}BKMn?%9Zkrcj)`~ugvLo!gkViKC9T&+SIn6S5w589VZlq zvpqtgUFnazD*bU)>5nT)zl9i5%I^=I-nmZVA6T!W1X5D^CdDnLE5e1O&}14;m!pZI#*rtG z!)i`NC5a9$A3TLWohsnrky|RICx!8(gZa?f#1>p&2JA!?{4iGlXND!P$fqK;XN}Um}wo3$zHP$L+UZ zx+jMzIP#z%PzMEV5qh;+>Z%fDDI7`&EXZ=3B%BE6YP1{t@{7)^5!6;=Xs<^7Ec$|F zJ5;@g?lsOq1w+xACb4=*#t}yjUAa?X$J{CCS>Jd;`((6jCKXyyxxs8IrQaHplGdtP zHQ16V6Kgm|;b=wgNUDyKf+LSn0{1aW=*prBJ7!VIp7R=ce49Me+FJjATP{$RvpX6S zq_6O)$w%uAi_sEOb)1H`f@LJ%P*t2;QDS_YM-z;l9!=;-;0n7YaD`sYfSuc9XvV9h zXLpBlDN{6CD33>3FTy_&^n8;rpL$uJf3O-}a6 zh=1UY_=k?jXxKF}8hSOG%{JMB16{q~$oP5SPQ?lxamlc2Tr#Z2B}30P)%>{=4VPKe z*($0TMd4v+xa@)M=0FvV;bCYvHF;Mw>U#VzG+YX^qrM#07sWpWjiF;vhFuqBSY4E1 zbx}r6G};$s*mY5c)kPUr7sZW6`=SiHE=o|RhJOeefrA=BS84=RY6MkkxN^}02Q`AO z)bPC^tm5Gxf`{+&>-^4sonQ0oe9N!%=PJS1flB*+@jE*;e$A=zEvM!IRN9xv?`(4W zRg>GdOz!=dw41zsH#AW8hrQLA#yBe;3)o}Go!&Ra&aiY;~xcXfU zSHEhw`laEzAB}c%((h_c`t?Pb9EL`_9prblgZ!!;)Vaie7?-I;xs6-Z7hSNK z*7Tl&WT8?f_n3=p_?95Z+OG#II1wB!cd9$u>^_C7n^x}re14RFHlI7(v#Cq%PCKjJ zX-(};>uR?p%c;#pn;&=nJa-*GPhIMK+F6}XYwCPjSLcD_dd5A?$!d%97?Jc2-Qk?0 z6%k0K!M3K1sG(fgciO(t)30G~Z(u8RN@1UFZ`IwuA1~kPd_k_tQ{593v-B$g2L?}f zM4TeF6^Jc$T@>e(+9biWvr#jx8a30pQPY@_?4J-pprjUDZQQ0?PU2#A5Wg>WoOE6rI>Lgwf^SFGBxk|@?(Ozw`oZUf&6Z}L_oT`PD zTSS*Ig_L2wO9lQw_39m!?KgKN`%N9D_Oz?1Ej!i>hl<_MOmG1yw_!Qa0qpg5QIZ@8 z{r$^}cW6WNTrchTsLM0+@vMGYszqzO%@P_()-jUE)M$mPcr}a8MLw5V(%mYllCNTu z_;n_IBPRm)vQ(EE>DV@xrl<8+-Txg~Vs+W>Ykjn>A8|_XPHKO_jKVC64XJI$rD4En zOd>f6wH`;Mhs?*0?2xI$$C-BZai&!tXIk@dn#5e=I|7PST0$7oDlf5E7j;^ceqGXp zmUgaXw{mO@3bT*$c>*N1OsypKhH&2+kiB9ol>aRoi*Bgch9jb;1HyQWyE zu6||eVb!1UoB2DHsyj#!F3Qv;sxp4($5kGgy9$qJ1f8?)zTorvq#X-htq`!y^i6V{ zKzN~&&lMB6gbX!ca3r=kNp_M+NUTV5oM8m_{r=g-3BP=P_m5)2!MhjFp1*nVdldgX zp#J-KSbzU*=m+C3^*=wy=LveHZ&<*4z9-*pQ=kNa8lVTUWQ}19) zIm=J1SMScz%{PAzykO$_eg6iUKDQLl$;n6bt}GA#5niA~AJLB_myQJbc=EAteLhzH zlRp8(SH(>_mwvuV22pLKiQey}L%QuF%^buF;zp z&)#06>mSg!FVL&ESJ%&8zkcx?J%9D?#l`jO|ArB-)K%J(lRmmsCG4X$iEhD%`1$W! z8r}Bg77=K*r7_{97AaMS$MV%+gVQZe2LC_wxRO2opP~Of^cna;|A&mEeYyODQ?#Tx z7v4!9T@eD){P`z(OI?spPx|PhMCm!@5zFJUb*%p2tyTl^Bfq?U`O~$?WhXf#!sutv zX~$^4l-v)ZHDjEdp7i_ulV?eS-qF=saA}Q_{Eoz^kFKk%t@Dci#gwL&|7((L`a0_H z=t^L}{GX13@uVjI!!VeBk^i6LBW0LMQI?XWub$*MIkEVfa+KwCgL9hfR8e>-guxcw z0sp^!cBNC9<@WYYUb1^~NAfdtPxQrG)fOj-mjBiRqA;o&$wRMFCH7+$ZJ}V2gg`go z%9%e&abdEm^^?9d1<9bxxoe>aA`|wuoB@RY7rRm~$qs;wU`0|g$0;cbEI^Qzt!SjQ zf}zYu^j}0u_v>9IrMsb?{7D7iZCT$G^8JbqIQeL~uoqsr@L0Km!mbw;U1uLdgYh-4pBii+(R#Lv~G8m`I>E$SOq|+;1DyqB|A^4nX;xt zgj2LohbSJ>SWD;A!c&U!1(C}9BS=OQmx2{2Uks3(ffL!k&rl z-4ewOfKWN87qM6g;k-V+9X73CVeE(k4@nIut}TJ}H8h13gjS-6aIT&N@X#x90D|AK zT!k}fx@2dC4i)HU$!al+wB|I=wpcDZs3Nw_`yhq2KGNQy#=NfyHh5woeA-SGPet%z z^bsu>la#nw;)D~)MlW=5Z=0sg`Ime_^*h@vb`EjZ#-wn=erG>fgYIxn<(TTY${r3F z)(QSK)*CsFx|U z)oS%rAySFIJ{VZi;yv;939P7aZH^x@wGEX-l*X@OHjKWf0$C3XEp||mKv&noQVK&r z_Uh`TWI6Z9p1L=$!3aK6TBtD z#M)XooD;-}I0HK88X<{@sxX%2BqA}q&Uy%H`oZ@mYA-%e4mY~=(Wzc|`IkBcu8q%t z$cGHh$|(363#g~dB_o>+PtXmG|C)1rvqv&{G+pI{^8@xGPLXbG1)S?b$u*3=1Ku)> zG;Qrsih6s;4|31)Tbiz()4WRLLC@Aq5~gm6Vw&qD1HC6%Mp6>%>ps@N;8}3=O1;?y zSDzGD;4D*}jjq@GdBe7;$ne_iQg9_KNuZAS-^f<>Y*Hflnz6>F?4U6UP^G#MIonFc zhCio7NHP@lQK(qM_Pu2BfvThh@1taTf#E{}-GbgtoEIb2Ww{OcktBIB){%0&=y#wL z&vLdAm?n?FDg`KuRSM%GVJrPi{hGql0AS}P?3NzSCT5_c*rdSjAvUp~cVm-cq&l0} zkRORnim{GllcL{|Y~sN>*726?kzujsYE4&gu~81Am zm!$`DY0VHXc=X51w}trsLm9e7!d?F^OHXUl_7sBO(S%evvZr@I?_4Utvz|H3?Va}q zcUd|xeS76s(v$0*_av;|SubUvJWPL~zAV51$6soP5$mF`^dCg!Z5XmC&VmzTWkeYN zQ?kI1mv24ybiCsDxvFa`$V()CTGME)9$C}8C3_l|ZlP6W)nRjurJY%8JfMc9-W9V{ z+T%EuR;yxw1zAd-5IM9IOpUH~78Yv{n6r$f*7l&>ZMxV;1KoC^bG%@H)U)Gcg4`Pi ziUW=5BMGtJA6IFRwTO?>Ng=6(sF96ooZSx0+j5epD(YRAVi&oz=mo_I*NF|O997R( z4t1sN)2Fak;PHw+K2?tb>WUS*J{zJOk(6y$>pCL!EQ!6sQR*!-xD^sHGj71D4ka2} z#-!UdtYSHUZ0?~SaYAFm>EH&LPG`uh2+OTpV;FR~q$w4(QmlZd4p9s(06 z-$L->=bv-3{H2V3-xhn&qYNbUAYy4mGQkHtT9bGSkHnHY6-F9J4|J9GGZyz#7L&mf zGgcp`aUZ9G_RU|kkWMn1l2^cr4(?J-_A*xq#LKoxa>)`J)!f-v%ePEiD(|d8^Ji)Z zwId`1lxYw(=(&AlV?kf7qg+zRJ|ci_`-iH7SC0@|aPOdS&G7%#FAtCW`8b@9@M3|< z+@F&9Xb~)j%XmnJF_}c8<{tGW>PHdp9~9sBSl>tBaB|Moc=@hO{CX@p6QMn zPU%_hWfD7b<7Si^ux`v^d!+3gQy=CCuCah0FmT&otvodJe8WSFVGs`SVm89l$znR6 z#}S^-$I;x6M`SUcPR7e198RVqf3}>?$Kz43Akk#%FPFn%6p?Ut09uBTq_HM_mc6{B z8$IQx4{%hOLg(Ot3uA_sCFiXu30SmJiF%Untmw9Bsf}5sS{J+0=(S?xw`5lwK5K3C zl>+gV#>uPVs_iGQOv-MH*FUqql|El=MI=q}{8q3r7Ptjo*$Wy##%d~RfqI?089Ok3 z&^hF&%o^v1AgkX%XrlXCeeuA|Mb46h5a;61b8_H!}(Sa$G#EBTh zm~2?eiKvh0j;`rsSv@<`zTV$SruK%1%&L5SqRWJG0x8fEC21;rL^pvPWZwc`$pi~d_`Q)OKR4DZ}11Cd+r0iP4OM332;W2Au9c= z14-jfkk!rwx5|iUo2_yj6I67Q&inIXY4KF?pxSZB-R6cL>WXTm|EU zbAN#|yr2mcl+?Cx565xu{O4cJdU4J&`4a)k5;g5?>WlKQ6i&(|zgB$-FS22>t&qN+ zapb;#|4MG_>dCr9M%)uLa{`N|)ikuEVD{M-Wa-~XVR#bx%vCTC1#wl+xMD<>MZn6vnL%oY+%LU25qd6BnM3)d|d0QMK zAkfmVjVeulqGJ70wQTDpRg}U+DJkt=zozLecbfnMt^U;=W>rN?M;YAl-SPpXqr6Ss ztFKQ?Xu2BcxIiCg>W+?F>b`C`c%mZb(mfSxV*Y%p=hzk{dV^`&j<<)d8%EO=+_W;X z;v79YMc4mxj^1Bipl?sn<+H1+pPrwiuYUa%dGB;3e8}WE#8KAp_zRG1J5dC-q=yaiFJB2gs78p^!Ccy07m!seG?(P5n$4NkvZ8 zUk5})1KEpfA=t64DyUpY9l_9zLtNYxLpGvydaa%%3A;D3N(kwa4{}FR zQFhZJ6kySP&bNly?pf1){&c0M-KOYR_l+w(jMr+;*B|sUB?Icl~*{qY=Z@jAe-g_ z3>pp=P2uyYKr&N}AR99-N#p*O>sU#J(jZHI_J4sNs&+9jYoC0;n=Bz-!Xli2 zfh@Pa5qb5nf#%-~^CH2oeK`9qGQbe0P z`)~e?0xuZ#{X+&a`7Be-q$!nKHb6NgQ^EKrAH<=*%gmIRF{KV$?|0;NigZkN*h zd4TMVfmBZRu0723BT!M9ATbt>Om^Ln>3 z>!g6ur7z4C86$iuL+|yS?KTf-{v(~;s>Y<^;7spY;|Ef_E3MtR-PdbUhXB@zPPY>z z-_TSsD9dA#Kb#Go&?Sj>Q9T#qx0{A>Rkk!FmfTP~7BG+eIm|Wlwe?^@^IS+b^0s-K zKNVF&G{Dg~MFjJmPR{~!N^T8w4|x{v-@U$)O}Cs_Ib3oA&%aefFnMNs54Fl9HusTM z1(5SV>lwUg-#EIdWxLg_?JDdePO(hKhX!m8(m1^WCKBfGYV42Wa1{C^o<>1D3YR1f zX7M5pg6VWIoseiTSw`V>5(MEQ8U=AUit#Y?qme(vquF@;5JJWW&<vKmJw&pTc9oJ@B9(RH6vit1eK%2Ti>-z{738tGi)fb(iAWe!) zM+8s(o|U$vj+qtTU;cPe^|mZo)q>EHH(2P$C;zB9-9P;d{R!>~U|OCeP$@L;Ey z5MFMqS;v5IiqJ@I)U*Ey%$rK;pw5=n&Op^v@G3#{o57zXYJX+Rzlt^atLpg8%~=tp z5)6IS|4N^Fa2xt!E2`^h-63$2?vd?$HKcR2oZuJ|;aa%TYVB6Xx^z_q51D#%f{MvUs<|OeQCP-x4m08CiQmJT$k;`&4aCsvb)I z^iwiI|K<$EyA*F|q;7U{%2NHdj!9LjbSR$exjC!ksuZ0`-V)-`OK3ylY(vyDJ|y8p z0fQ?o)i=28p4${c?j%M}t)Wk0Cn=!mHc6zD)_g)ps!|CIZc@Q@b#sK(G6OgHw+q*X ze6Kylh^2osRUg2KzNtvE8&C6~v>7ns+eIHj5;Wyz0~Aq@G5gzD)@X%^Rn_=jHpMXZpvNmuD!ui_Q?)WMcQ6=4aZwJS#I*&dO?FQje&!g?2nQ zI5S~4mwtMozh+Cgd1;cLHpOkFy-@#sq^CV8MX06{+U!)@{sw1F8{blXB^@=*RmQy$ zdk_l1SXtg z^XSnY7)OPOtZ?M7y<4*Do%hTYvff!QQ`a^(yFL`V9Bg*|;@jVTsi|o_tb)7W0<59( zZ(u~#X5==hRl~jJv?k<1wsdXW-`RZQYn(%1u02v&q_Y}#&I}?wbJ?{h5Ll`1&Ob?a zz*sTOo4P|`>upF(x2?fGbNH@X2!?uZ$cE*+UdeA5iA}cT=;^y>Z~6-y-I7>^FLzv! z&8h80!`kUki2=FB0?A(bkbuQ4Q5cOUr~e=(lfNx4DFNJE(SHzyPS`rNP znOAZN;C80I)VO0?2uN~ssEHuR1R2Eu2us~XLd^u8;TO*|cOm@Re4n*o z-U7!n$73ztAE->KykZrDp*q)r@-=9Cy%an1bdiCo$ksO8gEbFT!eM0+ZE)(j?7cxx zsZNYuUSD78p61Bj++78^CBGlYf3AuwfBgW5YABD(pBiX`JI!DR@g}cKpasfjS$C}>u5Gi%E}1G7?ir>LjyJkX_}HlZ{!8W zlAMK$h>&wsX8mLl7+;P=Op{h$R zlHBE4HgDn=3ZUqVih>E|^tD0e_nZ_qM8>jhqU4QkUtEpUN)mLS8qq`F5`^K(BZMUd zJlJ8?`H`B5q*1=hgo?{)&3dLEV&5h)f(wO^hHytY)i>2~x?8Y#rv^8xXr1=!LY+&R zXdSwzy64TWJ$OvvGN*SmAuIBNM>qiv?485bJ?q&;cjU@8tM{DsGSfdUx|vhWcZ`Ye ziV&`;4{X2Ks{VFN%&X<{o4M_KP^|)EIz1FXE!urrr2=zr*+$e=Mxbg>HpOKz&pN0_ z&a8Kiqv~KEMCL2|1~yHXEZ->M)*!S3+Lg*{A+mi`2IyT0t}dJJ0hzLxTsm%~SF#06 zJC&1TSnoB%@wYg^X+(0^`fp7;vjozbeT4cdML8e|4~o*tNu2JTo9m|iwINKZO5g2; zapa9_fcwC8Yv*lijfCsAwcQxd`mI}TBhw-Kacmww_Oo4Ch zF53KM#FNe*Dn-BLL)Oj)Z!!Q3ivX9mwI-D$inYKodRUkDx8)x=t1hmn9y7HIKMjr6xFY~^Qo=7l0o)I+iwVO?hL45^31y@^J`r z60DMU;1=g~QQoDc(4ylSXstl+xm`i`#;P$()0p1Tc#9M1lH4lUMO4WeE^zVCU-9n6 z-az(GG$-G~>lk|?*;P>8LfPd&?Xm3I7)J!Ni=GdT*)mQ`YJ}%|Lw^|f^I%kzl8C3_ zbQmmV)5&a(gT-hTO-8e2xL8K>coEMQvw1KH=JQG5Fa3BD1G%65YZ{aD6NLIm zum~Q!KY3EdETyY+N6G!k$)6IM-lBC*mVfTGKh;0@tJDBA8i<_U?YxNd9{4kV?g{ci z4B+>iB!BL4u}cVF6C!$O@C`h$UA_b^e|_@g3A&1KDuv265&Y!j;M1& literal 0 HcmV?d00001 diff --git a/stable/unifi/9.0.21/helm-values.md b/stable/unifi/9.0.22/helm-values.md similarity index 96% rename from stable/unifi/9.0.21/helm-values.md rename to stable/unifi/9.0.22/helm-values.md index 7cd48f6bf93..2fd34de16ab 100644 --- a/stable/unifi/9.0.21/helm-values.md +++ b/stable/unifi/9.0.22/helm-values.md @@ -16,7 +16,7 @@ You will, however, be able to use all values referenced in the common chart here | envTpl.UNIFI_UID | string | `"{{ .Values.podSecurityContext.fsGroup }}"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/unifi"` | | -| image.tag | string | `"v6.5.54@sha256:40041586e487fb3921a5901694a9b0254f61b8b564dd1e1f6dc4543ce9051398"` | | +| image.tag | string | `"v6.5.54@sha256:b001bbeb9daf75840bf7068748c75279e043e841d2547cd0137e5f9b8bc714d3"` | | | persistence.config.enabled | bool | `true` | | | persistence.config.mountPath | string | `"/unifi"` | | | podSecurityContext.runAsGroup | int | `0` | | diff --git a/stable/unifi/9.0.21/ix_values.yaml b/stable/unifi/9.0.22/ix_values.yaml similarity index 92% rename from stable/unifi/9.0.21/ix_values.yaml rename to stable/unifi/9.0.22/ix_values.yaml index 5a163957c91..3e9197d79db 100644 --- a/stable/unifi/9.0.21/ix_values.yaml +++ b/stable/unifi/9.0.22/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/unifi - tag: v6.5.54@sha256:40041586e487fb3921a5901694a9b0254f61b8b564dd1e1f6dc4543ce9051398 + tag: v6.5.54@sha256:b001bbeb9daf75840bf7068748c75279e043e841d2547cd0137e5f9b8bc714d3 pullPolicy: IfNotPresent envTpl: diff --git a/stable/unifi/9.0.21/questions.yaml b/stable/unifi/9.0.22/questions.yaml similarity index 100% rename from stable/unifi/9.0.21/questions.yaml rename to stable/unifi/9.0.22/questions.yaml diff --git a/stable/unifi/9.0.21/security.md b/stable/unifi/9.0.22/security.md similarity index 99% rename from stable/unifi/9.0.21/security.md rename to stable/unifi/9.0.22/security.md index 1803dd1419a..58ed23f0cef 100644 --- a/stable/unifi/9.0.21/security.md +++ b/stable/unifi/9.0.22/security.md @@ -37,7 +37,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/unifi:v6.5.54@sha256:40041586e487fb3921a5901694a9b0254f61b8b564dd1e1f6dc4543ce9051398 + tccr.io/truecharts/unifi:v6.5.54@sha256:b001bbeb9daf75840bf7068748c75279e043e841d2547cd0137e5f9b8bc714d3 ##### Scan Results @@ -74,7 +74,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/unifi:v6.5.54@sha256:40041586e487fb3921a5901694a9b0254f61b8b564dd1e1f6dc4543ce9051398 (ubuntu 18.04) +#### Container: tccr.io/truecharts/unifi:v6.5.54@sha256:b001bbeb9daf75840bf7068748c75279e043e841d2547cd0137e5f9b8bc714d3 (ubuntu 18.04) **ubuntu** diff --git a/stable/unifi/9.0.21/templates/common.yaml b/stable/unifi/9.0.22/templates/common.yaml similarity index 100% rename from stable/unifi/9.0.21/templates/common.yaml rename to stable/unifi/9.0.22/templates/common.yaml diff --git a/stable/unifi/9.0.22/values.yaml b/stable/unifi/9.0.22/values.yaml new file mode 100644 index 00000000000..e69de29bb2d